System Monitoring and Communication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 143

Research Paper | Information Technology | India | Volume 7 Issue 3, March 2018

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

In this paper we have the advanced remote desktop monitoring system with communication. This application enables us to monitor n-number of clients at real time. Key-logging is also an enhanced feature in order to keep track of minute actions of clients. This application also enables the Server to initiate the chat with clients as well as it enables the Server to take actions like shut down, log-off and other actions.

Keywords: Monitoring, SysMoCom, Key-Logging, Encryption, Steganography, Cryptography, Network Security

Edition: Volume 7 Issue 3, March 2018

Pages: 846 - 849

Share this Article

How to Cite this Article?

Omkar Kolambkar, Namita Kolambkar, "System Monitoring and Communication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2018739, Volume 7 Issue 3, March 2018, 846 - 849

Enter Your Email Address




Similar Articles with Keyword 'Monitoring'

Downloads: 112 | Weekly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2137 - 2140

Analytical Research on Anxiety of Reengineering With Information Technology Employees

Dr. S. Manimekalai

Share this Article

Downloads: 112

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article

Downloads: 116 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2556 - 2562

Wireless Sensor Networks: An Overview from an Optimization Perspective

Haroon Shoukat Ali, NoorAzian Mohamad Ali

Share this Article

Downloads: 117

Research Paper, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 2111 - 2116

Performance Evaluation of Weighted Time-Parameterized Edit?Distance based Trajectory Clustering in RFID Environment

Sagar V. Mahajan, R. H. Borhade

Share this Article

Downloads: 118

Research Paper, Information Technology, India, Volume 2 Issue 5, May 2013

Pages: 41 - 43

Non Invasive Blood Glucose Measurement through Microwave Resonator

Shiv Kumar, Jaspal Singh

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 104 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Similar Articles with Keyword 'Steganography'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 113

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

Downloads: 119

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Downloads: 120

Research Paper, Information Technology, Myanmar, Volume 2 Issue 1, January 2013

Pages: 227 - 230

Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 107 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1285 - 1288

Key Aggregate Cryptosystem for Data Sharing in Cloud Computing

Rohit Tate, Jyoti Pingalkar

Share this Article

Downloads: 109 | Weekly Hits: ⮙5 | Monthly Hits: ⮙12

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

Similar Articles with Keyword 'Network Security'

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Downloads: 122 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Downloads: 129

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article

Downloads: 134

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Downloads: 141

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article



Top