How to Create a Presentation

How to make a Data Entry

profile-icon
Create youraircraft maintenancerecord with us

How many times do you have to write out your licence number, employee number, approval number etc. when you are putting worksheets together for a licence or approval renewal? With our website you only have to enter these details once. They will then appear on ALL your entries no matter how many individual presentations you need, or how often you make them.

You can create your own list of supervisors so you can add to your log entries with just one click as you go along, or you can add the same supervisor to multiple entries when you create a presentation.

If you have multiple licenses from different aviation authorities, we provide you with the ability to store your logbook entries into separate folders.

secure-icon
Maintain Entries into Your Logbookrecords

We have created this online logbook to make updating your aircraft maintenance logbook as easy as possible with the minimum of effort.

Our autofill function removes the tedious task of typing out repetitive entries, and by using the multiple predictive text fields and dropdown boxes; we have made maintaining your logbook as pain free as possible. Our aim has been to reduce the user’s keystrokes and mouse clicks to the bare minimum.

profile-icon
You can Easily Access & PrintFrom Anywhere

Create your own personal presentations which you can save to a pdf file or print directly. Whether you would like to create a presentation for; a company approval renewal, to add a new type rating, for the removal of limitations or even as part of a CV for a new job application; you can filter your presentations in numerous ways; Aircraft type, ATA order, date of task, location for example.

secure-icon
Entering a Task

We have tried to make the process of logging a maintenance task as simple as possible with the least amount of keyboard strokes and mouse clicks as possible.

profile-icon
Creating apresentation

Using our filter system you can shuffle all your entries in any order you choose; aircraft type, ATA chapter and date of task for example.

Create a presentation name then select the entries you want to add. You can then print them off as a pdf presentation for a supervisor’s signature or, if your compliance/quality department has registered with the Aviation Logbook website, you can submit the presentation to your supervisor for authorisation without having to print off anything.

secure-icon
How it works for compliance/quality departments

Once registered, the company officer can assign any of the company logbook users to become verifiers/supervisors. These will most probably be the shift leaders or station engineers.

When a logbook presentation has been submitted by the company user, the assigned supervisor will receive an email prompting him to the presentation waiting to be verified.

The supervisor can then view all the entries in the presentation and open the pdf. Or open an individual entry and view the details and the copy of the tech-log or job card. They can then mark this as ‘physically checked’, then view other entries or submit the presentation to the compliance/quality officer for processing.

This will make the task of reviewing your logbook a lot easier for the supervisors as cross checking entries will only take a couple of clicks, especially if there is a photograph of the tech-log page or job card attached to the entry.

Aside from the obvious saving in man hours, another advantage for the company department is that as well as being able to cross check entries and /assets, they will be able to store the authorised presentations in their own simple to review filing system, thus reducing paper use and also the company’s carbon footprint.

profile-icon
HostedSecurely onAviation Logbook

At aviation logbook we take the security of your data very seriously and we have multiple security measures in place.

1.Secure connection over HTTPS/SSL

Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. The main motivation for HTTPS is to prevent wiretapping and man-in-the-middle attacks.

2. SHA1 secured session data

For higher security, Session data will be stored in SHA1 encryption algorithm which cannot be reverse engineered.

3. Session Fixation counter measures

In computer network security, session fixation attacks attempt to exploit the vulnerability of a system which allows one person to fixate (set) another person's session identifier (SID). Most session fixation attacks are web based, and most rely on session identifiers being accepted from URLs (query string) or POST data.

4. CSRF check to avoid brute force attacks

Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf[1]) or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.[2] Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

CSRF can also be dynamically constructed as part of a payload for a cross-site scripting attack, as demonstrated by the Samy worm, or constructed on the fly from session information leaked via offsite content and sent to a target as a malicious URL. CSRF tokens could also be sent to a client by an attacker due to session fixation or other vulnerabilities, or guessed via a brute-force attack,[12] rendered on a malicious page that generates thousands of failed requests. The attack class of "Dynamic CSRF", or using a per-client payload for session-specific forgery, was described

5. For higher security session sweep time will be set to 20 mins

We will clear session data if user is inactive for more than 20 minutes.

6. CAPTCHAs for form security 

A CAPTCHA (an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human. We can prevent automated form submission using this technique.

7. Script/SQL injection counter measures

SQL Injection attacks remain a significant threat to enterprises. While SQL Injection countermeasures are a necessity, they are – unfortunately – not a single fix or even effective in a single application. SQL countermeasures must be consistently applied and tested to ensure security is maintained at the appropriate and optimum level, particularly after updates or configuration changes to your SQL systems.

8. Custom IP Tables to block all unnecessary ports

In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted. We achieve this using custom IP tables.