LINUX BASED INVINCIBLE BLACKBOX
#1

LINUX BASED INVINCIBLE BLACKBOX
What is a Invincible Black-box?
Invincible Black-box is Linux based software and that will let you monitor what people you share your computer will type when you are away. Working in the background, Invincible Black-box will record every keystroke pressed, all passwords , chats conversations, instant messages, emails, websites visited on the keyboard etc and stores it down in a hidden encrypted log file that can be viewed by the person performing the monitoring in real-time, or at a later date. It can also make screen shots periodically and mail the stored information to an administrative mail account. The Log analysis and report generation GUI module can be invoked only by typing a unique key combination by the person performing the monitoring. Similar type of Softwares are very popular in windows and that for Linux Environment is not common these days.
Why Install Invincible Black-box?
Monitor your employee's computer activities: Invincible Black-box can be used as a form of spy-ware in the office. As an employer, you'll be able to monitor your employees and identify those who spend corporate bandwidth on shopping, chatting and viewing frivolous content instead of work they are paid. Besides, it can be used to save lost typing in case the computer crashes and an important document you've just created is lost.
Safeguard your children from on-line dangers: As the name implies, Invincible Black-box is primarily designed to be used as an easy solution for PC and Internet surveillance use. As a parent concerned about the child's on-line security, having something like Invincible Black-box is a must. The program will tell you about your child's on-line habits, helping you prevent him or her from visiting porn sites, or making friends with criminals and pedophiles hidden behind chat avatars.
Save lost typing instead of re-typing everything from scratch: Another unusual use for Invincible Black-box is saving lost typing. This may be useful when you are typing something in a word processor and suddenly your computer freezes and the application quits for no good reason. With Invincible Black-box installed, you'll be able to regain the text you have typed up to the moment when your computer locked up.
As the old Russian saying goes "Trust but verify." Indeed, it's better to know about risks in advance rather than to scratch head when something unpleasant already happened
The best way to keep track of what happens on your computer is with Invincible Black-box spy software. What does this mean? If you have a computer in your home that you share with other family members or even room mates, you may not be aware of everything that goes on with their computer usage. This becomes very important when your children are using the computer, as you may or may not be able to keep track of everything they are doing on line. Intrusion detection systems in a PC is really difficult in the case of an open systems that is provided for legal and positive approaches. In the case of a system in a lab or a home PC with Internet connection . The non privileged users that uses the system can miss use the facility that provided for them. Since monitoring these like open systems by its administrators manual is a difficult procedure and not practical in the case of a lab with hundreds of PCs

In that case a smart monitoring facility that provides a word by word monitoring of the non privileged users activities on the keyboard .Since there are many input devices available keyboard is the master and primary input device in all cases for a computer . So monitoring all keystrokes in a computer by a person can explain all his/her communications with the PC .All the word that he typed ,All the Internet sites names,all user-names ,password... That also without the knowledge of the person who types them.
. A Invincible Black-box has many uses. Much like a telephone recording system at a call center, the Invincible Black-box silently records all keystrokes typed, including emails, word documents, chat room activity, IRC, instant messages, web addresses and web searching.
Many companies use Invincible Black-box on their company PCs to supervise employees for Internet and PC usage compliance. Invincible Black-box can help keep track of activity and allow a company to act on unauthorized activity before it becomes too late.
The open source platform gives the flexibility in the development and usage of the software .Since the driver parts of the keyboards are written in pure the compatibility issues are avoided . By using the actual open source technologies like C and java for the projects a large area of Internet support and future enhancement of the project can be also done easily.

The modules are following

1, The key Fetcher & Encryption Module
2, Decryption and Mailing module
3, Administration Module
4, Log Analysis/ Report Generation

1, The key Fetcher & Encryption Module

This is the back born of the Invincible Blackbox that saves the keystrokes C is the programming language .A log file is generated in the first time for saving the key values. Key-maps are used as the data bases for the keys to be replaced for the ASCII generated in the process .Whole file handling and the corresponding directories are kept hidden from the normal users .The key strokes are recorded from the log-in page of the user. The whole process cant affect any performance variations for the normal programs running bye the user .So the actual invisibility in maintained

2, Decryption and Mailing module

Since the regular checking of all the PC's log file that handles bye an administrator is a not a practical thing so a mailing module that sends the log files to the administrator specified email id .With the help of this module an administrator can check all the PC controlled bye him by checking his email id . GUI programming is done with the help of Swing(Java GUI API).



3,Administration Module

By using Java Swing a wonderful user control panel generation is done for a user friendly approach .It is highly flexible and offers many features for a GUI programming . A security rich application that can be launched with a combination key code and there after a user authentication is also there, All settings for the key logger can be done with the help of this module. Date, time and user wise arrangement of the logged key entries is possible. Extra permission for new users on the software are also possible

By combining these 4 modules The Invincible Black-box is implemented successfully.

REQUIREMENTS

Hardware:-
Intel p4 processor, 256 RAM
Software:-
GCC (GNU Compiler Collection), Java.
Reply
#2
hello am a student doing my final year BCA. i came accross this topic and after reading the concept am very much impressed. i want to develop it as a project for my final sem so can i get d information about the front-end and back-end and requirements to develop this software.
Reply
#3


to get information about the topic" LINUX BASED INVINCIBLE BLACKBOX" refer the page link bellow

http://studentbank.in/report-linux-based...2#pid59842
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: blackbox employment, project seminar on blackbox for vehicles, linux based seminar topics, invincible pc case, wireless blackbox, microcontroller based car blackbox circuit diagrams, blackbox in vehicle** notes,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Embedded Linux Based GLCD application development seminar surveyer 1 1,905 17-12-2012, 02:32 PM
Last Post: seminar details
  Device Driver Development in Linux smart paper boy 1 1,134 16-02-2012, 04:14 PM
Last Post: seminar paper
  Implementation of IPv6 for Linux computer science crazy 1 870 11-08-2011, 10:04 AM
Last Post: smart paper boy
  Performance Analysis of a Linux-based FTP Server computer science crazy 0 598 10-08-2011, 02:01 PM
Last Post: computer science crazy
  Implementation of IPv6 Security in Linux computer science crazy 0 808 10-08-2011, 01:54 PM
Last Post: computer science crazy
  Ktrace: A Framework for Tracing the Linux Kernel computer science crazy 0 793 10-08-2011, 01:49 PM
Last Post: computer science crazy
  Developing Exchange Server for Linux project topics 0 838 04-08-2011, 03:37 PM
Last Post: project topics
  Linux Virtual Server nit_cal 4 3,628 19-07-2011, 09:40 AM
Last Post: seminar addict
  VISION BASED PROCESSING FOR REAL TIME 3-D DATA ACQUISITION BASED CODE STRUCTURED LIGH electronics seminars 1 2,568 15-02-2011, 05:00 AM
Last Post: sindhuu89
  Signature-Based Indexing Method for Efficient Content-Based Retrieval seminar topics 4 4,255 29-01-2011, 09:46 AM
Last Post: seminar surveyer

Forum Jump: