System Monitoring and Communication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 7 Issue 3, March 2018

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

In this paper we have the advanced remote desktop monitoring system with communication. This application enables us to monitor n-number of clients at real time. Key-logging is also an enhanced feature in order to keep track of minute actions of clients. This application also enables the Server to initiate the chat with clients as well as it enables the Server to take actions like shut down, log-off and other actions.

Keywords: Monitoring, SysMoCom, Key-Logging, Encryption, Steganography, Cryptography, Network Security

Edition: Volume 7 Issue 3, March 2018

Pages: 846 - 849

Share this Article

How to Cite this Article?

Omkar Kolambkar, Namita Kolambkar, "System Monitoring and Communication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2018739, Volume 7 Issue 3, March 2018, 846 - 849

92 PDF Views | 85 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Monitoring'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2137 - 2140

Analytical Research on Anxiety of Reengineering With Information Technology Employees

Dr. S. Manimekalai

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2556 - 2562

Wireless Sensor Networks: An Overview from an Optimization Perspective

Haroon Shoukat Ali, NoorAzian Mohamad Ali

Share this Article

Research Paper, Information Technology, Kenya, Volume 2 Issue 11, November 2013

Pages: 301 - 305

Quality Assurance in Emerging Primary Private Teacher Training Colleges in Bungoma County, Kenya

Sarah Likoko, Anne Wasike, Fredrick Ndinyo

Share this Article

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article

Research Paper, Information Technology, Philippines, Volume 8 Issue 6, June 2019

Pages: 1826 - 1830

Human Resource Information Management System

Emmanuel Carlos Navarro

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Similar Articles with Keyword 'Steganography'

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

Similar Articles with Keyword 'Cryptography'

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Similar Articles with Keyword 'Network Security'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018

Pages: 846 - 849

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

Share this Article
Top