6 research outputs found

    Remote Desktop Monitoring Using Android

    Get PDF
    In Today’s techno savvy world the android operating system based smartphone plays a huge role in the technical field, and also provides various useful applications which can be used in day to day lives. This paper discusses about another such application which can access the computer connected to it. The key objective of the application is to remotely access and monitor different tasks running on the PC by connecting it to an Android operating system based mobile phone through a network (internet). This application turns your mobile phone into a controller and viewer that can monitor the tasks running on PC and also view its desktop. Both the PC and mobile phone need to be connected to internet. In this paper we will discuss the process of accessing and monitoring the computers with the help of android cell-phones. This process is based on VNC (virtual network computing) architecture. We must install a server on target computer connected to internet and client on the android mobile phone (user). The user can perform operations using this application through the internet on computers with various platforms like Linux, Mac and Windows etc. There are several functions provided to ease the viewing of desktop on android cell-phones. Shortcut functions are provided that can be used to quickly access the frequently used area. Screenshots of the target PC will be sent on the users’ cell-phone after defined time intervals. The user needs to install a server Application on the target PC and a client application on the android mobile phone. Both applications are going to be developed in Java Using Eclipse or JDK. To reduce effort of user and solve problems due to the mobile phone’s small screen, several functions are provided on the mobile viewer. Remote Frame Buffer or RFB Protocol is used to access Graphical User Interface of remote computer. The system will use Remote method invocation (RMI) and screen image capturing technique to implement VNC. The viewing of tasks running on target machine Json parsing is used in the proposed system. The application will be executed on android stack as well as mobile phone. The functions such as mouse clicking or keyboard operating, closing tasks, playing media can be perform on server computer. DOI: 10.17762/ijritcc2321-8169.150314

    To enhance collaborative learning and practice network knowledge with a virtualization laboratory and online synchronous discussion

    Get PDF
    This work is licensed under a Creative Commons Attribution 4.0 Internatinal License.Recently, various computer networking courses have included additional laboratory classes in order to enhance students' learning achievement. However, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this case, the Linux operating system can be used to operate network devices and the virtualization technique can include multiple OSs for supporting a significant number of students. In previous research, the virtualization application was successfully applied in a laboratory, but focused only on individual assignments. The present study extends previous research by designing the Networking Virtualization-Based Laboratory (NVBLab), which requires collaborative learning among the experimental students. The students were divided into an experimental group and a control group for the experiment. The experimental group performed their laboratory assignments using NVBLab, whereas the control group completed them on virtual machines (VMs) that were installed on their personal computers. Moreover, students using NVBLab were provided with an online synchronous discussion (OSD) feature that enabled them to communicate with others. The laboratory assignments were divided into two parts: Basic Labs and Advanced Labs. The results show that the experimental group significantly outperformed the control group in two Advanced Labs and the post-test after Advanced Labs. Furthermore, the experimental group's activities were better than those of the control group based on the total average of the command count per laboratory. Finally, the findings of the interviews and questionnaires with the experimental group reveal that NVBLab was helpful during and after laboratory class

    Open and Low-Cost Virtual and Remote Labs on Control Engineering

    Get PDF
    This paper presents an open course in the University Network of Interactive Laboratories, which offers several virtual and remote laboratories on automatic control, accessible to anyone. All the details on one of these labs (a two electric coupled drives system that allows performing control practices in a 2 Ă— 2 MIMO system with industrial applications) and the activities that can be performed with it are given. We use a low-cost solution for developing the virtual and remote labs shared in this open course, based on the use of a free authoring tool Easy Java/Javascript Simulations (EJsS) for building the laboratories' user interfaces and a cheap development platform board (BeagleBone Black). The virtual and remote labs are deployed into a free Learning Management System (Moodle) Web environment that facilitates their management and maintenance

    A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills

    Get PDF
    In the practical study of cybersecurity, students benefit greatly from having full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks. This paper describes an approach, used successfully at Northumbria University, in which students have control of an off-campus network laboratory, with a dedicated connection to the Internet. The laboratory is flexible enough to allow the teaching of general purpose networking and operating systems courses, while also supporting the teaching of cybersecurity through the safe integration of honeypot devices. In addition, the paper gives an analysis of honeypot architectures and presents two in detail. One of these offers students the opportunity to study cybersecurity attacks and defences at very low cost. It has been developed as a stand-alone device that also can be integrated safely into the laboratory environment for the study of more complex scenarios. The main contributions of this paper are the design and implementation of: an off-campus, physical network laboratory; a small, low-cost, configurable platform for use as a “lightweight” honeypot; and a laboratory-based, multi-user honeypot for large-scale, concurrent, cybersecurity experiments. The paper outlines how the laboratory environment has been successfully deployed within a university setting to support the teaching and learning of cybersecurity. It highlights the type of experiments and projects that have been supported and can be supported in the future

    Using a Virtual Computing Laboratory to Foster Collaborative Learning for Information Security and Information Technology Education

    Get PDF
    Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments/surveys. The analysis of the data collected from both versions of the activity showed that students who performed the collaborative version of the activity benefited more than students who completed it on their own with respect to their learning and attitudes towards the subject areas covered in the laboratory activities

    Remote access forensics for VNC and RDP on Windows platform

    Get PDF
    There has been a greater implementation of remote access technologies in recent years. Many organisations are adapting remote technologies such as Virtual Network Computing (VNC) and remote desktop (RDP) applications as customer support application. They use these applications to remotely configure computers and solve computer and network issues of the client on spot. Therefore, the system administrator or the desktop technician does not have to sit on the client computer physically to solve a computer issue. This increase in adaptation of remote applications is of interest to forensic investigators; this is because illegal activities can be performed over the connection. The research will investigate whether remote protocols and applications do produce and leave valuable artefacts behind on Windows systems. The research aim to determine and retrieve any artefacts left behind remote protocols and applications in a forensic manner. Particular remote applications are selected to perform the research on and initial analysis will be performed on the applications to evaluate the potential forensic artefacts present on the computer system. The research will focus on Windows XP service packs 1, 2 & 3 for analysis of the remote applications and find out what artefacts if any are left behind these systems
    corecore