International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 143 | Views: 271

Research Paper | Information Technology | India | Volume 7 Issue 3, March 2018 | Popularity: 6.2 / 10


     

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar


Abstract: In this paper we have the advanced remote desktop monitoring system with communication. This application enables us to monitor n-number of clients at real time. Key-logging is also an enhanced feature in order to keep track of minute actions of clients. This application also enables the Server to initiate the chat with clients as well as it enables the Server to take actions like shut down, log-off and other actions.


Keywords: Monitoring, SysMoCom, Key-Logging, Encryption, Steganography, Cryptography, Network Security


Edition: Volume 7 Issue 3, March 2018


Pages: 846 - 849



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Omkar Kolambkar, Namita Kolambkar, "System Monitoring and Communication", International Journal of Science and Research (IJSR), Volume 7 Issue 3, March 2018, pp. 846-849, https://www.ijsr.net/getabstract.php?paperid=ART2018739, DOI: https://www.doi.org/10.21275/ART2018739



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2495 - 2503

Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms

Kishore Gade

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021

Pages: 1309 - 1318

Performance Analysis of Data Exchange Protocols in Cloud Environments

Sai Kumar Reddy Thumburu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022

Pages: 332 - 337

Mitigating the Security Risks of IoT Devices using IPv6

Praveen Misra, Dr. Rajeev Yadav

Share this Article



Top