International Journal of Advance Research and Innovation (IJARI)
In this paper, the authors describe one of the security feature authentication. This paper is to achieve authentication to identify legal user and minimize the chance of attacks. Internet is open to everybody to access and share information on it. Unfortunately, the intruders are also there, to examine a web application and its infrastructure to develop their own design, find the potential weaknesses, and use these weaknesses to break or exploit the application for information steeling. There are different kinds of protocol and methods used for security but still threats to the information on internet.