1.Software Name:Cyber Data Recorder Client/Server V1.5 2.Development Language: VC++ 3.Database Support:MS SQL Server 4.Required Environment For Server:Windows 2000/ XP/ 2003 5.Required Environment For Client:Windows 2000/ XP/ 2003 6.Product Content:We provide our software's complete source or further-development and detailed using guide for it. Please Contact Us If you need the software(E-Mail:[EMAIL PROTECTED]) E-Mail:filtersoft#126.com
7.Introduction : The system can monitor HTTP,E-mails(SMTP,POP3,Webmail),FTP,IM(MSN,Yahoo,ICQ,QQ,Skype),etc. It records browsed websites' contents(With HTTP),E-Mail's content and attachments,Files Transferred by FTP, IM chatting contents. The system includes: running programs logs , Logs of modifying,removing,deleting files. Terminate unnecessary programs forcely. Software and hardware management. Record remote desktop's video in real-time. Control remote desktop through mouse and keyboard. View active desktop in 1-9 minutes. Manage Employee's Internet time in different time section. Allow/Deny running committed programs. Allow/ Deny using the USB or other record devices. Network flux chart and related report. Website's black list. Allow/Deny uploading/downloading files. Block using IM (MSN,Yahoo,QQ). Allow/Deny using committed protocols. Allow/Deny using committed ports. Block browsing related websites by keywords. It uses Client/Server mode. Monitored data is sent to server immediately. The system includes several components: client programs,Server programs,Web management programs ( B/S Mode ) . Distribution programs in AD Environment (For installing client's programs automatically). It can monitor all PCs in LAN or WAN, even a portable computer in WAN. The system monitors and manages employee's Internet behaviors, For example, Who does he chat to? What ‘s the chatting content? What websites he browsed? What files he deleted or modified?You can view his desktop's video in real-time. It can also monitor the computers in different WAN. 8.System's Functions: (1)The server can monitor the computers in local company or sub-companies in different areas. Even a portable computer. (2)It supports monitoring and recording different data when different accounts are used in a computer. It can also monitor a terminal PC (without CPU or hard disk). (3)It can define different groups and rules according to different departments. The same group can also define different rules for easy management. (4)It records employee's browsed website's contents (through HTTP), You can search related browsing information and understand the browed website's lists of different time sections through the Web management tools. (5)it records the IM(MSN,Yahoo,ICQ,QQ,Skype)chatting contents,related accounts and their transferring time. (6)You can export the IM (MSN,Yahoo,ICQ,QQ,Skype) logs to TXT Files. (7)You can view the logs of files transferred from WAN to LAN. (8)You can view logs of executed programs to learn employee's detailed running information. (9)It can record the logs of modifying,deleting ,moving,Adding the files in the computers. (10)It can define different rules according to different accounts or define allowable using time or block using HTTP,POP3,SMTP,FTP,MSN,Yahoo,ICQ,QQ etc. (11)"Deny Only" and "Allow Only" can be set in the website's black/white list. You can also block related websites according to the predefined URL keywords. (12)It records all transferred E-Mails (POP3,SMTP,Webmail)and their attachments. (13)It can save and backup all the files transferred by FTP. (14)It records the remote desktop's video (From 15 seconds To 15 minutes) . For saving disk space it records the desktop image's data only when the mouse is moved or keyboard pressed. (15)It runs in hidden mode (uneasy to be found). It can't be manually terminated or removed without permission. (16)"Open Only" And "Allow Only" can be set to restrict using related ports (like a firewall). (17)It can Allow/Deny "upload" or " download" related files for HTTP,FTP,MSN,Yahoo,ICQ etc. For example, Block downloading ZIP files,videos etc. (18)Allow/Deny using USB or removable hard disk, recording devices, Floppy disk, CD-ROM. Compact Disc, For example, you can set to permit copying in but block coping out. (19)You can forcedly terminate unauthorized running programs of monitored PCs from the server. (20)It provides the clients' hardware and software's management function; you can build related report through the system for convenient management. (21)New function: "Search Info" : You can search related client's information by keywords which can improve your work efficiency if you have many clients to monitor. (22)"Rent IP Server" function. If your PC doesn't have a fixed IP Address, You may "rent" the function to monitor your computers in a WAN. (23)Network Flow Stat. and chart function for quickly understand the PC's flow situations. (24)Warning Appears if client PC is offline for more than three days. (25)It provides nine video windows for monitoring client's desktop. You can set the refresh rate and configure the shortcut key to switch among the different windows. (26)Main server's IP and spare server's IP groups function. When the main server stop running, The client programs can automatically switch to other servers according to the setting order for avoiding data losses. (27)If all servers stop running, to avoid data losses, the client programs can automatically save all data into local computer. When the server resume running. The programs immediately transfer the data to the server. (28)Web Management tool is also provided. Using different accounts, Managers in different departments can log in the system through the tool to manage and monitor the PCs. 29."Allow Only" and "Deny only" setting to restrict running programs at client PC. Which can prevent employee installing or running illegal programs. 30.You can select only part protocols and rules to monitor. For example, you can set to record only sending mails by SMTP but ignore received mails by POP3. 31.Auto-update function is provided. When the server is updated. All client programs will be auto-updated. 32.All monitored PCs can be forcedly installed the client program in AD domain server mode for easily management. 33.You can easily backup and resume the database in the server. 34.You can set to prevent transferring files/videos/literal contents in IM[MSN,Yahoo,ICQ,QQ,Skype). 35.You can restrict the specific accounts from being used in IM(MSN,Yahoo,ICQ,QQ,Skype]. -- View this message in context: http://www.nabble.com/Cyber-Data-Recorder-Client-Server-tf4004766.html#a11373515 Sent from the MySQL - General mailing list archive at Nabble.com. -- MySQL General Mailing List For list archives: http://lists.mysql.com/mysql To unsubscribe: http://lists.mysql.com/[EMAIL PROTECTED]