Sie sind auf Seite 1von 24

DESKTOP SPYING

1. INTRODUCTION
This project mainly deals with controlling and monitoring the remote system like capt!ring remote desktop image e"ec!ting application in remote systems interacting with remote system Online teaching online de#!gging and remote system sh!tdown in the network$ These acti%ities are %ital &or the administrator to keep track o& %ario!s in&ormation a#o!t the !sers in the network '()N*$ The administrator m!st know the IP address o& the system in the network to make the application work$ In the ser%er application the remote client system+s IP address is speci&ied in the address &ield and the connection is esta#lished #y clicking the connect #!tton$ The administrator m!st know the IP address o& the systems in the network to make the application work$ In the ser%er application the remote client system+s IP address speci&ied in the address &ield and the connection is esta#lished #y clicking the connect #!tton$ In an acti%e connection with client system the administrator can do the &ollowing ,apt!re desktop image -emote application e"ec!tion Import and e"port &iles -emote system (ock

Page . o& /0

DESKTOP SPYING

1.1ABOUT THE PROJECT


The so&tware package is designed to monitor the acti%ities o& any comp!ter system in a local area network$ In a local area network any system can #e con&ig!red as a ser%er or administrator system and thro!gh this administrator system one can %iew the acti%e image which is displayed on the monitor o& any system in the network !pon re1!est &rom the administrator$ The administrator &rom his system can %iew these capt!red images and may record2store &or &!t!re !se$ The so&tware is e1!ipped with %ario!s other !tilities like online teaching remote application e"ec!tion$ 3ith this kind o& &eat!res the so&tware will play a good roll in some ed!cational instit!tes comp!ter la# and on any pri%ate local area network$ This application r!ns in a local network #asically the application connects to the remote client system !sing the IP address$ The administrator m!st know the IP address o& the systems in the network to make the application work$ In the ser%er application the remote client system+s IP address speci&ied in the address &ield and the connection is esta#lished #y clicking the connect #!tton$ Once the connection with the client is esta#lished the administrator can do %ario!s tasks$ The de%elopment is categori4ed into two major types as Ser%er client

Server Version
In this %ersion all the system in the local area network which is connected is display along with their connection stat!s$ Pro%ision to connect to any client system is made !sing the IP address$ )t any time any client can #e connect or disconnected$

Page / o& /0

DESKTOP SPYING

In an acti%e connection with client system the administrator can do the &ollowing ,apt!re desktop image -emote application e"ec!tion Import and e"port &iles -emote system (ock

Client version
In this %ersion o& so&tware the !ser in the client side cannot know the client %ersion so&tware r!nning in the system$ Once the connection will #e esta#lished the client system will #e locked$

MODULES
Desktop capt!ring -emote application e"ec!tion -emote system (ock 5onitor and control the remote comp!ter Import and E"port -DP &iles$

Deskto C! t"rin#
The desktop image capt!ring mod!le capt!res a remote system desktop !pon re1!est &rom the ser%er2administrator$ 3ith the command &rom the ser%er the client capt!res the desktop images #y generating a print screen e%ent$ 3hen the key press e%ent is triggered the system capt!res the c!rrently displayed in&ormation in the monitor and places it in the clip#oard memory o& the client system$ Once the connection will #e esta#lished the ser%er can do all the acti%ities
Page 6 o& /0

DESKTOP SPYING

in the client screen thro!gh the ser%er system$ They need not go the client system &or any acti%ities$ The ne"t e%ent is to con%ert the image in the clip#oard memory into a 7$8mp9 &ile &ormat$ The con%erted #it map image is sa%ed in a speci&ied path$ )&ter the capt!ring and con%ersion o& the image the &ile is trans&erred to the ser%er system and then the &ile is displayed$

Re$ote A

li%!tion E&e%"tion

This mod!le in the serer will display all the application which can #e e"ec!ted in the client system$ 8!t this in&ormation can #e &etched only when the connection #etween the ser%er and the client is esta#lished$ The application along with the path in the client system is displayed and a corresponding command #!tton is displayed$ So the !sers or the administrator can press the command #!tton to r!n the corresponding application in the client system$ The so&tware is designed to ha%e three applications$

Re$ote s'ste$ Lo%k


3ith this mod!le the administrator can connect to the client and check i& the system is #eing !sed #y nay !ser this can done #y capt!ring the desktop image o& the client system$ Once i& the system is &o!nd to #e idle and not !sed #y any !sers then the administrator can lock the remote system &rom his system$ The system lock process is achie%ed #y calling a windows application programmers inter&ace &!nction$

Page 0 o& /0

DESKTOP SPYING

1.( S)STEM CON*I+URATION


ABOUT THE HARD,ARE

Processor Speed -)5 =ard disk ,D -O5 Dri%e Display Key#oard


ABOUT THE SO*T,ARE

: Intel Penti!m I; Processor : .$< G=4 : / G8 : >? G8 : </" ,D -O5 Dri%e : .@9 ,olor 5onitor : Sams!ng .?0 keys

Operating System BrontCend

: 3indows Pro&essional2 3indows AP : $NET

Page < o& /0

DESKTOP SPYING

1.- SO*T,ARE *EATURES


I$ ort!nt *e!t"res
The application is graphical !se inter&ace$ E%ent dri%en programming lang!age where all the acti%ities are triggered #y one e%ent or the other$ D!ick de%elopment o& o#ject #ased window data#ase application with little coding$ 8!ilt in data#ase s!pport$ ,lient ser%er architect!re #ene&its$ Pro%ides simple de#!gging tools$

St!tes o. !

li%!tion

This application can #e %iewed in three distinct states: .$ Design /$ E"ec!tion 6$ 8reak In design state we can edit !ser inter&ace or add code to the application$ In e"ec!tion state the application is r!nning and only a &ew men! commands are a%aila#le$ In #reak state the application is halted$ It can #e #est !nderstood #y comparing it with proced!ral programming$ it m!st #e &irst decided how the application sho!ld interact with the !ser$ In other words we ha%e to decided how each control reacts to !ser actions s!ch as the click o& a mo!seE keystrokes and these reactions m!st #e programmed$ )s the e%ent ca!sed #y the !ser determines the &low o& applications$
Page F o& /0

DESKTOP SPYING

UNDERSTANDIN+ THE PRO+RAM MODEL


In tradition or 7proced!ral9 application itsel& controls which portions o& code e"ec!te and in what se1!ence$ E"ec!tion starts with the &irst line o& code and &ollows a prede&ined path thro!gh the application calling proced!re as needed$ The code doesn+t &ollow a predetermined pathCit e"ec!tes di&&erent code sections in response to e%ents$ E%ents can #e triggered #y the !ser+s actions #y message &rom the system or other applications or e%en &rom the applications itsel&$ The se1!ence o& these e%ent determine the se1!ence in which the code e"ec!tes th!s the path thro!gh the application+s code di&&ers each time the program r!ns$ The code can also trigger e%ent d!ring e"ec!tion$ Bor e"ample programmatically changing the te"t in the te"t#o" ca!se the te"t #o"+s change e%ent to occ!r$ This wo!ld ca!se the code 'i& any* contained in the change e%ent to e"ec!te$ I& yo! ass!med that this e%ent wo!ld only #e triggered #y !ser interaction we might see !ne"pected res!lts$ It is &or this reason that it is important to !nderstand the e%entCdri%en model and keep it in mind when designing o!r application$

Inte#r!te/ Develo $ent Environ$ent


)pplications are de%eloped in the integrated de%elopment en%ironment'IDE* Co$ onents !re0 5en! #ar Tool#o" windows display the controls Borm windows display the &orm that holds the controls and which is !se&!l &or de%eloping the !ser inter&ace$

Page @ o& /0

DESKTOP SPYING

Properties 3indows has list o& all the properties &or a control$ Project E"plorer 3indow has list p& all the &orms ad mod!les$ Standard tool#ar displays the &re1!ently !sed commands in the &orm o& mod!les$ ,ode editor window where code is written$ Borm (ayo!t 3indow allows to %is!ally position the &orm at design time$ ,onte"t 5en! a shortc!t men! with &re1!ently per&ormed actions$ It can #e displayed #y right clicking on the o#ject$ Immediate locals and watch windows these additional windows are pro%ided &or !se in de#!gging yo!r application$ They are only a a%aila#le when yo! are r!nning yo!r application within the IDE$ ,1' to /evelo t1is ! li%!tion0

Yo! don+t need to #e an e"pert !ser o& 5icroso&t 3indows )pplication can #e de%eloped &aster$ It also !sed &or de%eloping prototypes$ Programming #!gs don+t happen as o&tenCand i& they do they are lot easier to detect and &i"$ 3e don+t ha%e to pay m!ch o& per&ormance penalty$

Page > o& /0

DESKTOP SPYING

,INSOC2
Name commonly !sed &or the windows Sockets programming inter&ace !sed to pro%ide a protocolCindependent transport inter&ace$ 3indows ,E s!pports most o& the common 3insock &!nctions$

Page G o& /0

DESKTOP SPYING

(. S)STEM STUD)
(.1 PROPOSED S)STEM
This project designed not only in the aim o& remo%ing the internet and sa%e time$ The main o#jecti%e is &or #etter work to take place$ This application is mostly !sed in colleges schools and organi4ations$ In case o& schools and colleges the master can help and clear the st!dent+s do!#ts in online$ I& any o& the st!dents mis!se the system the master can remotely lock the system$ In case o& organi4ation the manager can monitor the sta&& systems and comm!nicate with sta&& &or get some in&ormation &rom the sta&&+s system$ The manager monitors the sta&& per&ormance and process stat!s o& the sta&&+s works$ Online co!nseling is achie%ed$ The commands can #e e"ec!ted to lock the remote system$ In the same way we can e"ec!te other commands remotely like in internet #rowsing centers they can monitor the systems and re1!est the !sers to a%oid #rowsing restricted wed sites$ I& any system is an idle then those systems can #e remotely locked$ The proposed 7DesktopCspying9 has #een de%eloped with $NET as a &ront end$ This system has #een designed to cater the need o& an organi4ation ed!cational instit!te etc

Page .? o& /0

DESKTOP SPYING

A/v!nt!#es o. ro ose/ s'ste$0


The proposed system has many ad%antages o%er the e"isting man!al system$ Some o& them are as &ollows$ It is %ery !ser &riendly$ It interacts with !ser to get in&ormation and to trans&er the in&ormation$ Since it looks like a windows program$ It does not need any special training$ It is &ast and e&&icient$ It sa%es times and energy to store trans&ers the in&ormation &rom one system to another system$ -emote desktop spying -emote system lock 5onitor and control the remote application Import and e"port -DP &iles Pre%ents illegal !se o& comp!ters in (a#2Ed!cational 8roadcast any instance 5essages2Instr!ctions -emote application e"ec!tion'application r!ns on any selected system thro!gh the network* -emote lock on the local area network$ )ccording to the a#o%e points this system is easy to handle and interact with mod!les and records$
Page .. o& /0

DESKTOP SPYING

-. S)STEM ANAL)SIS
-.1 S)STEM *LO, DIA+RAM
System &low diagram descri#es the data &low &or a data processing system$ It pro%ides a logical diagram o& how the system operates$ It represents the &low o& doc!ments the operations per&ormed in data processing system$ It also re&lects the relationship #etween inp!ts processing and o!tp!ts$ Bollowing are the &eat!res o& system &low diagram: The so!rces &rom which data is generated and de%ice !sed &or this p!rpose$ ;ario!s processing steps in%ol%ed$ The intermediate and &inal o!tp!t prepared and the de%ices !sed &or their storage$

Page ./ o& /0

DESKTOP SPYING

-etrying

Hser

Searching &or the ()N connection


Searching with IP )ddress Is not a%aila#le

Searching in ()N
Is a%aila#le -etrie%ing (ink

,lient Hser Error -eport

Page .6 o& /0

DESKTOP SPYING

-.( DATA *LO, DIA+RAM

Page .0 o& /0

DESKTOP SPYING

System ,on&ig!ration

IP )dd =ost Name -emote (ock


IP )dd ,ommand
IP )dd ,apt!ring System

Image ,apt!re
,apt!re Bile ,on%ert clip#oard data into #mp Print screen e%ent trigger

(ock )pplication 3indow B!nction IP )dd ,ommand

DCspy

Bile Name$8mp

IP )dd ,ommand

IP )dd ,ommand -emote )pp No

Store Bile

5onitor and control the remote system

3in Socket
=ost Name ,hat data

-emote )pplication E"ec!tion E"e Shell ,ommand )ppl Path$ Name

Import and E"port -DP &iles e"

E"e -emote )ppl

,on&ig -emote )ppl

Store Path

Page .< o& /0

DESKTOP SPYING

3. S)STEM DESI+N AND DEVELPOMENT


3.1 INPUT *ORM DESI+N
Inacc!rate inp!t data are the most common ca!se o& errors in data processing$ Error &o!nd at the data entry can #e controlled #y proper inp!t design$ The inp!t %alidations are per&ormed are &ield le%el$ The &ollowing are some constraints !sed in inp!t design: Speci&ying ma"im!m length &or each &ield$ Speci&ying &ormat &or the date &ield$ (isting the domain name &or connection$

T1e in "t is /esi#ne/ 4it1 t1e .ollo4in# o56e%tives .$ To get the highest le%el o& acc!racy$ /$ To ens!re that the inp!t is accepta#le and !nderstanda#le #y the people who are !sing it$ 6$ To prod!ce an e&&ecti%e method$ Desi#ne/ t1e Pro6e%t !%%or/in# to So.t4!re En#ineerin# Prin%i les Birst phase o& any So&tware Project design is to o#tain the -e1!irements &rom the client$ ,lient has gi%en the task o& capt!ring desktop remote lock remote system #asically the desktop spying will capt!re desktop images o& a remote system ha%e the complete in&ormation stored in the ser%er$
Page .F o& /0

DESKTOP SPYING

The second phase o& the project design is Speci&ications$ The so&tware package will prompt the !ser to enter certain in&ormation to make the project work in the re1!irements phase$ The third and important phase is design$ 3e ha%e &!rther di%ided the design process into two phase+s %i4$ )rchitect!ral Design and Detailed Design$ In the architect!ral design the project as a whole is #roken down into components called mod!les$ Detailed design o& each and e%ery screen will #e decided as the project progress$

Page .@ o& /0

DESKTOP SPYING

3.( OUTPUT DESI+N


The design &ollowing windows are designed .$ ) main window with all mod!les links and &or all acti%ities is done$ /$ The re1!ire in&ormation &or this system is o#tained thro!gh !ser interaction with design &orm$ 6$ The o!tp!t is designed and &ramed$ The &inal o!tp!t is designed$ The o#jecti%e o& any in&ormation system is generation o& the &orms$ The o!tp!t pro%ides direct transactions o& in&ormation to the systems !sers and so it is the most in the design phase$ The o!tp!t design sho!ld #e well &ramed and it contains all the re1!ired in&ormation and sho!ld #e well &ormatted a%oiding comple"ity in transact in&ormation &rom the inp!t$ So a lot o& acre has #een while designing the o!tp!t$ The o!tp!t design sho!ld contain all the !ser re1!irements speci&ied in the st!dy phase$

Page .> o& /0

DESKTOP SPYING

7. S)STEM TESTIN+ AND IMPLEMENTAION


S)STEM TESTIN+
System testing is the stage o& implementation which is aimed at ens!ring that the system works acc!rately and e&&iciently$ The system test in implement is a con&irmation that all is correct and an opport!nity to show the !sers that the system woks correctly$ Each mod!le in the system is tested indi%id!ally and these mod!les are p!t together to &orm a s!#system$ The system is also tested and then the s!#system is integrated to &orm the complete system !sing test data the whole system is tested in order to %eri&y that programs link together in the way speci&ied to prod!ce the o!tp!ts speci&ied$ The complete systems are tested to the satis&action o& !ser$ The methodology !sed &or testing the system is topCdown approach$ In this method the test data is &ed to the system and the o!tp!t o#tained res!lts &or %eri&ication are tested$

UNIT TESTIN+
Hnit testing &oc!sed on %eri&ication e&&orts on the smallest !nit o& so&tware design the mod!le$ This is also known as 75od!le Testing9$ The mod!les are tested separately$ This testing is carried o!t d!ring programming stage itsel&$ In these steps each mod!le is &o!nd to #e working satis&actorily as regard to the e"pected o!tp!t &rom the mod!le$

Page .G o& /0

DESKTOP SPYING

T1ere !re .o"r t' es o. test er.or$e/ on $o/"le or ! ro#r!$ "nit $

*UNCTIONAL TEST
The in%ol%es e"ercising the code with nominal inp!t %al!es &or which the e"pected res!lt are known as these tests well as #o!ndary %al!es and other special %al!es$

PER*ORMANCE TEST
These tests determine the amo!nt o& e"ec!tion time spent in %ario!s parts o& the program !nit program thro!gho!t response time and de%ice !tili4ation #y the program !nit$

STRESS TEST
These tests are designed to intentionally #reak the !nit$ These tests are re&erred to as 7#lackC#o"9 testing$

STRUCTURE TEST
These tests are concerned with e"ercising the internal program and tra%ersing partic!lar e"ec!tion paths$ It is re&erred as 7whiteC#o"9 testing$

IMPLEMENTATION
) primary goal o&& so&tware implementation is prod!ction o& so!rce code that is easy to read and !nderstand$ ,larity o& so!rce code eases de#!gging testing and modi&ication and these acti%ities cons!me a large portion o& most so&tware #!dgets$ The goal can #e achie%ed #y making the so!rce code as clear and straight&orward as possi#le$

Page /? o& /0

DESKTOP SPYING

VERI*ICATION
;eri&ication is a &!ndamental concept in so&tware design$ Hnit testing &oc!ses %eri&ication e&&ort on the smallest !nit o& so&tware design the &ield$ This testing was carried o!t d!ring programming stage itsel&$ In the testing step each mod!le is &o!nd #e working satis&actory as regards the e"pected o!tp!t &rom the mod!le$ ) design is %eri&ia#le i& it can #e demonstrated that the design will res!lt in an implementation tat satis&ies the !ser+s re1!irements$

VALIDATION
) %alidation re%iew is an e%al!ation o& a system in terms o& the e"tent to which the system accomplishes stated o#jecti%es and act!al project costs e"ceed initial estimates$ It is !s!ally a re%iew o& major pro#lems that need con%erting and those that s!r&aced d!ring the implementation phase$ The %alidation st!dy #egins with re%iew team which gathers and re%iews &or e%al!ation$ Hne"pected change in the system that a&&ects the !ser or system per&ormance is a primary &actor that prompts system re%iew$ Once re1!est is &ield the !ser is asked how well the system is &!nctioning to speci&ications or how well the meas!red #ene&its #een reali4ed$

Page /. o& /0

DESKTOP SPYING

8. SCOPE *OR *URTHER DEVELOPMENT


The 7DesktopCspying system9 pro%ides the !ser with total o%erall control o& the application$ Since it is de%eloped in $NET it #ecomes a we#C#ased application and m!ltiple !sers can access &rom m!ltiple sites$ The 7DesktopCspying system9 pro%ides easily administrator work can see and g!ide to !nknown others within in the system itsel&$ The 7DesktopCspying system9 pro%ides to trans&er data &rom one into many systems with the help o& (ocal )rea Network$ )nd also in &!t!re make a administrator work thro!gh the internet$

Page // o& /0

DESKTOP SPYING

9. CONCLUSION
The project ga%e me a good e"perience to create my own so&tware$ This project helped me to know new thing in $NET$ In today+s world monitoring the network is a m!st &or a system administrator$ Hsing the system admin can a%oid !sers mis!sing the system$ Nowadays h!man want e%erything to #e done at the desk$ )nd so this project is not an e"ception$ 3ith this the !sed is more #ene&ited and hard task are simple$ In the de%elopment o& the project I was a#le to learn a lot in di&&erent areas like networking handling key#oard e%ents !sing windows )PI call &!nctions !sing win socket controls and learned a lot a#o!t the display system in a comp!ter$

Page /6 o& /0

DESKTOP SPYING

:. BIBLIO+RAPH)
,,,.. NETRE*ERENCE.COM ,,,..NET SCRIPT.COM ;+UIDE TO .NET< A"t1or N!$e0 eter Norton P"5lis1er 0 Te%1$e/i! P"5li%!tions

;MICROSO*T CERTI*IED SOLUTIONS DEVELOPER< A"t1or n!$e0 Ho4!r/ H!41ee P"5lis1er 0 Prenti%e=H!ll o. In/i! Priv!te Li$ite/

;SO*T,ARE EN+INEERIN+ A PRACTIONERS APPROACH< A"t1or N!$e0 Ro#er.S.Press$!n P"5lis1er 0 T!t! M%+r!4 Hill E/ition

;INTRODUCTION TO S)STEM ANAL)SIS AND DESI+N< A"t1or N!$e0 Lee P"5lis1er 0 +!l#oti! Bookso"r%e P"5li%!tions

Page /0 o& /0

Das könnte Ihnen auch gefallen