Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
This project mainly deals with controlling and monitoring the remote system like capt!ring remote desktop image e"ec!ting application in remote systems interacting with remote system Online teaching online de#!gging and remote system sh!tdown in the network$ These acti%ities are %ital &or the administrator to keep track o& %ario!s in&ormation a#o!t the !sers in the network '()N*$ The administrator m!st know the IP address o& the system in the network to make the application work$ In the ser%er application the remote client system+s IP address is speci&ied in the address &ield and the connection is esta#lished #y clicking the connect #!tton$ The administrator m!st know the IP address o& the systems in the network to make the application work$ In the ser%er application the remote client system+s IP address speci&ied in the address &ield and the connection is esta#lished #y clicking the connect #!tton$ In an acti%e connection with client system the administrator can do the &ollowing ,apt!re desktop image -emote application e"ec!tion Import and e"port &iles -emote system (ock
Page . o& /0
DESKTOP SPYING
Server Version
In this %ersion all the system in the local area network which is connected is display along with their connection stat!s$ Pro%ision to connect to any client system is made !sing the IP address$ )t any time any client can #e connect or disconnected$
Page / o& /0
DESKTOP SPYING
In an acti%e connection with client system the administrator can do the &ollowing ,apt!re desktop image -emote application e"ec!tion Import and e"port &iles -emote system (ock
Client version
In this %ersion o& so&tware the !ser in the client side cannot know the client %ersion so&tware r!nning in the system$ Once the connection will #e esta#lished the client system will #e locked$
MODULES
Desktop capt!ring -emote application e"ec!tion -emote system (ock 5onitor and control the remote comp!ter Import and E"port -DP &iles$
Deskto C! t"rin#
The desktop image capt!ring mod!le capt!res a remote system desktop !pon re1!est &rom the ser%er2administrator$ 3ith the command &rom the ser%er the client capt!res the desktop images #y generating a print screen e%ent$ 3hen the key press e%ent is triggered the system capt!res the c!rrently displayed in&ormation in the monitor and places it in the clip#oard memory o& the client system$ Once the connection will #e esta#lished the ser%er can do all the acti%ities
Page 6 o& /0
DESKTOP SPYING
in the client screen thro!gh the ser%er system$ They need not go the client system &or any acti%ities$ The ne"t e%ent is to con%ert the image in the clip#oard memory into a 7$8mp9 &ile &ormat$ The con%erted #it map image is sa%ed in a speci&ied path$ )&ter the capt!ring and con%ersion o& the image the &ile is trans&erred to the ser%er system and then the &ile is displayed$
Re$ote A
li%!tion E&e%"tion
This mod!le in the serer will display all the application which can #e e"ec!ted in the client system$ 8!t this in&ormation can #e &etched only when the connection #etween the ser%er and the client is esta#lished$ The application along with the path in the client system is displayed and a corresponding command #!tton is displayed$ So the !sers or the administrator can press the command #!tton to r!n the corresponding application in the client system$ The so&tware is designed to ha%e three applications$
Page 0 o& /0
DESKTOP SPYING
: Intel Penti!m I; Processor : .$< G=4 : / G8 : >? G8 : </" ,D -O5 Dri%e : .@9 ,olor 5onitor : Sams!ng .?0 keys
DESKTOP SPYING
St!tes o. !
li%!tion
This application can #e %iewed in three distinct states: .$ Design /$ E"ec!tion 6$ 8reak In design state we can edit !ser inter&ace or add code to the application$ In e"ec!tion state the application is r!nning and only a &ew men! commands are a%aila#le$ In #reak state the application is halted$ It can #e #est !nderstood #y comparing it with proced!ral programming$ it m!st #e &irst decided how the application sho!ld interact with the !ser$ In other words we ha%e to decided how each control reacts to !ser actions s!ch as the click o& a mo!seE keystrokes and these reactions m!st #e programmed$ )s the e%ent ca!sed #y the !ser determines the &low o& applications$
Page F o& /0
DESKTOP SPYING
Page @ o& /0
DESKTOP SPYING
Properties 3indows has list o& all the properties &or a control$ Project E"plorer 3indow has list p& all the &orms ad mod!les$ Standard tool#ar displays the &re1!ently !sed commands in the &orm o& mod!les$ ,ode editor window where code is written$ Borm (ayo!t 3indow allows to %is!ally position the &orm at design time$ ,onte"t 5en! a shortc!t men! with &re1!ently per&ormed actions$ It can #e displayed #y right clicking on the o#ject$ Immediate locals and watch windows these additional windows are pro%ided &or !se in de#!gging yo!r application$ They are only a a%aila#le when yo! are r!nning yo!r application within the IDE$ ,1' to /evelo t1is ! li%!tion0
Yo! don+t need to #e an e"pert !ser o& 5icroso&t 3indows )pplication can #e de%eloped &aster$ It also !sed &or de%eloping prototypes$ Programming #!gs don+t happen as o&tenCand i& they do they are lot easier to detect and &i"$ 3e don+t ha%e to pay m!ch o& per&ormance penalty$
DESKTOP SPYING
,INSOC2
Name commonly !sed &or the windows Sockets programming inter&ace !sed to pro%ide a protocolCindependent transport inter&ace$ 3indows ,E s!pports most o& the common 3insock &!nctions$
Page G o& /0
DESKTOP SPYING
(. S)STEM STUD)
(.1 PROPOSED S)STEM
This project designed not only in the aim o& remo%ing the internet and sa%e time$ The main o#jecti%e is &or #etter work to take place$ This application is mostly !sed in colleges schools and organi4ations$ In case o& schools and colleges the master can help and clear the st!dent+s do!#ts in online$ I& any o& the st!dents mis!se the system the master can remotely lock the system$ In case o& organi4ation the manager can monitor the sta&& systems and comm!nicate with sta&& &or get some in&ormation &rom the sta&&+s system$ The manager monitors the sta&& per&ormance and process stat!s o& the sta&&+s works$ Online co!nseling is achie%ed$ The commands can #e e"ec!ted to lock the remote system$ In the same way we can e"ec!te other commands remotely like in internet #rowsing centers they can monitor the systems and re1!est the !sers to a%oid #rowsing restricted wed sites$ I& any system is an idle then those systems can #e remotely locked$ The proposed 7DesktopCspying9 has #een de%eloped with $NET as a &ront end$ This system has #een designed to cater the need o& an organi4ation ed!cational instit!te etc
Page .? o& /0
DESKTOP SPYING
DESKTOP SPYING
-. S)STEM ANAL)SIS
-.1 S)STEM *LO, DIA+RAM
System &low diagram descri#es the data &low &or a data processing system$ It pro%ides a logical diagram o& how the system operates$ It represents the &low o& doc!ments the operations per&ormed in data processing system$ It also re&lects the relationship #etween inp!ts processing and o!tp!ts$ Bollowing are the &eat!res o& system &low diagram: The so!rces &rom which data is generated and de%ice !sed &or this p!rpose$ ;ario!s processing steps in%ol%ed$ The intermediate and &inal o!tp!t prepared and the de%ices !sed &or their storage$
Page ./ o& /0
DESKTOP SPYING
-etrying
Hser
Searching in ()N
Is a%aila#le -etrie%ing (ink
Page .6 o& /0
DESKTOP SPYING
Page .0 o& /0
DESKTOP SPYING
System ,on&ig!ration
Image ,apt!re
,apt!re Bile ,on%ert clip#oard data into #mp Print screen e%ent trigger
DCspy
Bile Name$8mp
IP )dd ,ommand
Store Bile
3in Socket
=ost Name ,hat data
Store Path
DESKTOP SPYING
T1e in "t is /esi#ne/ 4it1 t1e .ollo4in# o56e%tives .$ To get the highest le%el o& acc!racy$ /$ To ens!re that the inp!t is accepta#le and !nderstanda#le #y the people who are !sing it$ 6$ To prod!ce an e&&ecti%e method$ Desi#ne/ t1e Pro6e%t !%%or/in# to So.t4!re En#ineerin# Prin%i les Birst phase o& any So&tware Project design is to o#tain the -e1!irements &rom the client$ ,lient has gi%en the task o& capt!ring desktop remote lock remote system #asically the desktop spying will capt!re desktop images o& a remote system ha%e the complete in&ormation stored in the ser%er$
Page .F o& /0
DESKTOP SPYING
The second phase o& the project design is Speci&ications$ The so&tware package will prompt the !ser to enter certain in&ormation to make the project work in the re1!irements phase$ The third and important phase is design$ 3e ha%e &!rther di%ided the design process into two phase+s %i4$ )rchitect!ral Design and Detailed Design$ In the architect!ral design the project as a whole is #roken down into components called mod!les$ Detailed design o& each and e%ery screen will #e decided as the project progress$
Page .@ o& /0
DESKTOP SPYING
DESKTOP SPYING
UNIT TESTIN+
Hnit testing &oc!sed on %eri&ication e&&orts on the smallest !nit o& so&tware design the mod!le$ This is also known as 75od!le Testing9$ The mod!les are tested separately$ This testing is carried o!t d!ring programming stage itsel&$ In these steps each mod!le is &o!nd to #e working satis&actorily as regard to the e"pected o!tp!t &rom the mod!le$
Page .G o& /0
DESKTOP SPYING
*UNCTIONAL TEST
The in%ol%es e"ercising the code with nominal inp!t %al!es &or which the e"pected res!lt are known as these tests well as #o!ndary %al!es and other special %al!es$
PER*ORMANCE TEST
These tests determine the amo!nt o& e"ec!tion time spent in %ario!s parts o& the program !nit program thro!gho!t response time and de%ice !tili4ation #y the program !nit$
STRESS TEST
These tests are designed to intentionally #reak the !nit$ These tests are re&erred to as 7#lackC#o"9 testing$
STRUCTURE TEST
These tests are concerned with e"ercising the internal program and tra%ersing partic!lar e"ec!tion paths$ It is re&erred as 7whiteC#o"9 testing$
IMPLEMENTATION
) primary goal o&& so&tware implementation is prod!ction o& so!rce code that is easy to read and !nderstand$ ,larity o& so!rce code eases de#!gging testing and modi&ication and these acti%ities cons!me a large portion o& most so&tware #!dgets$ The goal can #e achie%ed #y making the so!rce code as clear and straight&orward as possi#le$
Page /? o& /0
DESKTOP SPYING
VERI*ICATION
;eri&ication is a &!ndamental concept in so&tware design$ Hnit testing &oc!ses %eri&ication e&&ort on the smallest !nit o& so&tware design the &ield$ This testing was carried o!t d!ring programming stage itsel&$ In the testing step each mod!le is &o!nd #e working satis&actory as regards the e"pected o!tp!t &rom the mod!le$ ) design is %eri&ia#le i& it can #e demonstrated that the design will res!lt in an implementation tat satis&ies the !ser+s re1!irements$
VALIDATION
) %alidation re%iew is an e%al!ation o& a system in terms o& the e"tent to which the system accomplishes stated o#jecti%es and act!al project costs e"ceed initial estimates$ It is !s!ally a re%iew o& major pro#lems that need con%erting and those that s!r&aced d!ring the implementation phase$ The %alidation st!dy #egins with re%iew team which gathers and re%iews &or e%al!ation$ Hne"pected change in the system that a&&ects the !ser or system per&ormance is a primary &actor that prompts system re%iew$ Once re1!est is &ield the !ser is asked how well the system is &!nctioning to speci&ications or how well the meas!red #ene&its #een reali4ed$
Page /. o& /0
DESKTOP SPYING
Page // o& /0
DESKTOP SPYING
9. CONCLUSION
The project ga%e me a good e"perience to create my own so&tware$ This project helped me to know new thing in $NET$ In today+s world monitoring the network is a m!st &or a system administrator$ Hsing the system admin can a%oid !sers mis!sing the system$ Nowadays h!man want e%erything to #e done at the desk$ )nd so this project is not an e"ception$ 3ith this the !sed is more #ene&ited and hard task are simple$ In the de%elopment o& the project I was a#le to learn a lot in di&&erent areas like networking handling key#oard e%ents !sing windows )PI call &!nctions !sing win socket controls and learned a lot a#o!t the display system in a comp!ter$
Page /6 o& /0
DESKTOP SPYING
:. BIBLIO+RAPH)
,,,.. NETRE*ERENCE.COM ,,,..NET SCRIPT.COM ;+UIDE TO .NET< A"t1or N!$e0 eter Norton P"5lis1er 0 Te%1$e/i! P"5li%!tions
;MICROSO*T CERTI*IED SOLUTIONS DEVELOPER< A"t1or n!$e0 Ho4!r/ H!41ee P"5lis1er 0 Prenti%e=H!ll o. In/i! Priv!te Li$ite/
;SO*T,ARE EN+INEERIN+ A PRACTIONERS APPROACH< A"t1or N!$e0 Ro#er.S.Press$!n P"5lis1er 0 T!t! M%+r!4 Hill E/ition
;INTRODUCTION TO S)STEM ANAL)SIS AND DESI+N< A"t1or N!$e0 Lee P"5lis1er 0 +!l#oti! Bookso"r%e P"5li%!tions
Page /0 o& /0