Professional Documents
Culture Documents
Desktop Spy is used to lock remote desktop so that it prevents unauthorized users
accessing the information. Once system acts as a client and other system acts as server.
This is similar to data transfer. From server the commands are sent to lock client system.
Once the command is received locking operation is performed on client desktop. Client
window is deactivated. No action can be performed this side. Server need to send
command to unlock the remote system. Once the data is received client desktop is
released and task is performed. And application is used to remote desktop shutdown and
opens the internet explorer. This project is deals managing in controlling network client
system.
1.1ABSTRACT
With Multicast Server, you can connect to your work computer from home and access all
of your programs, files, and network resources as though you were actually sitting in
front of your computer at work.
Multicast Server Connection, available for most 32-bit versions of Windows including
Windows Mobile and Apple's Mac OS X, that allows a user to connect to a server
running Terminal Services. On Windows, both Terminal Services client and Multicast
Server Protocol use TCP port 3389 by default. It also includes a control to embed the
functionality in other applications or even a web page. Server versions of Windows OSs
also include the Multicast Server for Administration client (a special mode of the
Multicast Server Connection client), which allows remote connection to the console of
the server, where all command line applications can be run. The server functionality is
provided by the Terminal component, which is able to handle Remote Assistance,
Multicast Server as well as the Remote Administration clients.
INTRODUCTION
LANGUAGE INTRODUCTION
SOFTWARE FEATURES
VISUAL BASIC.NET
Visual Baic.Net has revolutionized windows programming windows programming and
with an object based, event driven approach to software designs. Visual basic.Net
applications act as a front end to the database. Visual basic.Net application provides the
interface between the user and the database. Sophisticated features that make the
language truly object oriented and interfaces it with the latest in the database technology.
.NET provides a new, object-oriented API as a set of classes that will be accessible
from any programming language. This book describes this framework of classes and
provides a reference to what is available and how you can use this framework to write
Windows applications in the brave new world of .NET.
The CLR provides a lot of added value to the programs it supports. Because it controls
how a .NET program executes and sits between the program and the operating system, it
can implement security, versioning support, automatic memory management through
garbage collection, and provide transparent access to system services
IMPORTANT FEATURES:
• The application is a graphical user interface.
• Client-Server architecture benefits picture and image box can be
easily handled using bit mapped files and icons.
• Bit mapped files and icons are used as simple debugging tools.
• With the advent of .NET, Microsoft has introduced many new
technologies that make writing component-based distributed
systems easier, more flexible, and more powerful than ever before.
• It is now easier than it has ever been to write components in any
programming language that can interoperate with components on
other machines, which may not be Windows-based at all.
.
Software description:
Hardware requirements:
Software Requirements
Existing System:
Proposed system:
Remote desktop:
This module helps in capturing the remote desktop at runtime. This module helps
in monitoring the remote system.
File transfer
This module helps in transferring file to remote desktop by sending current ip address of
the system. File need to be send will have to give ip and files are send from server to
client system
Data transfer:
This is similar to above process except data’s are send to the remote system.
Applications
DATA
TRANSFER
CLIENT
FILE
TRANSFER
NETWORK
LOCK
NETWORK
LOCK
SAMPLE CODING
LOGIN CODE:
Public Class login
Dim fcap, fcap1 As Integer
End Sub
End Sub
Imports System
Imports System.Net
Imports System.Net.Sockets
Imports System.Text
Imports System.Threading
Imports System.Drawing
Imports System.IO
Public Class server
Dim handler As Socket
Public th As Thread
Public th1 As Thread
Public Data As String
Public fname As String
Public ext As String
Dim i As Integer
Public msg As Byte()
Dim apppath As String
Dim cap As Integer
Public f As Integer
Public _crypto As CryptoLib.Crypto
Delegate Sub SetDisplay(ByVal [Text] As String)
Public Sub Connect()
Try
ipHostinfo = Dns.Resolve(Dns.GetHostName())
ipAdd = ipHostinfo.AddressList(0)
localEndPoint = New IPEndPoint(ipAdd, 11000)
listner.Bind(localEndPoint)
listner.Listen(10)
th = New System.Threading.Thread(AddressOf
Acceptstart)
th.Start()
i = 1
Catch ex As Exception
MessageBox.Show(ex.Message)
End Try
End Sub
Dim i As Integer
Dim j As Integer
j = str.IndexOf(".") + 1
i = str.IndexOf(":") + 1
ext = str.Substring(j, str.Length - j)
fname = str.Substring(i, str.Length - i)
End Sub
Public Sub ActionData(ByVal str As String)
Select Case str
Case "Notepad"
Process.Start("Notepad.exe")
Case "Mspaint"
Process.Start("Mspaint.exe")
Case "Calc"
Process.Start("calc.exe")
Case "Word"
Process.Start("C:\Program Files\Microsoft
Office\OFFICE11\WINWORD.EXE")
Case "CDOPEN"
mciSendString("set CDAudio door open", "",
0, 0)
Case "CDCLOSE"
mciSendString("set CDAudio door closed",
"", 0, 0)
End Select
End Sub
With ofd
.Filter = "xxx Files (*.xxx)|*.xxx"
.Multiselect = False
.Title = "Select a file to decrypt:"
If .ShowDialog = DialogResult.OK Then
fileName = .FileName
Else
Return
End If
End With
End Sub
End Sub
End Class
Designer Page:
<Global.Microsoft.VisualBasic.CompilerServices.DesignerGene
rated()> _
Partial Class server
Inherits System.Windows.Forms.Form
End Class
CLIENT SIDE:
Imports System
Imports System.Net
Imports System.Net.Sockets
Imports System.Text
Imports System.Threading
Imports System.Drawing
Imports System.IO
Imports System.Runtime.InteropServices
Imports System.Text.Encoder
End Try
End Sub
Public Sub Proccessdata(ByVal str As String)
If Me.List.InvokeRequired Then
Dim d As New SetDisplay(AddressOf Proccessdata)
Me.Invoke(d, New Object() {str})
Else
Me.List.Items.Add(str)
If (str = "Ack") Then
Me.Button2.Enabled = False
Me.Button10.Enabled = True
End If
If (str = "ICapturing") Then
startcap()
End If
If (str = "stop") Then
T1.Enabled = False
End If
If (str = "Done") Then
Me.Button2.Enabled = True
Me.Button10.Enabled = False
Try
msg = Encoding.ASCII.GetBytes("ok")
Me.sender.Send(msg)
Catch ex As Exception
MessageBox.Show(ex.Message)
End Try
End If
End If
End Sub
Public Sub startcap()
T1.Enabled = True
End Sub
End Sub
Designer
<Global.Microsoft.VisualBasic.CompilerServices.DesignerGene
rated()> _
Partial Class Conn
Inherits System.Windows.Forms.Form
'Form overrides dispose to clean up the component list.
<System.Diagnostics.DebuggerNonUserCode()> _
Protected Overrides Sub Dispose(ByVal disposing As
Boolean)
If disposing AndAlso components IsNot Nothing Then
components.Dispose()
End If
MyBase.Dispose(disposing)
End Sub
End Sub
Friend WithEvents Label1 As System.Windows.Forms.Label
Friend WithEvents Txtserver As
System.Windows.Forms.TextBox
Friend WithEvents Button1 As System.Windows.Forms.Button
Friend WithEvents Pcon As System.Windows.Forms.Panel
Friend WithEvents Button2 As System.Windows.Forms.Button
Friend WithEvents Pmsg As System.Windows.Forms.Panel
Friend WithEvents Label3 As System.Windows.Forms.Label
Friend WithEvents Label2 As System.Windows.Forms.Label
Friend WithEvents Txtmsg As System.Windows.Forms.TextBox
Friend WithEvents List As System.Windows.Forms.ListBox
Friend sender As System.Net.Sockets.Socket
Friend ipHostinfo As System.Net.IPHostEntry
Friend ipAdd As System.Net.IPAddress
Friend remoteEP As System.Net.IPEndPoint
Friend WithEvents Tab As System.Windows.Forms.TabControl
Friend WithEvents TabPage1 As
System.Windows.Forms.TabPage
Friend WithEvents TabPage2 As
System.Windows.Forms.TabPage
Friend WithEvents Button5 As System.Windows.Forms.Button
Friend WithEvents Button4 As System.Windows.Forms.Button
Friend WithEvents Button3 As System.Windows.Forms.Button
Friend WithEvents Button7 As System.Windows.Forms.Button
Friend WithEvents Button6 As System.Windows.Forms.Button
Friend WithEvents TabPage3 As
System.Windows.Forms.TabPage
Friend WithEvents Button9 As System.Windows.Forms.Button
Friend WithEvents FileT As System.Windows.Forms.TextBox
Friend WithEvents Button8 As System.Windows.Forms.Button
Friend WithEvents OFD As
System.Windows.Forms.OpenFileDialog
Friend WithEvents Button10 As
System.Windows.Forms.Button
Friend WithEvents T1 As System.Windows.Forms.Timer
Friend WithEvents Picture1 As
System.Windows.Forms.PictureBox
Friend WithEvents Ch1 As System.Windows.Forms.CheckBox
Friend WithEvents Label4 As System.Windows.Forms.Label
Friend WithEvents PictureBox1 As
System.Windows.Forms.PictureBox
End Class
8. SYSTEM DESIGN
System design is the process of planning a new system to complement or altogether
replace the old system. The purpose of the design phase is the first step in moving from
the problem domain to the solution domain. The design of the system is the critical aspect
that affects the quality of the software. System design is also called top-level design. The
design phase translates the logical aspects of the system into physical aspects of the
system.
INPUT DESIGN
Input design is one of the most important phase of the system design. Input design is
the process where the input received in the system are planned and designed, so as to get
necessary information from the user, eliminating the information that is not required. The
aim of the input design is to ensure the maximum possible levels of accuracy and also
ensures that the input is accessible that understood by the user.
The input design is the part of overall system design, which requires very careful
attention. if the data going into the system is incorrect then the processing and output will
magnify the errors.
Input design features can ensure the reliability of the system and produce result from
accurate data or they can result in the production of erroneous information. The input
design of the system includes the following
OUTPUT DESIGN
Output design is very important concept in the computerized system, without reliable
output the user may feel the entire system is unnecessary and avoids using it. The proper
output design is important in any system and facilitates effective decision-making.
Server form:
Login :
Main Form:
File to be encrypted:
Transfer file:
Client Form:
Receiving message:
TESTING AND IMPLEMENTATION
TESTING
exercise the computer based system. Although each test has a different purpose, all work
should verify that all system element have been properly integrated and performed
allocated function. Testing is the process of checking whether the developed system
The philosophy behind testing is to find the errors. A good test is one that has a
high probability of finding an undiscovered error. A successful test is one that uncovers
the undiscovered error. Test cases are devised with this purpose in mind. A test case is a
set of data that the system will process as an input. However the data are created with the
intent of determining whether the system will process them correctly without any errors
IMPLEMENTATION
turned into the working system. The most crucial stage is giving the users confidence that
undertaken and made in front of end-users. The various features provided in the system
Network security
Data loss is prevented
CONCLUSION:
This project helps in preventing all unauthorized users accessing the information . Data
loss is minimized. All operation is controlled in server side. Locking operation is
performed in server side which locks the client system . Once locked no operation is
performed on client side. Loss is prevented. Network locking is carried out in application
to prevent network intruders.
BIBLIOGRAPHY
Bischof
Crooks II