1.Software Name:Cyber Data Recorder Client/Server V1.5
2.Development Language: VC++
3.Database Support:MS SQL Server
4.Required Environment For Server:Windows 2000/ XP/ 2003
5.Required Environment For Client:Windows 2000/ XP/ 2003
6.Product Content:We provide our software's complete source or
further-development and detailed using guide for it. Please Contact Us If
you need the software(E-Mail:[EMAIL PROTECTED])
E-Mail:filtersoft#126.com


7.Introduction :
   The system can monitor
HTTP,E-mails(SMTP,POP3,Webmail),FTP,IM(MSN,Yahoo,ICQ,QQ,Skype),etc. It
records browsed websites' contents(With HTTP),E-Mail's content and
attachments,Files Transferred by FTP, IM chatting contents. The system
includes: running programs logs , Logs of modifying,removing,deleting files.
Terminate unnecessary programs forcely. Software and hardware management.
Record remote desktop's video in real-time. Control remote desktop through
mouse and keyboard. View active desktop in 1-9 minutes. Manage Employee's
Internet time in different time section. Allow/Deny running committed
programs. Allow/ Deny using the USB or other record devices. Network flux
chart and related report. Website's black list. Allow/Deny
uploading/downloading files. Block using IM (MSN,Yahoo,QQ). Allow/Deny using
committed protocols. Allow/Deny using committed ports. Block browsing
related websites by keywords. It uses Client/Server mode. Monitored data is
sent to server immediately.
The system includes several components: client programs,Server programs,Web
management programs ( B/S Mode ) . Distribution programs in AD Environment
(For installing client's programs automatically). It can monitor all PCs in
LAN or WAN, even a portable computer in WAN.
The system monitors and manages employee's Internet behaviors, For example,
Who does he chat to? What ‘s the chatting content? What websites he browsed?
What files he deleted or modified?You can view his desktop's video in
real-time. It can also monitor the computers in different WAN.
8.System's Functions: 
(1)The server can monitor the computers in local company or sub-companies in
different areas. Even a portable computer. 
(2)It supports monitoring and recording different data when different
accounts are used in a computer. It can also monitor a terminal PC (without
CPU or hard disk).
(3)It can define different groups and rules according to different
departments. The same group can also define different rules for easy
management.
(4)It records employee's browsed website's contents (through HTTP), You can
search related browsing information and understand the browed website's
lists of different time sections through the Web management tools.
(5)it records the IM(MSN,Yahoo,ICQ,QQ,Skype)chatting contents,related
accounts and their transferring time.
(6)You can export the IM (MSN,Yahoo,ICQ,QQ,Skype) logs to TXT Files.
(7)You can view the logs of files transferred from WAN to LAN.
(8)You can view logs of executed programs to learn employee's detailed
running information.
(9)It can record the logs of modifying,deleting ,moving,Adding the files in
the computers.
(10)It can define different rules according to different accounts or define
allowable using time or block using HTTP,POP3,SMTP,FTP,MSN,Yahoo,ICQ,QQ etc.
(11)"Deny Only" and "Allow Only" can be set in the website's black/white
list. You can also block related websites according to the predefined URL
keywords.
(12)It records all transferred E-Mails (POP3,SMTP,Webmail)and their
attachments.
(13)It can save and backup all the files transferred by FTP.
(14)It records the remote desktop's video (From 15 seconds To 15 minutes) .
For saving disk space it records the desktop image's data only when the
mouse is moved or keyboard pressed.
(15)It runs in hidden mode (uneasy to be found). It can't be manually
terminated or removed without permission.
(16)"Open Only" And "Allow Only" can be set to restrict using related ports
(like a firewall).
(17)It can Allow/Deny "upload" or " download" related files for
HTTP,FTP,MSN,Yahoo,ICQ etc. For example, Block downloading ZIP files,videos
etc. 
(18)Allow/Deny using USB or removable hard disk, recording devices, Floppy
disk, CD-ROM. Compact Disc, For example, you can set to permit copying in
but block coping out.
(19)You can forcedly terminate unauthorized running programs of monitored
PCs from the server. 
(20)It provides the clients' hardware and software's management function;
you can build related report through the system for convenient management.
(21)New function: "Search Info" : You can search related client's
information by keywords which can improve your work efficiency if you have
many clients to monitor.
(22)"Rent IP Server" function. If your PC doesn't have a fixed IP Address,
You may "rent" the function to monitor your computers in a WAN.
(23)Network Flow Stat. and chart function for quickly understand the PC's
flow situations.
(24)Warning Appears if client PC is offline for more than three days. 
(25)It provides nine video windows for monitoring client's desktop. You can
set the refresh rate and configure the shortcut key to switch among the
different windows.
(26)Main server's IP and spare server's IP groups function. When the main
server stop running, The client programs can automatically switch to other
servers according to the setting order for avoiding data losses.
(27)If all servers stop running, to avoid data losses, the client programs
can automatically save all data into local computer. When the server resume
running. The programs immediately transfer the data to the server.
(28)Web Management tool is also provided. Using different accounts, Managers
in different departments can log in the system through the tool to manage
and monitor the PCs.  
29."Allow Only" and "Deny only" setting to restrict running programs at
client PC. Which can prevent employee installing or running illegal
programs.
30.You can select only part protocols and rules to monitor. For example, you
can set to record only sending mails by SMTP but ignore received mails by
POP3.
31.Auto-update function is provided. When the server is updated. All client
programs will be auto-updated.
32.All monitored PCs can be forcedly installed the client program in AD
domain server mode for easily management.
33.You can easily backup and resume the database in the server.
34.You can set to prevent transferring files/videos/literal contents in
IM[MSN,Yahoo,ICQ,QQ,Skype).
35.You can restrict the specific accounts from being used in
IM(MSN,Yahoo,ICQ,QQ,Skype].
-- 
View this message in context: 
http://www.nabble.com/Cyber-Data-Recorder-Client-Server-tf4004766.html#a11373515
Sent from the MySQL - General mailing list archive at Nabble.com.


--
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/[EMAIL PROTECTED]

Reply via email to