0% found this document useful (0 votes)
5 views17 pages

Aditya Galitkar

The seminar report presents a 'Password Generating System' developed by Mr. Aditya Sunil Galitkar as part of his Computer Engineering program at Shriram Institute of Engineering and Technology. The system aims to automate password generation, manage user credentials, and enhance security through a user-friendly application compatible with multiple operating systems. The report includes sections on the project's scope, implementation, advantages, disadvantages, and future enhancements.

Uploaded by

raskaramol81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views17 pages

Aditya Galitkar

The seminar report presents a 'Password Generating System' developed by Mr. Aditya Sunil Galitkar as part of his Computer Engineering program at Shriram Institute of Engineering and Technology. The system aims to automate password generation, manage user credentials, and enhance security through a user-friendly application compatible with multiple operating systems. The report includes sections on the project's scope, implementation, advantages, disadvantages, and future enhancements.

Uploaded by

raskaramol81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

A

SEMINAR REPORT
ON

“PASSWORD GENERATING SYSTEM”

Submitted to

DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY,


LONERE
In partial fulfillment of the requirement for the award of
SECOND YEAR

IN COMPUTER ENGINEERING

BY

Mr. Aditya Sunil Galitkar


UNDER THE GUIDANCE OF

Mr.Shinde V.S.

DEPARTMENT OF COMPUTER ENGINEERING

SHRIRAM INSTITUTE OF ENGINEERING AND TECHNOLOGY (POLY), PANIV

2024-2025

AFFILIATED TO
DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE

1
SHRIRAM INSTITUTE OF ENGINEERING AND TECHNOLOGY (POLY), PANIV

CERTIFICATE

This certify that the Seminar report entitled

“PASSWORD GENERATOR SYSTEM”

Submitted by

Mr. Aditya Sunil Galitkar

Is a record of bonafide work carried out by the student in the partial fulfillment of the
requirement for the award of Second Year Engineering (Computer Engineering) at Shriram
Institute Of Engineering And Technology(Poly),Paniv under the Dr. Babasaheb Ambedkar
Technological University, Lonere. This work is done during year 2024-2025.

Date: / /

Mr. Shinde V.S. Prof.S.A.Ekatpure

Seminar Guide HOD

Dept. of Computer Engg. Dept. of Computer Engg.

Seal: Sign of External Examiner Prof.P.P.Khandare

Date: Principal

2
ACKNOWLEDGEMENT
Today on completion of this seminar work, the persons we need to thank the most who
have helped us throughout the making of this seminar work, and without those help, the seminar
would not have seen the light of the day.

Primarily, we submit our gratitude and sincere thanks to seminar guide Mr.Shinde V.S.,
for their constant motivation and support during the seminar work. We truly appreciate and
value their esteemed guidance and encouragement from the beginning to the end of this seminar
work. We are thankful to our Head of the Departments Prof. S.A.Ekatpure for their unwavering
moral support and motivation during the entire seminar work.

We would also like to thank our Principal Prof.P.P.Khandare who encouraged us and
created a healthy environment for all of us to learn in the best possible way.

We would like to thank all the staff members of our college and technicians for their
help in making this seminar a successful one.

Last but not least, We would like to thank all our Friends and Family members who
have always been there to support and help us to complete this seminar work in time.

Aditya Sunil Galitkar


S.Y. B. Tech (Computer Engineering)
SHRIRAM INSTITUTE OF ENGINEERING AND TECHNOLOGY
(POLY), PANIV

3
INDEX
Sr. No. Content Page No.

1. Introduction 5

2. Literature survey 6

3. Scope of Project 7

4. Implementation 8

5. Methodology 9

6. Application 11

7. Advantages 13

8. Disadvantages 14

9. Future scope. 15

10. Conclusion 16

11. References 17

4
Introduction
A random password generator is software program or hardware device that takes input from a
random or pseudo-random number generator and automatically generates a password.
Random passwords can be generated manually, using simple sources of randomness such as
dice or coins, or they can be generated using a computer. While there are many examples of
"random" password generator programs available on the Internet, generating randomness can
be tricky and many programs do not generate random characters in a way that ensures strong
security. A common recommendation is to use open source security tools where possible
since they allow independent checks on the quality of the methods used. Note that simply
generating a password at random does not ensure the password is a strong password, because
it is possible, although highly unlikely, to generate an easily guessed or cracked password. In
fact, there is no need at all for a password to have been produced by a perfectly random
process. A password generator can be part of a password manager. When a password policy enforces
complex rules, it can be easier to use a password generator based on that set of rules than to manually
create passwords. Long strings of random characters are difficult for most people to memorize.
Mnemonic hashes, which reversibly convert random strings into more memorable passwords, can
substantially improve the ease of memorization.

5
Abstract
In our olden days we write our passwords in our diary or we make some notes but all
these are not advanced solution for the people who have multitasked every day. To find a
best solution we have developed an a Password Generate and manage System to remain
our tasks using location based service This technological app has an unique character as it
has the ability to access the passwords though the text file. It has ability to save much
more passwords. We are looking forward to it…

6
Scope Of Project
The scope of a Password Generator System includes several key features and
functionalities:

• Password Generating System help user to stay help of generating the password & easily
copy paste.

• The user shall be able to save all the username and passwords information of the accounts
he holds on the internet using this application

• Application only compatible with Windows, Mac, Linux devices.

7
Control Flow

User Input

Check
Username & Password Generate Save text
login system Algorithm file
Password

View Password

8
Use of Technology
1.Introduction to technology Used (i.e Python)

Python is a high-level, general-purpose and a very popular programming language Python


programming language (latest Python 3) is being used in web development, Machine Learning
applications, along with all cutting edge technology in Software Industry. Python Programming
Language is very well suited for Beginners, also for experienced programmers with other
programming languages like C++ and Java.

2. Python as a Programming Language

Python is a widely used general-purpose, high level programming language. It was


created by Guido van Rossum in 1991 and further developed by the Python Software
Foundation. It was designed with an emphasis on code readability, and its syntax allows
programmers to express their concepts in fewer lines of code. Python is a programming
language that lets you work quickly and integrate systems more efficiently. Here are
the features of the Python Programming Language: Python is currently the most widely
used multi-purpose, high
Level programming language.

9
Requirement
Software requirements:

• Operating System: Windows 11.


• Coding Language: HTML, CSS, JavaScript.
• Text Editor : VS Code.

Hardware Requirements:

• Processor : Intel core i5


• Memory : 8GB RAM
• Hard Disk : 1TB

10
Output

11
12
Advantages

• Password Generating System help user to stay help of generating the


password & easily copy paste.
• The user shall be able to save all the username and passwords
information of the accounts he holds on the internet using this
application
• Application only compatible with Windows, Mac, Linux devices.

13
Disadvantages
1. It is not run in android application

2. Password Text file anyone can easily accesses.

14
Future Scope

The scope of a Password Generator System includes several key features and
functionalities:

• Password Generating System help user to stay help of generating the password & easily
copy paste.

• The user shall be able to save all the username and passwords information of the accounts
he holds on the internet using this application

• Application only compatible with Windows, Mac, Linux devices.

15
Conclusion
I personally recommend downloading and implementing a password
management system, as long as it is appropriately used. To ensure
ultimate security and reliability. Password management systems are not
only used for personal use, they can be used in massive organizations to
secure private information and passwords. As long as the organization has
strict policies, regulations and practices to ensure employees have the
knowledge, skills and abilities to use the systems effectively. This protects
the organization from security breaches and hackers.

16
References
➢ [1]. Python org documentation https://python.org/guide
➢ [2]. Advanced Confighuration and Power Interface,[available
Online]:http;//www.acpi.info/ .
➢ [3]. Don Domingo,”Power Management Guide”,Linux
➢ Whitepapers[Available
➢ Online:]https://www.linux.com/learn/whitepapers
➢ [4]. IBM Developer Works,”power Management”,[Available
Online:] https://www.ibm.com/developerworks/cn/linux/l-power
➢ Vivek Taware
github:/vivektaware0505:Github/https://www.linkedin.com/in/vivekta
ware085476241?utm_source=share&utm_campaign=share_via&utm_con
tent=profile&utm_medium=android_app

17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy