desktop spying project

Upload: uniq-manju

Post on 03-Jun-2018

239 views

Category:

Documents


1 download

TRANSCRIPT

  • 8/13/2019 Desktop Spying Project

    1/24

    DESKTOP SPYING

    1. INTRODUCTION

    This project mainly deals with controlling and monitoring the remote

    system like capt!ring remote desktop image e"ec!ting application in remote

    systems interacting with remote system Online teaching online de#!gging and

    remote system sh!tdown in the network$ These acti%ities are %ital &or the

    administrator to keep track o& %ario!s in&ormation a#o!t the !sers in the network

    '()N*$

    The administrator m!st know the IP address o& the system in the network to

    make the application work$ In the ser%er application the remote client system+s IP

    address is speci&ied in the address &ield and the connection is esta#lished #y

    clicking the connect #!tton$

    The administrator m!st know the IP address o& the systems in the network

    to make the application work$ In the ser%er application the remote client system+s

    IP address speci&ied in the address &ield and the connection is esta#lished #y

    clicking the connect #!tton$

    In an acti%e connection with client system the administrator can do the

    &ollowing

    ,apt!re desktop image

    -emote application e"ec!tion

    Import and e"port &iles

    -emote system (ock

    Page . o& /0

  • 8/13/2019 Desktop Spying Project

    2/24

    DESKTOP SPYING

    1.1ABOUT THE PROJECT

    The so&tware package is designed to monitor the acti%ities o& any comp!ter

    system in a local area network$ In a local area network any system can #e

    con&ig!red as a ser%er or administrator system and thro!gh this administrator

    system one can %iew the acti%e image which is displayed on the monitor o& any

    system in the network !pon re1!est &rom the administrator$ The administrator

    &rom his system can %iew these capt!red images and may record2store &or &!t!re

    !se$ The so&tware is e1!ipped with %ario!s other !tilities like online teaching

    remote application e"ec!tion$ 3ith this kind o& &eat!res the so&tware will play a

    good roll in some ed!cational instit!tes comp!ter la# and on any pri%ate local

    area network$

    This application r!ns in a local network #asically the application connects

    to the remote client system !sing the IP address$ The administrator m!st know the

    IP address o& the systems in the network to make the application work$ In the

    ser%er application the remote client system+s IP address speci&ied in the address

    &ield and the connection is esta#lished #y clicking the connect #!tton$ Once the

    connection with the client is esta#lished the administrator can do %ario!s tasks$

    The de%elopment is categori4ed into two major types as

    Ser%er

    client

    Server Version

    In this %ersion all the system in the local area network which is connected is

    display along with their connection stat!s$ Pro%ision to connect to any client

    system is made !sing the IP address$ )t any time any client can #e connect or

    disconnected$

    Page / o& /0

  • 8/13/2019 Desktop Spying Project

    3/24

    DESKTOP SPYING

    In an acti%e connection with client system the administrator can do the

    &ollowing

    ,apt!re desktop image

    -emote application e"ec!tion

    Import and e"port &iles

    -emote system (ock

    Client version

    In this %ersion o& so&tware the !ser in the client side cannot know the client

    %ersion so&tware r!nning in the system$ Once the connection will #e esta#lished

    the client system will #e locked$

    MODULES

    Desktop capt!ring

    -emote application e"ec!tion

    -emote system (ock

    5onitor and control the remote comp!ter

    Import and E"port -DP &iles$

    Deskto C!t"rin#

    The desktop image capt!ring mod!le capt!res a remote system desktop

    !pon re1!est &rom the ser%er2administrator$ 3ith the command &rom the ser%er the

    client capt!res the desktop images #y generating a print screen e%ent$ 3hen the

    key press e%ent is triggered the system capt!res the c!rrently displayed

    in&ormation in the monitor and places it in the clip#oard memory o& the client

    system$ Once the connection will #e esta#lished the ser%er can do all the acti%ities

    Page 6 o& /0

  • 8/13/2019 Desktop Spying Project

    4/24

    DESKTOP SPYING

    in the client screen thro!gh the ser%er system$ They need not go the client system

    &or any acti%ities$

    The ne"t e%ent is to con%ert the image in the clip#oard memory into a7$8mp9 &ile &ormat$ The con%erted #it map image is sa%ed in a speci&ied path$

    )&ter the capt!ring and con%ersion o& the image the &ile is trans&erred to the ser%er

    system and then the &ile is displayed$

    Re$ote Ali%!tion E&e%"tion

    This mod!le in the serer will display all the application which can #e

    e"ec!ted in the client system$ 8!t this in&ormation can #e &etched only when the

    connection #etween the ser%er and the client is esta#lished$ The application along

    with the path in the client system is displayed and a corresponding command

    #!tton is displayed$ So the !sers or the administrator can press the command

    #!tton to r!n the corresponding application in the client system$ The so&tware is

    designed to ha%e three applications$

    Re$ote s'ste$ Lo%k

    3ith this mod!le the administrator can connect to the client and check i&

    the system is #eing !sed #y nay !ser this can done #y capt!ring the desktop image

    o& the client system$ Once i& the system is &o!nd to #e idle and not !sed #y any

    !sers then the administrator can lock the remote system &rom his system$ The

    system lock process is achie%ed #y calling a windows application programmers

    inter&ace &!nction$

    Page 0 o& /0

  • 8/13/2019 Desktop Spying Project

    5/24

    DESKTOP SPYING

    1.( S)STEM CON*I+URATION

    ABOUT THE HARD,ARE

    Processor : Intel Penti!m I; Processor

    Speed : .$< G=4

    -)5 : / G8

    =ard disk : >? G8

    ,D -O5 Dri%e :

  • 8/13/2019 Desktop Spying Project

    6/24

    DESKTOP SPYING

    1.-SO*T,ARE *EATURES

    I$ort!nt *e!t"res

    The application is graphical !se inter&ace$

    E%ent dri%en programming lang!age where all the acti%ities are

    triggered #y one e%ent or the other$

    !ick de%elopment o& o#ject #ased window data#ase application

    with little coding$

    8!ilt in data#ase s!pport$

    ,lient ser%er architect!re #ene&its$

    Pro%ides simple de#!gging tools$

    St!tes o !li%!tion

    This application can #e %iewed in three distinct states:

    .$ Design

    /$ E"ec!tion

    6$ 8reak

    In design state we can edit !ser inter&ace or add code to the application$ In

    e"ec!tion state the application is r!nning and only a &ew men! commands are

    a%aila#le$ In #reak state the application is halted$

    It can #e #est !nderstood #y comparing it with proced!ral programming$ it

    m!st #e &irst decided how the application sho!ld interact with the !ser$ In other

    words we ha%e to decided how each control reacts to !ser actions s!ch as the

    click o& a mo!se keystrokes and these reactions m!st #e programmed$ )s the

    e%ent ca!sed #y the !ser determines the &low o& applications$

    Page F o& /0

  • 8/13/2019 Desktop Spying Project

    7/24

    DESKTOP SPYING

    UNDERSTANDIN+ THE PRO+RAM MODEL

    In tradition or 7proced!ral9 application itsel& controls which portions o&

    code e"ec!te and in what se1!ence$ E"ec!tion starts with the &irst line o& code and&ollows a prede&ined path thro!gh the application calling proced!re as needed$

    The code doesn+t &ollow a predetermined pathCit e"ec!tes di&&erent code

    sections in response to e%ents$ E%ents can #e triggered #y the !ser+s actions #y

    message &rom the system or other applications or e%en &rom the applications itsel&$

    The se1!ence o& these e%ent determine the se1!ence in which the code e"ec!tes

    th!s the path thro!gh the application+s code di&&ers each time the program r!ns$

    The code can also trigger e%ent d!ring e"ec!tion$ Bor e"ample

    programmatically changing the te"t in the te"t#o" ca!se the te"t #o"+s change

    e%ent to occ!r$ This wo!ld ca!se the code 'i& any* contained in the change e%ent to

    e"ec!te$ I& yo! ass!med that this e%ent wo!ld only #e triggered #y !ser

    interaction we might see !ne"pected res!lts$ It is &or this reason that it is

    important to !nderstand the e%entCdri%en model and keep it in mind when

    designing o!r application$

    Inte#r!te/ Develo$ent Environ$ent

    )pplications are de%eloped in the integrated de%elopment en%ironment'IDE*

    Co$onents !re0

    5en! #ar

    Tool#o" windows display the controls

    Borm windows display the &orm that holds the controls and

    which is !se&!l &or de%eloping the !ser inter&ace$

    Page @ o& /0

  • 8/13/2019 Desktop Spying Project

    8/24

    DESKTOP SPYING

    Properties 3indows has list o& all the properties &or a control$

    Project E"plorer 3indow has list p& all the &orms ad mod!les$

    Standard tool#ar displays the &re1!ently !sed commands in

    the &orm o& mod!les$

    ,ode editor window where code is written$

    Borm (ayo!t 3indow allows to %is!ally position the &orm at

    design time$

    ,onte"t 5en! a shortc!t men! with &re1!ently per&ormed

    actions$

    It can #e displayed #y right clicking on the o#ject$ Immediate locals and

    watch windows these additional windows are pro%ided &or !se in de#!gging

    yo!r application$ They are only a a%aila#le when yo! are r!nning yo!r

    application within the IDE$

    ,' to /evelo tis !li%!tion0

    Yo! don+t need to #e an e"pert !ser o& 5icroso&t 3indows

    )pplication can #e de%eloped &aster$

    It also !sed &or de%eloping prototypes$

    Programming #!gs don+t happen as o&tenCand i& they do they

    are lot easier to detect and &i"$

    3e don+t ha%e to pay m!ch o& per&ormance penalty$

    Page > o& /0

  • 8/13/2019 Desktop Spying Project

    9/24

    DESKTOP SPYING

    ,INSOC2

    Name commonly !sed &or the windows Sockets programming inter&ace

    !sed to pro%ide a protocolCindependent transport inter&ace$ 3indows ,E s!pports

    most o& the common 3insock &!nctions$

    Page o& /0

  • 8/13/2019 Desktop Spying Project

    10/24

    DESKTOP SPYING

    (.S)STEM STUD)

    (.1 PROPOSED S)STEM

    This project designed not only in the aim o& remo%ing the internet and sa%e

    time$ The main o#jecti%e is &or #etter work to take place$

    This application is mostly !sed in colleges schools and organi4ations$ In

    case o& schools and colleges the master can help and clear the st!dent+s do!#ts in

    online$ I& any o& the st!dents mis!se the system the master can remotely lock the

    system$ In case o& organi4ation the manager can monitor the sta&& systems and

    comm!nicate with sta&& &or get some in&ormation &rom the sta&&+s system$

    The manager monitors the sta&& per&ormance and process stat!s o& the

    sta&&+s works$ Online co!nseling is achie%ed$ The commands can #e e"ec!ted to

    lock the remote system$

    In the same way we can e"ec!te other commands remotely like in internet

    #rowsing centers they can monitor the systems and re1!est the !sers to a%oid

    #rowsing restricted wed sites$ I& any system is an idle then those systems can #e

    remotely locked$

    The proposed 7DesktopCspying9 has #een de%eloped with $NET as a &ront

    end$ This system has #een designed to cater the need o& an organi4ation

    ed!cational instit!te etc

    Page .? o& /0

  • 8/13/2019 Desktop Spying Project

    11/24

    DESKTOP SPYING

    A/v!nt!#es o roose/ s'ste$0

    The proposed system has many ad%antages o%er the e"isting man!al

    system$ Some o& them are as &ollows$

    It is %ery !ser &riendly$

    It interacts with !ser to get in&ormation and to trans&er the

    in&ormation$

    Since it looks like a windows program$ It does not need any

    special training$

    It is &ast and e&&icient$ It sa%es times and energy to store

    trans&ers the in&ormation &rom one system to another system$

    -emote desktop spying

    -emote system lock

    5onitor and control the remote application

    Import and e"port -DP &iles

    Pre%ents illegal !se o& comp!ters in (a#2Ed!cational

    8roadcast any instance 5essages2Instr!ctions

    -emote application e"ec!tion'application r!ns on any

    selected system thro!gh the network*

    -emote lock on the local area network$

    )ccording to the a#o%e points this system is easy to handle and interact with

    mod!les and records$

    Page .. o& /0

  • 8/13/2019 Desktop Spying Project

    12/24

    DESKTOP SPYING

    -. S)STEM ANAL)SIS

    -.1 S)STEM *LO, DIA+RAM

    System &low diagram descri#es the data &low &or a data processing system$

    It pro%ides a logical diagram o& how the system operates$ It represents the &low o&

    doc!ments the operations per&ormed in data processing system$ It also re&lects the

    relationship #etween inp!ts processing and o!tp!ts$

    Bollowing are the &eat!res o& system &low diagram:

    The so!rces &rom which data is generated and de%ice !sed &or

    this p!rpose$

    ;ario!s processing steps in%ol%ed$

    The intermediate and &inal o!tp!t prepared and the de%ices

    !sed &or their storage$

    Page ./ o& /0

  • 8/13/2019 Desktop Spying Project

    13/24

    DESKTOP SPYING

    -etrying

    Searching with IP )ddress

    Is not a%aila#le

    Is a%aila#le -etrie%ing (ink

    Page .6 o& /0

    Hser

    Searching &or the

    ()N connection

    Searching in ()N

    ,lient Hser

    Error -eport

  • 8/13/2019 Desktop Spying Project

    14/24

    DESKTOP SPYING

    -.( DATA *LO, DIA+RAM

    Page .0 o& /0

  • 8/13/2019 Desktop Spying Project

    15/24

    DESKTOP SPYING

    Page .< o& /0

    =ost Name

    ,hat data

    IP )dd ,ommand

    IP )dd ,ommandIP )dd ,ommand

    (ock )pplication 3indow B!nction

    )ppl Path$

    Name

    IP )dd ,ommand-emote )pp No

    Bile Name$8mp

    ,apt!reBile

    IP )dd ,apt!ringSystem

    IP )dd =ost Name

    DCspy

    Image ,apt!re

    Print

    screene%enttrigger

    ,on%ert

    clip#oarddata into

    #mp

    System ,on&ig!ration

    -emote (ock

    5onitor andcontrol the remote

    system

    3in Socket -emote )pplication

    E"ec!tion

    Store

    Bile

    E"e Shell ,omm

    Stor

    Path

    ,on&ig -emote )ppl

    E"e -emote )ppImport and E"port -DP

    &ilese"

  • 8/13/2019 Desktop Spying Project

    16/24

    DESKTOP SPYING

    3. S)STEM DESI+N AND DEVELPOMENT

    3.1 INPUT *ORM DESI+N

    Inacc!rate inp!t data are the most common ca!se o& errors in data

    processing$ Error &o!nd at the data entry can #e controlled #y proper inp!t design$

    The inp!t %alidations are per&ormed are &ield le%el$ The &ollowing are some

    constraints !sed in inp!t design:

    Speci&ying ma"im!m length &or each &ield$

    Speci&ying &ormat &or the date &ield$

    (isting the domain name &or connection$

    Te in"t is /esi#ne/ 4it te ollo4in# o56e%tives

    .$ To get the highest le%el o& acc!racy$

    /$ To ens!re that the inp!t is accepta#le and !nderstanda#le #y

    the people who are !sing it$

    6$ To prod!ce an e&&ecti%e method$

    Desi#ne/ te Pro6e%t !%%or/in# to Sot4!re En#ineerin# Prin%iles

    Birst phase o& any So&tware Project design is to o#tain the -e1!irements

    &rom the client$

    ,lient has gi%en the task o& capt!ring desktop remote lock remote

    system #asically the desktop spying will capt!re desktop images o& a

    remote system ha%e the complete in&ormation stored in the ser%er$

    Page .F o& /0

  • 8/13/2019 Desktop Spying Project

    17/24

    DESKTOP SPYING

    The second phase o& the project design is Speci&ications$

    The so&tware package will prompt the !ser to enter certain

    in&ormation to make the project work in the re1!irements phase$

    The third and important phase is design$ 3e ha%e &!rther di%ided the design

    process into two phase+s %i4$ )rchitect!ral Design and Detailed Design$

    In the architect!ral design the project as a whole is #roken down into

    components called mod!les$

    Detailed design o& each and e%ery screen will #e decided as the project

    progress$

    Page .@ o& /0

  • 8/13/2019 Desktop Spying Project

    18/24

    DESKTOP SPYING

    3.(OUTPUT DESI+N

    The design &ollowing windows are designed

    .$ ) main window with all mod!les links and &or all acti%ities is

    done$

    /$ The re1!ire in&ormation &or this system is o#tained thro!gh

    !ser interaction with design &orm$

    6$ The o!tp!t is designed and &ramed$

    The &inal o!tp!t is designed$ The o#jecti%e o& any in&ormation system is

    generation o& the &orms$ The o!tp!t pro%ides direct transactions o& in&ormation to

    the systems !sers and so it is the most in the design phase$

    The o!tp!t design sho!ld #e well &ramed and it contains all the re1!ired

    in&ormation and sho!ld #e well &ormatted a%oiding comple"ity in transact

    in&ormation &rom the inp!t$ So a lot o& acre has #een while designing the o!tp!t$

    The o!tp!t design sho!ld contain all the !ser re1!irements speci&ied in the st!dyphase$

    Page .> o& /0

  • 8/13/2019 Desktop Spying Project

    19/24

    DESKTOP SPYING

    7. S)STEM TESTIN+ AND IMPLEMENTAION

    S)STEM TESTIN+

    System testing is the stage o& implementation which is aimed at ens!ring

    that the system works acc!rately and e&&iciently$ The system test in implement is a

    con&irmation that all is correct and an opport!nity to show the !sers that the

    system woks correctly$

    Each mod!le in the system is tested indi%id!ally and these mod!les are p!t

    together to &orm a s!#system$ The system is also tested and then the s!#system is

    integrated to &orm the complete system !sing test data the whole system is tested

    in order to %eri&y that programs link together in the way speci&ied to prod!ce the

    o!tp!ts speci&ied$ The complete systems are tested to the satis&action o& !ser$

    The methodology !sed &or testing the system is topCdown approach$ In this

    method the test data is &ed to the system and the o!tp!t o#tained res!lts &or

    %eri&ication are tested$

    UNIT TESTIN+

    Hnit testing &oc!sed on %eri&ication e&&orts on the smallest !nit o& so&tware

    design the mod!le$ This is also known as 75od!le Testing9$ The mod!les are

    tested separately$ This testing is carried o!t d!ring programming stage itsel&$ In

    these steps each mod!le is &o!nd to #e working satis&actorily as regard to the

    e"pected o!tp!t &rom the mod!le$

    Page . o& /0

  • 8/13/2019 Desktop Spying Project

    20/24

    DESKTOP SPYING

    Tere !re o"r t'es o test eror$e/ on $o/"le or ! ro#r!$ "nit$

    *UNCTIONAL TEST

    The in%ol%es e"ercising the code with nominal inp!t %al!es &or which thee"pected res!lt are known as these tests well as #o!ndary %al!es and other special

    %al!es$

    PER*ORMANCE TEST

    These tests determine the amo!nt o& e"ec!tion time spent in %ario!s parts

    o& the program !nit program thro!gho!t response time and de%ice !tili4ation #y

    the program !nit$

    STRESS TEST

    These tests are designed to intentionally #reak the !nit$ These tests are

    re&erred to as 7#lackC#o"9 testing$

    STRUCTURE TEST

    These tests are concerned with e"ercising the internal program and

    tra%ersing partic!lar e"ec!tion paths$ It is re&erred as 7whiteC#o"9 testing$

    IMPLEMENTATION

    ) primary goal o&& so&tware implementation is prod!ction o& so!rce code

    that is easy to read and !nderstand$ ,larity o& so!rce code eases de#!gging testing

    and modi&ication and these acti%ities cons!me a large portion o& most so&tware#!dgets$ The goal can #e achie%ed #y making the so!rce code as clear and

    straight&orward as possi#le$

    Page /? o& /0

  • 8/13/2019 Desktop Spying Project

    21/24

    DESKTOP SPYING

    VERI*ICATION

    ;eri&ication is a &!ndamental concept in so&tware design$ Hnit testing

    &oc!ses %eri&ication e&&ort on the smallest !nit o& so&tware design the &ield$ This

    testing was carried o!t d!ring programming stage itsel&$ In the testing step each

    mod!le is &o!nd #e working satis&actory as regards the e"pected o!tp!t &rom the

    mod!le$ ) design is %eri&ia#le i& it can #e demonstrated that the design will res!lt

    in an implementation tat satis&ies the !ser+s re1!irements$

    VALIDATION

    ) %alidation re%iew is an e%al!ation o& a system in terms o& the e"tent to

    which the system accomplishes stated o#jecti%es and act!al project costs e"ceed

    initial estimates$ It is !s!ally a re%iew o& major pro#lems that need con%erting and

    those that s!r&aced d!ring the implementation phase$ The %alidation st!dy #egins

    with re%iew team which gathers and re%iews &or e%al!ation$

    Hne"pected change in the system that a&&ects the !ser or system

    per&ormance is a primary &actor that prompts system re%iew$ Once re1!est is &ield

    the !ser is asked how well the system is &!nctioning to speci&ications or how well

    the meas!red #ene&its #een reali4ed$

    Page /. o& /0

  • 8/13/2019 Desktop Spying Project

    22/24

    DESKTOP SPYING

    8. SCOPE *OR *URTHER DEVELOPMENT

    The 7DesktopCspying system9 pro%ides the !ser with total o%erall control o&

    the application$

    Since it is de%eloped in $NET it #ecomes a we#C#ased application and

    m!ltiple !sers can access &rom m!ltiple sites$ The 7DesktopCspying system9

    pro%ides easily administrator work can see and g!ide to !nknown others within in

    the system itsel&$

    The 7DesktopCspying system9 pro%ides to trans&er data &rom one into many

    systems with the help o& (ocal )rea Network$ )nd also in &!t!re make a

    administrator work thro!gh the internet$

    Page // o& /0

  • 8/13/2019 Desktop Spying Project

    23/24

    DESKTOP SPYING

    9. CONCLUSION

    The project ga%e me a good e"perience to create my own so&tware$ This

    project helped me to know new thing in $NET$

    In today+s world monitoring the network is a m!st &or a system

    administrator$ Hsing the system admin can a%oid !sers mis!sing the system$

    Nowadays h!man want e%erything to #e done at the desk$ )nd so this project is

    not an e"ception$ 3ith this the !sed is more #ene&ited and hard task are simple$

    In the de%elopment o& the project I was a#le to learn a lot in di&&erent areas

    like networking handling key#oard e%ents !sing windows )PI call &!nctions

    !sing win socket controls and learned a lot a#o!t the display system in a comp!ter$

    Page /6 o& /0

  • 8/13/2019 Desktop Spying Project

    24/24

    DESKTOP SPYING

    :. BIBLIO+RAPH)

    ,,,.. NETRE*ERENCE.COM

    ,,,..NET SCRIPT.COM

    ;+UIDE TO .NET