|
Thanks for your reply.
Yes it is a webserver and I am trying to get the contents of that directory but I don't know what exactly to do so.
Can you explain with some piece of code??
Thanks.
Gagan
|
|
|
|
|
Hi
I have to create a windows application which can connect to a remote host through SSH and can perform some operations on the remote host.
remote host is a cisco router 3745
Problem I am facing is which ssh client to use and how to use in the application.
If anybody knw please update me @ himanshu_agarwal@live.com / himanshu.agarwal@gmail.com
|
|
|
|
|
|
My problem is that i want to know the web sites open in my network's pc
so that i could monitor all the web site open on that computer.
i want to develop a desktop application that will be install on each machine and will keep the url information and at particular time it will send an email containing all the requested URLs.
Please help and guide me.
|
|
|
|
|
Surely all this information is already available to the network administrator in various logs.
This has more than a wiff of malicious software .
|
|
|
|
|
Either that or 1984 might be good reading for him.
My advice is free, and you may get what you paid for.
|
|
|
|
|
I think he either uses it to put himself to sleep or thinks we are complete idiots. No doubt someone will point him to an article that will allow him to do this.
|
|
|
|
|
Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help.
so tell me is it possible by vb.net programming or not.
Thanks
|
|
|
|
|
Sumit Prakash Sharma wrote: Actually there is a client
here's the crux of it coming....
Sumit Prakash Sharma wrote: it is totally new task for me
... won a contract but doesn't know how....
So try google, there should be something there
Bob
Ashfield Consultants Ltd
Proud to be a 2009 Code Project MVP
|
|
|
|
|
Actually i don't take contract for this task, i want to reply him that it is possible or not. if possible then i will take contract from him.
|
|
|
|
|
You can have a service that will read the url from the browser and collect it somewhere. Then at a predefined time, it can get all of that and send it in email.
Do not rely on checking history since, user can clear it any time and you wont get correct result.
Google would tell how to get the url from browser.
50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!
|
|
|
|
|
This is what a proxy server is for. You don't install something like this on every client PC. You set it up between your clients and the Internet. The clients browsers would have to do through the proxy to get at the Internet. The proxy does all the filtering for blocked sites and can log all activity.
|
|
|
|
|
So your client doesn't know how to use his proxy server, can't be bothered to look in the help, and you have agreed to provide him with something he already has. Monitoring this on each PC is insane when there are already server logs and reporting built in to all proxy server software to give him the information he wants. Or does you client have every machine in the office separately connected to their own individual internet connections?
This is a basic network administration task not a programming exercise.
Plus of course while you can monitor browser activity and send the visited URL list to someone, that is definitely Hacker territory. Such software exists already and are known as trojan horse viruses, malware etc.
If you have knowledge, let others light their candles at it.
Margaret Fuller (1810 - 1850)
www.JacksonSoft.co.uk
|
|
|
|
|
Thanks for your kind reply
|
|
|
|
|
Mycroft Holmes wrote: This has more than a wiff of malicious software
I don't get that point. How can reading internet history or the current url be malicious? I dont see any extremely important data in URLs which needs to be secured from others. If it was the case, why keep it in url in first place.
50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!
|
|
|
|
|
There are existing tools for achieving this, any semi competant network administrator knows how and where to set this type of monitoring up. The person wants to create a monitoring system outside the standard channels that will periodicalyy email all the URL to ... someone. While it may not be malicious it feels that way to me.
If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile and any online banking sites you visit. I can tailor a phishing attack directly at you. Scuse me while I just go and get my foil beanie but I recently got an email from my daughter inviting me to facebook, the only clue was that she did not use her married name and sure enough there was a trojan at the other end of the link.
If this is innocent I am willing to appologise, but I will not help this person. As Bob said, he got the contract with no knowledge how to acheive the clients needs.
Never underestimate the power of human stupidity
RAH
|
|
|
|
|
The requirement is awful, I agree. There must be a proxy server to monitor all this. But if the application is for some school/college or something on similar lines, I suspect they would have one.
Mycroft Holmes wrote: If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile
Absolutely not required. Facebook or many other social profiles can be obtained very easily (just a click away, seriously). Hence I would not waste time in making such application if I had wrong intentions.
Mycroft Holmes wrote: If this is innocent I am willing to appologise, but I will not help this person.
Sorry, but I don't care. I was just curious why you thought this application malicious.
Mycroft Holmes wrote: he got the contract with no knowledge how to acheive the clients needs.
True again.
50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!
|
|
|
|
|
d@nish wrote: Sorry, but I don't care
You should, actually; you could get into a heap o' trouble if you aid someone who is breaking the law.
I are Troll
|
|
|
|
|
Not in this regard, you have to know before-hand that you are contributing to a malicious cause, in this case this type of functionality could very well be justified.
Either way I wouldn't help, but you can't say something like that without justifiable reason behind it. Otherwise you are just fear-mongering.
|
|
|
|
|
EliottA wrote: you have to know before-hand that you are contributing to a malicious cause
It's not that black and white; if the client is a internet-cafe, then he/she might not be aware of the implications of tracking personal data. It's their computers, it's their data. Right?
The client might not even have a malicious intent, and still ask you to break the law. Most of us won't be sure whether it's being broken, as an engineer isn't a lawyer. Does that mean that we can thread any law, just because we don't know them?
If this is seen as mongering, then please, do accept my apologies. It's not like I just wanted to troll around and spread some paranoia; I just stumbled over an "I don't care" and tried to point out that there's a risk in simply shrugging your shoulders.
I'm a blue cow, stuck at level 74 - still looks like a Troll in a fancy dress
|
|
|
|
|
It is not in relation to what OP is asking. I said that for Mycroft saying that he would apologize if he was wrong about OP's intentions. I really don't care if he does that or doesn't.
He had an opinion, told that to OP. What's wrong in it? I had different opinion, so I gave a different reply.
50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!
|
|
|
|
|
Interesting Article on this E-mail-monitoring-may-contravene-European-laws[].
From what I have read, here in Europe, where I am an app on the PC monitoring and reporting internet usage would be in breach of European human rights legislation unless there was a company policy previously in place and enforced stating that the internet cannot be used from company machines for personal use, and that all traffic will be monitored to log business usage (which is lawful).
So, what is the purpose of a monitoring application, to enforce the company policy or to check what people are viewing? Enforcing policy would be better done by regulating site access on the proxy server, and checking usage is also best done there even when illegal.
So my read on this is that anyone installing software (or writing software for installation) on an end user PC for the purpose of reporting on their internet usage is very likely acting in breach of European law, if that is where the software is used. Seeing as we had a high profile case of a British Hacker being extradited to the U.S. for contravening their laws (not British law where he lived) there is no way I would get involved in something like this, and I would advise anyone else to stay well away. You just don't know where the software will end up with your name on it.
If you have knowledge, let others light their candles at it.
Margaret Fuller (1810 - 1850)
www.JacksonSoft.co.uk
|
|
|
|
|
Thanks for reply
After consulting with cliet, when i told him that this is against human rights. he said to me that he wants to know only domain names not full URL with query data. he wants to know the domain names like songs.pk, mp3pk.com, yahoo.com, youtube.com etc
atcually he told his employees not to use unnecessary sites at working time because it effects the work.
after long waiting he decide to get such application that could tell him about the domain names opened on particular system.
when he check out at the server he get all the url requested and found that employee open youtube.com and watch the vedio at working time. so he wants to stop that particular employee.
thats why he wants to get this application.
|
|
|
|
|
you can use monitoring sofwares like keylogger.
If you can think then I Can.
|
|
|
|
|
A key logger does nothing in this case. Sure, you can get a URL, but you cannot use the content of a site and classify it.
|
|
|
|