Harmful mail scanning project report explains about developing a software application which can scan mailing information and identify suspicious mails which contain information like bombs, attacks and suicides and store these mails in to database. Administrator can access these mails and identify user location based on ip address and take required action. This project report provide details about modules implemented in this project, hardware and software requirement, system architecture, system design and sample code.

This application is developed in five modules

   Login Module

    This module provides login option for users and administrators for accessing colors mail system. After registration users can use colors mail features.

           Registration Module

            This module is for new users who are not at using colors mail, in order to use colors mails first users need to fill registration from and submit to administrator.

Administration Module

                      Admin module provides setting option for administrator for listing out keywords which are to be scanned, in this module admin will analyze scanned mails or harmful mails information.

Encryption Module

                   This module provides keyword encryption option for administrator and update encrypted data to database which are then managed by admin.

User Module

         After registration users can log in to their account using log in and password and access then access this module for sending mails, reading mails and sending attachments.