https://securelocked.vercel.app - Production Site with Vercel and Railway
This project is a Django application that provides a simple way to control who is accessing your database information. With tools that track suspiscous login attempts a administrator would be able to secure the site and files to protect against losses.
This project is a Django application that provides a simple way to lock down a website to a specific IP address. It is intended to be used as a security measure for websites that are not intended to be accessed by the general public. Work in progress. The project is currently in the early stages of development. This project will secure databases and provide IP authentication for the user.
This project was important for me to start because of the gap I saw in the industry while working an internship with a school and its system admins. They had a lot of issues with people trying to hack into their system and they had no way to stop it. I wanted to create a way to stop people from hacking into their systems and to make it easier for them to manage their systems. I saw how crucial IP authentication was for them and how much they needed it. I wanted to create a way to make it easier for them to manage their system and to make it more secure. Many of their attacks were coming from outside the US, this is why I wanted to create a project to secure systems from threats.
List and briefly describe the key features of your project. This can include:
- IP Honeypot tracker: How users' IP addresses are used for authentication.
- Database Protection: Measures taken to secure databases.
- IP Authentication: Filtered IP specific access to the site.
- Admin Dashboard: For the admin to manage the site and users.
- Web Traffic Monitoring: To track suspicious login attempts and database views.
IPSTACK https://ipstack.com
While developing this project, we reviewed existing solutions in the realm of IP authentication and database protection. Leveraging the Django web framework used in other cases like Image stenography there are ways to protect data that would help others. The work protects transferred data from being available to others. Similar to my project the site will be unavailable as a whole unless you meet the specifications with certain IP requirements.
To install the project, follow these steps:
- Clone the repository to your local machine:
git clone ...
- Once in the Peyton_Kelly_Artifact, start the virtual environment:
source venv/bin/activate
- Install the project dependencies:
pip install -r requirements.txt
- Change Directory to Admin, Create a superuser:
cd Admin
python manage.py createsuperuser
- Check for migrations:
python manage.py makemigrations
python manage.py migrate
- Run the project locally:
python manage.py runserver
- Open your web browser and navigate to the following URL:
http://127.0.0.1:8000/
USING DOCKER:
- Clone the repository to your local machine:
git clone ...
- Once in the Peyton_Kelly_Artifact, start the virtual environment:
source venv/bin/activate
- Where the Dockerfile is located, build the docker image. Tip - Make sure docker desktop is running first. :
docker-compose build
- Run the docker image:
docker-compose up
- Open your web browser and navigate to the following URL:
http://0.0.0.0:8000
or localhost:8000
In conclusion, the culmination of these experiments marks a significant milestone in the journey towards delivering a robust, trustworthy, and user-centric web application. By leveraging insights gained from experimentation, coupled with a steadfast commitment to ethical standards, the development team is poised to launch a product that not only meets the needs of users but also contributes positively to the digital landscape. With a solid foundation in place, the web application is primed for success in an ever-evolving technological landscape, paving the way for a future where innovation thrives in harmony with ethical responsibility.