Font Size: a A A

Design And Achievement Of Remote Investigation And Control System

Posted on:2009-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:X D SunFull Text:PDF
GTID:2178360245494249Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information technlology, computer and web has become an important part of social, political, economic and cultural life. Meanwhile, computer has been increasingly used in criminal affairs. An obvious feature of computer crime is the difficulty to detect and obtain evidence. In the process of investigation, several means can be used to enter into the suspicious person's computer without his detection. If the long-range investigtion and control software can be embedded into the suspicious person's computer, important information like keyboard record, screen display and hard discs documents can be obtained. Through this way more clues and crime development can be detected which can form evidence chain and propel the investigation in a direct way.In the thesis, the author expounds the development background of the system and the current situition of long-range investigation and control software, summarizes the key problems the system is to solve, the main technologies used by and contribution of the system. With systematic framework design and detailed design, the author makes partial and integral analysis and design for long-range investigation and control system in the direction of targets. In the part of implementation, Delphi7 development environment is used to sort out and combine the complex functions of the system. The implementation of different functions is elaborated from different points of view. The system eventually is featured with comprehensive functions, clear windows and simple operation steps.As special environment and conditions are required for the application of remote investigation and control system, thread injection is used in server placement. Windows API is used in the implementation of keyboard record and screen interception. Considering capital limit, domain name transfer is used in choosing client and server communication mode. Rootkit technology is used in the protection of server security in order to realize keyboard record interception from a lower level and download and mend server from a designated fictitious host when the server is deleted or destroyed. In application, clients can set up client and server by themselves through flexible ways according to particular case environment in order to get the best result. With high stability and adaptive quality, the system is easy to operate and the capital requirement is at a low level. Encryption algorithm is used in data transmission to ensure security. Lont time of work practice has proven that the system which can reduce the detective's work intensity is eapecially helpful for cases with special nature and reconnaissance mode. The system has played important role in some cases ahd achived proper beneficial result.
Keywords/Search Tags:remote investigation and control, design, achievement
PDF Full Text Request
Related items