In the network security contains various protocol, rules, policies and practical adapt to observe and avert the illegal action and threat
of a network and it’s accessible sources. Network security can stop, the computer viruses if it has been activated. The users are
encouraged to assign an ID and secret key or other authentication information which is private, only can be accessed by the user
only. With that secret key or authentication information, they can access to the information within their authority, not even the
administration has the rights to break the security access of their client.
The network is often private, like within a cooperation. The most common method of protecting a network resource is by assigning
it a name and password. However, as we say, spam is another major disadvantage found in the mail system. Bulk amount of spam
mail has sent to a user, this makes lots of trouble for the clients. For this, a tool will be applied which will be very useful and
efficient in the work.