Design and Development of a Desktop Monitoring System

Santhalia, Vikram Kumar and Singh, Sanjay (2012) Design and Development of a Desktop Monitoring System. In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology , New York, USA .

[img] PDF
14.pdf - Published Version
Restricted to Registered users only

Download (302kB) | Request a copy
Official URL: http://dl.acm.org/citation.cfm?id=2393319

Abstract

Ours is an age of computing power where we have mil- lions of computing devices present and developing every day. Multinational organizations, local bodies and even individ- ual users are all dependent on computers for their day to day computing needs and this need is ever increasing. This involves storing and manipulating critical to personal data. Thus giving rise to various security and misuse issues re- lated to user's data. Employees of these organizations are found chatting, playing games, wasting time on social net- working and other useless web-sites during the o�ce hours. Many web-sites are not allowed by the organizations proxy, however there are very simple ways to bypass the proxy and browse these web-sites. This gave rise to the need of a mon- itoring system. This paper aims to present a solution, which is a developed software which provides better security mechanism by in- corporating USB attachment detection, desktop screen shot capture and network connection detection with visited web- site information, all at one point only. The developed soft- ware can be used as a desktop application by any enterprise or an individual user. The software can be installed by the administrator of the system and can monitor user's activity on the system. It keeps a log which the administrator can view any time he wants and monitor his machine. There's also an additional feature to email the log to the admin orsend him an alert SMS on his cell-phone so that he can have correct information about the system even when he is lo- cated at a di�erent location. It can be used by an enterprise to monitor the activity of their employees or even by in- dividuals to safeguard their system from misuse and hence making employees to make optimal use of the o�ce time.

Item Type: Conference or Workshop Item (Paper)
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 02 Mar 2013 10:47
Last Modified: 02 Mar 2013 10:47
URI: http://eprints.manipal.edu/id/eprint/78816

Actions (login required)

View Item View Item