Académique Documents
Professionnel Documents
Culture Documents
Contents................................................................................................................ 1
1.Project Specification ..........................................................................................3
1.1 Project Statement ........................................................................................3
1.2 Proposed work..............................................................................................3
1.3 Need of Project.............................................................................................3
1.4 Scope of the project......................................................................................3
2. Project Objectives..............................................................................................4
2.1 Project objective...........................................................................................4
2.2 Overview...................................................................................................... 4
3. Information Gathering.......................................................................................4
3.1 Introduction :................................................................................................4
3.2 Problem definition:.......................................................................................4
3.3 Literature survey:.........................................................................................5
3.4 Current Scenario:.........................................................................................5
4. Requirement Analysis........................................................................................5
4.1 Introduction.................................................................................................. 5
4.1.1 Purpose.................................................................................................. 5
4.1.2 Scope......................................................................................................6
4.1.3 References............................................................................................. 6
4.2 Overall Description.......................................................................................6
4.2.1 Product Prespective...................................................................................6
4.3 Software System Attributes..........................................................................7
4.3.1 Reliability:...............................................................................................7
4.3.2 Availability:................................................................................................8
4.3.3 Maintainability:.......................................................................................8
4.3.4 Portability:..............................................................................................8
4.3.5 Platform-Independence..........................................................................8
4.3.6 Multithreading programming..................................................................8
4.3.7 Security.................................................................................................. 8
4.4 Product Features..........................................................................................9
4.4.1 Stroke Recording....................................................................................9
4.4.2 Record Clipboard Activity.......................................................................9
4.4.3 Screen-Shot Monitoring (Visual Surveillance).........................................9
4.4.4 Log Viewer..............................................................................................9
1
4.4.5 Upload Log by e-Mail..............................................................................9
4.4.6 Upload Log by LAN...............................................................................10
4.4.7 Report Generation................................................................................10
4.4.8 Viewing Backup Activities.....................................................................10
4.4.11 Advance View Option ........................................................................10
4.4.12 Recording Multiple User account & Filtering.......................................10
4.4.13 Password Protection...........................................................................10
Our Keylogger has password protection to prevent others from changing
your configurations or viewing the log files. After configuring and starting the
program, you can activate All In One Keylogger simply by typing your
password, and it doesn't matter in what application you are working with.
Just type the password and our Keylogger will be right there.......................10
4.4.14 Privacy Features.................................................................................10
4.4.15 Disable Anti-Keylogger Softwares.......................................................11
4.4.16 Disable Unwanted Softwares.............................................................11
4.4.17 Block Unwanted URLs.........................................................................11
4.4.18 Filter application monitoring...............................................................11
4.4.19Multilanguage - Localized Keylogger...................................................11
5. System Analysis...............................................................................................12
5.1 Feasibility study report...............................................................................12
5.1.1 Operational Feasibility:.........................................................................12
5.1.2 Technical feasibility:.............................................................................12
5.1.3 Cost Feasibility:....................................................................................12
5.2 Project Estimating:......................................................................................12
6. System Design.................................................................................................13
6.1 High Level Design.......................................................................................13
6.1.1 Data Flow Diagram:.................................................................................13
6.2 Low Level Design........................................................................................13
6.2.1 UML Diagrams:.....................................................................................13
6.2.1.1Use Case Diagram..............................................................................14
6.2.1.2 Sequence Diagram............................................................................15
6.2.1.3 Activity Diagram................................................................................17
6.2.1.4 Collaboration Diagram.......................................................................18
6.2.1.5 Class Diagram...................................................................................18
7. Conclusion....................................................................................................... 19
8.References........................................................................................................19
8.1 Books Refered............................................................................................19
2
Web-sites Referred...........................................................................................19
IEEE papers Referred........................................................................................19
1.Project Specification
In our project we are developing a software which will help owner of pc to trace the
user activities. This Software will log all keystrokes pressed by the user into text file
and also take screenshots when cpu usage goes high or on mouse clicks . This log file
and screenshots will be mailed to the owner of the pc after some interval of time if the
internet connection is available otherwise if pc is connected in lan then it will be send
to the administrator. Log files and screenshots will remain hidden from the user and
After sending log files and screenshots to the owner log files will be deleted from pc.
Using java programming we can create such applications which will help us to trace
the user activites. It is not visible to the user so that he/she is unaware from this
software so this will defiantly helpful to trace the user activities.
The keylogger software we are developing can trace all the activites of the users.The
software will log all the keystrokes pressed by user into text file and this text file will
have extensions like .log or .axt so that no one can read it easily. Software will take
screenshots when cpu usage goes high or on mouse clicks. This log file and
screenshots will be mailed to the owner of the pc after some interval of time if the
internet connection is available otherwise if pc is connected in lan then it will be send
3
to the administrator. Log files and screenshots will remain hidden from the user and
after sending log files and screenshots to the owner log files will be deleted from pc.
The whole software will work on the background and it is not possible to view the
software in task manager, program files or start up menu.
2. Project Objectives
2.1 Project objective
The main objective behind this project is to help the owner of the computer system to track
the all activities that are done by the user in his absence. This software will help employers to
ensure that employees will use work computers for business use only. Software will help the
concerned parents to find what activities their childrens are doing in their absence. Software
will help the Law enforcement or private investigators looking for evidence of an ongoing
crime or inappropriate behavior.
2.2 Overview
Key logger invisibly records keystrokes of every user activity performed on the computer in
log files all typed emails conversations, chat records, website visited, password and
documents lists. Its folders are hidden from all users in your system they do not appear in file
search and will not be found by file managing shells. Not only program modules of Key
logger are hidden, but the logs stay unrevealed as well. Key logger will not be visible in
Tasks or Processes List, among installed programs and in Start menu (unless you prefer a
visible installation). Key logger will not show up in registry or Add/Remove Programs
utility.Keylogger will also take the screenshots when cpu usage goes high and store them in
pc.the screenshots will also be remained hidden from user.log files and screenshots are send
to the owner of system after some interval of time and these files will then deleted if the mail
transfer is successfull.
3. Information Gathering
3.1 Introduction :
Initial phase of our project is to gather basic information about keyloggers such as what is
keyloggers ? What are the Features of Keyloggers? How to capture keystrokes and how to
hide the log files.
4
Keylogger is a software program that is used to monitor and log each of the keys a user types
into a computer keyboard. The user who installed the program can then view all keys typed in
by that user. Software will take screenshots when cpu usage goes high or on mouse clicks.
This application will send a log file and screenshots to the owner of keylogger through mail
or if pc is connected in lan it will send it to the administrator through FTP connection. The
project aims at developing an application using Java Technology. The project is for
companies or practical labs to trace the activities of suspicious employee also for concerned
parents to trace their childerens activites on computers.
Currently available keylogger softwares in market are not platform independant they are all
designed by keeping particular operating system in mind but our keylogger software will run
on any operating system as it is platform independant. Portability of java language helps us
to make our keylogger operating system independant.
4. Requirement Analysis
4.1 Introduction
We are developing the software that will trace the user activities. It will log all keystrokes
pressed by user into text file and also takes the screenshots when cpu usage goes high. The
text files and screenshots will be remained hidden from the user . Screenshots and loggfiles
will be mailed to the pc owner after frequent interval of time and after this log files and
screenshots will be deleted. This software is not visible in the program files or task manager
and run in background so that He/She will be not aware of the keyolgger softaware.
4.1.1 Purpose
5
Purpose of our project is to develop a software which will help the owner of software to
track the all activities that user had done in his absence. Our purpose is to help the
companies or organizations to track the employes activitys on computer and also for
concerned parents to track the activitys of their childrens in their absence.This Software will
help the Law enforcement or private investigators looking for evidence of an ongoing crime
or inappropriate behavior.
4.1.2 Scope
The keylogger software we are developing can trace all the activites of the users.The software
will log all the keystrokes pressed by user into text file and this text file will have extensions
like .log or .axt so that no one can read it easily. Software will take screenshots when cpu
usage goes high or on mouse clicks. This log file and screenshots will be mailed to the owner
of the pc after some interval of time if the internet connection is available otherwise if pc is
connected in lan then it will be send to the administrator. Log files and screenshots will
remain hidden from the user and after sending log files and screenshots to the owner log files
will be deleted from pc. The whole software will work on the background and it is not
possible to view the software in task manager, program files or start up menu.
4.1.3 References
6
Operating System
This software will run on any operating system it will not require any specific operating
system. As this is operating system independant it can run on any windows versions,linux
operating system.
Packages
1. Java run time environment using JDK1.6.
3. LAN connection.
Implementing project in java has several features over the language. Since Java is object-
oriented network-savvy programming language. Some call it a Better than C++. Other call it
the language of the Internet .Let us view some of the properties of Java that makes it good
language for keylogger programming
4.3.1 Reliability:
7
4.3.2 Availability:
System Availability is calculated by modeling the system as an interconnection of parts in
series and parallel.Since our system is being designed in parallel that means If failure of a
part leads to the other part taking over the operations of the failed part.
4.3.3 Maintainability:
4.3.4 Portability:
As we are using a programming language Java provides the simplest and most familiar form
of portability -- source code portability. A given Java program should produce identical
results regardless of the underlying CPU, operating system, or Java compiler.So,The software
which we propose to design is machine independent and can work on different machines with
varied operating systems. Thus it completes the requirement of portability.
4.3.5 Platform-Independence.
One of the characteristics that make Java a powerful programming language is its support of
multithreading programming as an integrated part of the language. This is unique because
most modern programming languages either don’t offer multithreading or provide
multithreading as a non integrated package. Java, however, offers a single, integrated view of
multithreading. Multithreading programming is an essential aspect of programming in Java.
4.3.7 Security.
We are using the Java as the programming language, so Java itself is the secure language. It
provides better security than any other language. Another level of security is the byte code
verifier. Java programs are compiled into sets of instructions called byte codes. Before a Java
program is run, a verifier checks each byte code to make sure that nothing suspicious is going
on. In addition to these measures, Java has several safeguards that apply to applets. To
8
prevent program from committing random acts of violence against a user’s disk drive, an
applet can’t open, read, or write files on the user’s system. Our system matains security by
providing features including password protection,Hot key or Run command settings with
which only authorised person is able to access our system.
Do they write letters in Word, use the email or maybe chatting is what they do all day?
That makes absolutely no difference to Keylogger.
Our Keylogger can record all the text typed in these applications.Our keylogger will log
keystrokes into the text file as soon as pressed by user. This log file will record all user
activities.
This feature completes all Textual/chat logging features by bringing you the visual
picture of your computer. You can easily change the frequency of taking screenshots from
your computer. This feature saves a lot of disk space by logging the most important
events.The shots taken are saved in JPG format to save your disk space.You can also set the
quality of the pictures taken .Facilitate to capture entire screen snap-shots periodically or
when CPU uses goes high beyond threshould value.
4.4.4 Log Viewer
Very sophisticated Log files Manager.Allows you to view, browse, delete, sort and
filter your log files.It allows you to view logs by dates and even the entire log.You can set the
viewer to marks only the dates when log was generated.You can also look for specific words
in a log file.Log file basically contains Textual log, Web log, Chat Log, Visual log and Audio
log.In order to save disk space you can configure the software to automatically delete old Log
files.
Thinking about going away from home for a couple of weeks and afraid of losing control
over your computer? Our Keylogger brings a solution: Sending logs by e-mail. In order to
save hard drive space you can specify if you wish to delete the sent logs from your HD.
9
4.4.6 Upload Log by LAN
Have few computers on your organization/home Network? All In One Keylogger brings a
solution: Sending logs to a Network Folder.You can even set the User & Password for the
Remote Network Folder and the Keylogger will make the required authentication to acquire
the access to that folder.In order to save hard drive space you can specify if you wish to
delete the sent logs from your HD.
4.4.7 Report Generation
Generate report of user activities in both html and txt file format.
4.4.9Automatic Startup
User can easily access the software when running in hidden mode by enabling Hot key or
Run command settings.
Allow users to view each input keystroke or only printing keystrokes as per requirement.
Record all users logged on your computer machine (including the Guest user). Our Keylogger
allows you to specify users accounts you want or don't want it to monitor.
All In One Key logger is completely invisible. You can configure it not to be listed in Task
Manager and to Hide its folder.You can also configure it not to be listed in Windows Task
Bar, System Tray, MSConfig(Startup entry), Uninstall list (Add/Remove programs) And start
menu.
10
4.4.15 Disable Anti-Keylogger Softwares
Our Keylogger will shutdown pre-defined anti-keylogger softwares, then will monitor and
prevent loading these pre-defined anti-keylogger softwares.
4.4.16 Disable Unwanted Softwares
Our Keylogger will shutdown user defined, unwanted softwares, then will monitor and
prevent loading these unwanted softwares.
4.4.17 Block Unwanted URLs
Our Keylogger will block the access to sites you define. All you need to do is to set the URL
or part of it in the URLs blocked list.
4.4.18 Filter application monitoring
Our Keylogger allows you to specify the programs you want you don't want it to monitor.
4.4.19Multilanguage - Localized Keylogger
Keylogger has a built-in German (Deutsch) Translation, French (Francais) Translation, Dutch
(Nederlands) Translation, Italian (Italiano) Translation, Spanish (Espanol) Translation,
Portuguese (Portugues) Translation, Swedish Translation (Svensk), Norwegian Translation
(Norske), Turkish Translation (Türkçe), Czech (Cestina) Translation - More will come in the
future.
11
5. System Analysis
5.1 Feasibility study report
5.1.1 Operational Feasibility:
Our software is technically feasible to implement because of the use of technology like Java.
5.1.3 Cost Feasibility:
The system being cost effective will be affordable by Law enforcement or private
investigators looking for evidence of an ongoing crime or inappropriate behavior.
12
6. System Design
6.1 High Level Design
6.1.1 Data Flow Diagram:
Data flow diagrams are commonly used during problem analysis. Data flow diagrams
(DFDs) are very useful in understanding a system and can be effectively used during
analysis. A DFD shows the flow of data through a system. It views a system as a
function that transforms the inputs into desired outputs. Here we try to draw DFD for
our application which looks like as follows:
13
The Unified Modeling Language (UML) is used to specify, visualize, modify, construct and
document the artifacts of an object-oriented software-intensive system under development.
UML offers a standard way to visualize a system's architectural blueprints
The designing diagrams for object oriented modelling are use case diagram, sequence
diagram, collaboration diagram, activity diagram, component diagram, package diagram,
class diagram.
14
6.2.1.2 Sequence Diagram
15
16
6.2.1.3 Activity Diagram
17
6.2.1.4 Collaboration Diagram
18
7. Conclusion
We will develop a security monitor and user activity tracking system such that we
can get log of all activities of a unauthorized/suspected person. We send log files in
encrypted form on the owners e-mail Account.
The log files created will have a pressed keystrokes logging on each and every
keystroke also a different log file will be created which will contain screenshots of the user
activity which will give user a breif detail of the user activity to the owner.
The project is also for companies or practical labs where the administrator can
monitor the LAN without being present in that LAN area. (e.g.: sitting at home) Whenever he
wills , he can check mails of all the clients on which the software works.
He can select a particular user and can prepare a detail document on his activities for a
span of time. IF the owner finds that a particular application is illegal then he can use this log
files or user activitiy log to bust him.
8.References
[4]. Object Oriented Modeling and Design :-James Rum Baugh, William Lorensen
Web-sites Referred
1 www.java.sun.com
2 www.javaworld.com
3 www.keylogger.org
[1] ‘ Keyloggers Increasing Threats to Computer Security and and Privacy” by seref
sagiroglu and gurol canbek.
19
[2] G. Canbek, “Analysis, design and implementation of keyloggers and anti-
keyloggers,” Gazi University, Institute Of Science And Technology, M.Sc. thesis (in
Turkish), Sept. 2005, pp. 103.
[3] J. Wurtzel, “Bugging your keyboard,” BBC News, Science/Nature;
http://news.bbc.co.uk/1/hi/sci/tech/1638795.stm, accessed Sept. 2006
.[4]. J. Williams, “I know what you did last logon: Monitoring software, spyware, and
privacy,” Microsoft Security News., vol. 4, no. 6, June 2007
20