Font Size: a A A

The Design And Implementation Of Multi-User Computer File Monitoirng System

Posted on:2013-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:J T A B D R S L NiFull Text:PDF
GTID:2248330374466814Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the computers havealready been used deeply in every aspects of enterprise production, theinformatization of enterprises has become a hot topic, and it is the best choice for anenterprise to obtain competitive advantage. LANs are widely used by enterprises toshare private resources in order to facilitate daily work. In recent years, along with theimprovement of LANs, enterprises benefit from the investment in computers, serversand other hardware equipments, but they also suffer from three threats that neverappear before: the leakage of the confidential materials and drawings, the lose ofenterprise properties without supervision, the poisoning and falling of enterpriseLANs caused by internet surfing of employees. Now, the management of LAN hasbecome an important problem of enterprise managers and a challenge of networkmanagers.The internet is a two-edged sword, its negative effect has gradually appearedalong with its acceleration of information communication and economic improvement.Resorting to the internet, reactionary organizations propagate heresies, eroticism,violence and Reactionary contents, and perform each kind of criminal activities. Suchactivities bring negative effect to the society and damage the healthy development ofinternet. Therefore, the management of the access of internet users especially theyoung and students, which aims to protect them from pollution of unhealthyinformation without affecting the normal access, has attracted more and more interestsof researchers.According to the analysis of the current status of enterprise LANs, and theinvestigation of popular LAN monitoring softwares, this work researches on thedevelopment of realistic LAN monitoring software based on the current LAN management technologies, in order to satisfy the monitoring requirement of thehardwares, softwares and activities of employees.Focus on the method of file realtime monitor technology in the Windowsoperating system. Realized file monitor in Windows operating system by usingFileSystemWatcher class. Database access technology, ADO. NET database accesstechnologies in the Windows system files, real-time monitoring and research andcomputer information filtering techniques and methods.By using Visual Studio software localization technology to develop the softwareof Uygur and Chinese in two versions. According to the windows messagemechanism,obtain the operation behavior of users on the computer by utilizingWindows API and hook technology. Research of database access managementtechnology, to realize ADO.NET database access technology in Windows system forfile real-time monitoring technology and method. And studied and realized the badinformation filtering technology and method. Have proposed the bad informationbased on keyword filters method and its web content filtering, filtering of searchengine. Have realized the website filters, the filtering function of the applicationprogram. Finally carry on the software test guarantees software quality of this system.This system can control and record users’ file operation behavior in detail, prevent badinformation website that user visit effectively, forbid run work irrelevant applicationprogram.To verify the performance of the software, we install it to the workstation of“Xinjiang Melodiye Culture and Media Co., Ltd”, and supervise the activities ofemployees in the workstation for a week. Experiments show that, the methodproposed in this work achieves practical performance in completeness, effectiveness,and stability of the software, which is appreciated by the managers of the enterprise.
Keywords/Search Tags:File monitoring, monitoring, Harmful information, Informationfiltering, Information security
PDF Full Text Request
Related items