Solved

projects??

Posted on 2002-03-13
6
249 Views
Last Modified: 2010-03-31
hi,

Could you help me find some good java projects to work on for my final yr. project work?

0
Comment
Question by:tejasj
6 Comments
 
LVL 5

Accepted Solution

by:
nebeker earned 50 total points
ID: 6862069
How about writing a "honeypot" fake open-relay SMTP server?

You could have the honeypot running on the net, tricking spammers into thinking they've found an open relay.  Then, when they try to use it, you accept their spam, delete it and then automatically complain to their ISP that they were sending spam...

The RFCs for the SMTP protocol are publicly available, and the protocol itself is relatively simple.  If you concentrate on accepting mail (and not relaying it), then you can cut your workload in half.
0
 
LVL 4

Expert Comment

by:kylar
ID: 6862653
Check out www.sourceforge.org and see if there's any projects there that you might like.

Kylar
0
 
LVL 4

Expert Comment

by:m_onkey_boy
ID: 6863152
If you go with the SMTP server, check out "Internet email protcol" (or something like that, by Kevin Johnson.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Expert Comment

by:sunilvirus
ID: 6865081
have a look at www.softpanorama.net
0
 
LVL 9

Expert Comment

by:Venci75
ID: 7901785
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Answered by: nebeker
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Venci75
EE Cleanup Volunteer
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7962602
Per recommendation, force-accepted.

Netminder
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Java Message handling in Service Layer 3 57
maven example error 3 52
Apps blocked by Java 9 60
varialbe initialization 11 30
An old method to applying the Singleton pattern in your Java code is to check if a static instance, defined in the same class that needs to be instantiated once and only once, is null and then create a new instance; otherwise, the pre-existing insta…
INTRODUCTION Working with files is a moderately common task in Java.  For most projects hard coding the file names, using parameters in configuration files, or using command-line arguments is sufficient.   However, when your application has vi…
Viewers learn about the “for” loop and how it works in Java. By comparing it to the while loop learned before, viewers can make the transition easily. You will learn about the formatting of the for loop as we write a program that prints even numbers…
Video by: Michael
Viewers learn about how to reduce the potential repetitiveness of coding in main by developing methods to perform specific tasks for their program. Additionally, objects are introduced for the purpose of learning how to call methods in Java. Define …

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now