Desktop Spying Project

download Desktop Spying Project

of 24

  • date post

    03-Jun-2018
  • Category

    Documents

  • view

    216
  • download

    0

Embed Size (px)

Transcript of Desktop Spying Project

  • 8/13/2019 Desktop Spying Project

    1/24

    DESKTOP SPYING

    1. INTRODUCTION

    This project mainly deals with controlling and monitoring the remote

    system like capt!ring remote desktop image e"ec!ting application in remote

    systems interacting with remote system Online teaching online de#!gging and

    remote system sh!tdown in the network$ These acti%ities are %ital &or the

    administrator to keep track o& %ario!s in&ormation a#o!t the !sers in the network

    '()N*$

    The administrator m!st know the IP address o& the system in the network to

    make the application work$ In the ser%er application the remote client system+s IP

    address is speci&ied in the address &ield and the connection is esta#lished #y

    clicking the connect #!tton$

    The administrator m!st know the IP address o& the systems in the network

    to make the application work$ In the ser%er application the remote client system+s

    IP address speci&ied in the address &ield and the connection is esta#lished #y

    clicking the connect #!tton$

    In an acti%e connection with client system the administrator can do the

    &ollowing

    ,apt!re desktop image

    -emote application e"ec!tion

    Import and e"port &iles

    -emote system (ock

    Page . o& /0

  • 8/13/2019 Desktop Spying Project

    2/24

    DESKTOP SPYING

    1.1ABOUT THE PROJECT

    The so&tware package is designed to monitor the acti%ities o& any comp!ter

    system in a local area network$ In a local area network any system can #e

    con&ig!red as a ser%er or administrator system and thro!gh this administrator

    system one can %iew the acti%e image which is displayed on the monitor o& any

    system in the network !pon re1!est &rom the administrator$ The administrator

    &rom his system can %iew these capt!red images and may record2store &or &!t!re

    !se$ The so&tware is e1!ipped with %ario!s other !tilities like online teaching

    remote application e"ec!tion$ 3ith this kind o& &eat!res the so&tware will play a

    good roll in some ed!cational instit!tes comp!ter la# and on any pri%ate local

    area network$

    This application r!ns in a local network #asically the application connects

    to the remote client system !sing the IP address$ The administrator m!st know the

    IP address o& the systems in the network to make the application work$ In the

    ser%er application the remote client system+s IP address speci&ied in the address

    &ield and the connection is esta#lished #y clicking the connect #!tton$ Once the

    connection with the client is esta#lished the administrator can do %ario!s tasks$

    The de%elopment is categori4ed into two major types as

    Ser%er

    client

    Server Version

    In this %ersion all the system in the local area network which is connected is

    display along with their connection stat!s$ Pro%ision to connect to any client

    system is made !sing the IP address$ )t any time any client can #e connect or

    disconnected$

    Page / o& /0

  • 8/13/2019 Desktop Spying Project

    3/24

    DESKTOP SPYING

    In an acti%e connection with client system the administrator can do the

    &ollowing

    ,apt!re desktop image

    -emote application e"ec!tion

    Import and e"port &iles

    -emote system (ock

    Client version

    In this %ersion o& so&tware the !ser in the client side cannot know the client

    %ersion so&tware r!nning in the system$ Once the connection will #e esta#lished

    the client system will #e locked$

    MODULES

    Desktop capt!ring

    -emote application e"ec!tion

    -emote system (ock

    5onitor and control the remote comp!ter

    Import and E"port -DP &iles$

    Deskto C!t"rin#

    The desktop image capt!ring mod!le capt!res a remote system desktop

    !pon re1!est &rom the ser%er2administrator$ 3ith the command &rom the ser%er the

    client capt!res the desktop images #y generating a print screen e%ent$ 3hen the

    key press e%ent is triggered the system capt!res the c!rrently displayed

    in&ormation in the monitor and places it in the clip#oard memory o& the client

    system$ Once the connection will #e esta#lished the ser%er can do all the acti%ities

    Page 6 o& /0

  • 8/13/2019 Desktop Spying Project

    4/24

    DESKTOP SPYING

    in the client screen thro!gh the ser%er system$ They need not go the client system

    &or any acti%ities$

    The ne"t e%ent is to con%ert the image in the clip#oard memory into a7$8mp9 &ile &ormat$ The con%erted #it map image is sa%ed in a speci&ied path$

    )&ter the capt!ring and con%ersion o& the image the &ile is trans&erred to the ser%er

    system and then the &ile is displayed$

    Re$ote Ali%!tion E&e%"tion

    This mod!le in the serer will display all the application which can #e

    e"ec!ted in the client system$ 8!t this in&ormation can #e &etched only when the

    connection #etween the ser%er and the client is esta#lished$ The application along

    with the path in the client system is displayed and a corresponding command

    #!tton is displayed$ So the !sers or the administrator can press the command

    #!tton to r!n the corresponding application in the client system$ The so&tware is

    designed to ha%e three applications$

    Re$ote s'ste$ Lo%k

    3ith this mod!le the administrator can connect to the client and check i&

    the system is #eing !sed #y nay !ser this can done #y capt!ring the desktop image

    o& the client system$ Once i& the system is &o!nd to #e idle and not !sed #y any

    !sers then the administrator can lock the remote system &rom his system$ The

    system lock process is achie%ed #y calling a windows application programmers

    inter&ace &!nction$

    Page 0 o& /0

  • 8/13/2019 Desktop Spying Project

    5/24

    DESKTOP SPYING

    1.( S)STEM CON*I+URATION

    ABOUT THE HARD,ARE

    Processor : Intel Penti!m I; Processor

    Speed : .$< G=4

    -)5 : / G8

    =ard disk : >? G8

    ,D -O5 Dri%e :

  • 8/13/2019 Desktop Spying Project

    6/24

    DESKTOP SPYING

    1.-SO*T,ARE *EATURES

    I$ort!nt *e!t"res

    The application is graphical !se inter&ace$

    E%ent dri%en programming lang!age where all the acti%ities are

    triggered #y one e%ent or the other$

    !ick de%elopment o& o#ject #ased window data#ase application

    with little coding$

    8!ilt in data#ase s!pport$

    ,lient ser%er architect!re #ene&its$

    Pro%ides simple de#!gging tools$

    St!tes o !li%!tion

    This application can #e %iewed in three distinct states:

    .$ Design

    /$ E"ec!tion

    6$ 8reak

    In design state we can edit !ser inter&ace or add code to the application$ In

    e"ec!tion state the application is r!nning and only a &ew men! commands are

    a%aila#le$ In #reak state the application is halted$

    It can #e #est !nderstood #y comparing it with proced!ral programming$ it

    m!st #e &irst decided how the application sho!ld interact with the !ser$ In other

    words we ha%e to decided how each control reacts to !ser actions s!ch as the

    click o& a mo!se keystrokes and these reactions m!st #e programmed$ )s the

    e%ent ca!sed #y the !ser determines the &low o& applications$

    Page F o& /0

  • 8/13/2019 Desktop Spying Project

    7/24

    DESKTOP SPYING

    UNDERSTANDIN+ THE PRO+RAM MODEL

    In tradition or 7proced!ral9 application itsel& controls which portions o&

    code e"ec!te and in what se1!ence$ E"ec!tion starts with the &irst line o& code and&ollows a prede&ined path thro!gh the application calling proced!re as needed$

    The code doesn+t &ollow a predetermined pathCit e"ec!tes di&&erent code

    sections in response to e%ents$ E%ents can #e triggered #y the !ser+s actions #y

    message &rom the system or other applications or e%en &rom the applications itsel&$

    The se1!ence o& these e%ent determine the se1!ence in which the code e"ec!tes

    th!s the path thro!gh the application+s code di&&ers each time the program r!ns$

    The code can also trigger e%ent d!ring e"ec!tion$ Bor e"ample

    programmatically changing the te"t in the te"t#o" ca!se the te"t #o"+s change

    e%ent to occ!r$ This wo!ld ca!se the code 'i& any* contained in the change e%ent to

    e"ec!te$ I& yo! ass!med that this e%ent wo!ld only #e triggered #y !ser

    interaction we might see !ne"pected res!lts$ It is &or this reason that it is

    important to !nderstand the e%entCdri%en model and keep it in mind when

    designing o!r application$

    Inte#r!te/ Develo$ent Environ$ent

    )pplications are de%eloped in the integrated de%elopment en%ironment'IDE*

    Co$onents !re0

    5en! #ar

    Tool#o" windows display the controls

    Borm windows display the &orm that holds the controls and

    which is !se&!l &or de%eloping the !ser inter&ace$

    Page @ o& /0

  • 8/13/2019 Desktop Spying Project

    8/24

    DESKTOP SPYING

    Properties 3indows has list o& all the properties &or a control$

    Project E"plorer 3indow has list p& all the &orms ad mod!les$

    Standard tool#ar displays the &re1!ently !sed commands in

    the &orm o& mod!les$

    ,ode editor window where code is written$

    Borm (ayo!t 3indow allows to %is!ally position the &orm