cybercon documentation
TRANSCRIPT
-
8/3/2019 CyberCon Documentation
1/14
CyberCon v1.0The Ultimate Cyber Control Software
Submitted By,
Shoaib Mohammed A, II B.E. EEE,
Paavai Engineering College,Paavai Nagar,Pachal,
Namakkal-18.
-
8/3/2019 CyberCon Documentation
2/14
System Requirements (Minimum)
Pentium II or any equivalent processor (Client) Pentium III or any equivalent processor (Server)
128 MB of system RAM
Windows 98/XP Operating System (WinXP Recommended) LAN Connection between all Clients and Server
Color Monitor which is compatible with 1024x768 Display
Languages Used
The whole of the CyberCon has been developed using Microsoft VisualBasic 6.0 for Front-End and Ms-Access for Back-End.
-
8/3/2019 CyberCon Documentation
3/14
Abstract
Until now, only a few centers had been the popular cyber centers becauseof their complete automation and human interruption freeness. But from now on,every cyber center, no matter small or large, has the same opportunity of getting
popularity and fame.
This is a prototype networking software which is just enough to deal up tothe complete automation of cyber centers. It helps cyber owners to forget theirworries about the login and logout time of their customers. It completelyautomates all the possible actions performed by humans in a cyber center. It alsooffers security and reliability. It is free from human errs and hence it providescomplete satisfaction to the customers also.
This software which works by inter-network communication is possible ofmanaging multiple clients with a great ease. No Network Problems, no user
queue for login. It is completely user friendly and hence it ensures that thecustomers like it the most.
CyberCon
I have named this software as CyberCon which stands for CyberConnector. As the name itself says, it is capable of connecting multiple systemsacross the cyber network. The CyberCon is capable of working on its own without any external guidance. With its built-in security policies, its offers completereliability for the CyberCon owner and users.
The CyberCon owner just needs to Create a key (Card Number) to thelocal database specifying the time for the corresponding key. The next thing hehas to do is to give the key to users through cards (or through any other means).Then the user can go to any client system and use the card number for creatinga new account with user name and password. The time for the correspondingcard number is credited to his/her account. The user can then logon using thesame user name and password.
The account will be valid till a non-zero balance. When the balance dropsto zero, the account is closed and the user is logged out automatically. Inaddition to this, the user can log out of the server at any time he wills. Thebalance will not be reduced after this and his account would be locked for futureuse. The user can later then logon and use the balance time.
In addition to the feature of creating a new user, CyberCon also providesthe facility of renewing an invalidated account. So, the users can have theirunique User name and password without the fear of being deactivated.
-
8/3/2019 CyberCon Documentation
4/14
Server
The server system is the main system for a CyberCon network. All theclients are connected to the server. The Clients send their requests to the serverand the server processes the request and resends the processed output to the
appropriate client. The server also monitors the working of the clients and keepstrack of the active clients.
Working of Server
Communication
The CyberCon uses Microsoft Winsock control to communicate toits clients. The clients also use the same method to communicate to the Server.The Winsock control uses Port-to-Port communication which is a quite reliablemethod of communication across the network. An UDP protocol is used to
establish the connection between the server and the client.
Communication Language
The server and client communicate to each other by passing thecommands (Messages) within Token values. There are totally four delimiterswhich specify which action to be performed and they are
1. Command
Whenever a command statement is encountered by the software,the command is executed with the highest priority
2. Request
Whenever a Request statement is encountered by the software, therequest is treated with least priority when compared to the priority of thecommand
3. Display
The display command is used to display any message. No processis made for the Display command. The message to be displayed is displayed tothe client through Balloon Message Boxes
4. Pulse
A pulse statement, unlike the above two statements is independentand has no token values. The pulse is sent only by the server to all its activeclients. The clients only work as long as the pulse is being received from the
-
8/3/2019 CyberCon Documentation
5/14
server. So, when the server is shut down, the pulse being sent to its clients alsoshuts down. As a result, all the active clients lock themselves until any furtherpulse is received from the server. A grace period of 20 Seconds has been givenbefore the clients lock up within which the Server has to recover for the clients toremain open. This ensures that the server and clients are connected all the time
and no loss of data packets takes place.
Tokens
The Token values specify what actions have to be performed bywhom and where. All the Tokens begin with a ''. This marksthe starting token whereas the ending token begins with a ''.
Example
[COMMAND]user1
pass1
XXXXXXIn the above example, a command is given to the server that alogin request has been made by machine XXXXXX for username 'user1' andpassword 'pass1'.
The server then processes the clients request and checks for theuser in the local database and checks whether the password is correct and thatwhether any time is remaining in that particular account. The server then sendsthe processed results as below
If The Username & Password are correct and if there is a timebalance then a command as below is sent
[COMMAND]
User Data Storage
The user datas are stored in a local database. The database is located inthe server and is protected from the client. The datas are accesses usingDatabase controls Ms-Access as Back end.
Working of Client
Protection
It is easy to End any process through the Task Manager. Thus, it isalso feasible for the users to shut down the CyberCon client using the taskmanager. Thus, a separate policy has been created to By-Pass the system Taskmanager access. Thus, the client is secure from the danger of being closed.Whenever an attempt is made to shut down the client, an alert message is sent
-
8/3/2019 CyberCon Documentation
6/14
to the server. In addition to the alert message sent to the server, the attemptmade to close the client is also averted by Over Riding the close requests sendby windows.
User Friendly
The CyberCon client is made as user friendly as possible. A clientinterface window remains open all the time. This menu has access to twofeatures, which include the Logout and the Call Help commands. The user isprivileged with the Real Time Updating of his Account details such as theBalance Time, the last login time etc. By pressing the logout button, the user islogged out of the server and the client is locked out until another login is madefrom the client.
-
8/3/2019 CyberCon Documentation
7/14
The above picture shows the Login screen for the CyberCon client. Thereare three buttons namely Login, New Account and Renew Account usingwhich the user could do the appropriate action.
DLL
Plug-in have been provided for client for multiple purposes likeprocess management, system management etc. The reason for providing theDLL is due to the reason that they can be updated easily with out affecting themain program.
Installing Procedures
The CyberCon Server has to be unique and can be installed on preferably
a higher configuration system. The server and client can be installed using theirrespective install shields. This doesnt do all. The main part of the CyberConstarts here. Now i have to setup the registry so as the Server and Client come toknow each other. This Feature provides from any external intruder from intrudinginto the server.
-
8/3/2019 CyberCon Documentation
8/14
Setting up the Registry
Client
A Client needs to store the following data in the registry
1. Machine IDThis enables the server to identify the appropriate client. A same
copy of the Machine ID (MID) is stored in the server for recognition purpose.
2. Machine IPThis is set just as a precautionary measure. This stores the IP of
the Machine
Finally we need to press the register button.
Server
The registering of the client details in the server is a complex one,but it is simplified in a method below
All the three details have to be given first before giving 'Add'
1. Machine ID - ListThe Machine ID of the client is given. The Exact ID stored in the
client should be given
2. Machine IP - ListThe Corresponding IP of the Machines with the above Machine ID
is to be given. This could be quite confusing, but it is not a tough job.
Finally we need to press the register button
-
8/3/2019 CyberCon Documentation
9/14
Sever Registration
Step 1: Enter your Machine ID and Machine IP of Your Client. You Can Add Multiple Clients. TheMachine ID should be Unique
-
8/3/2019 CyberCon Documentation
10/14
NOTE: Improper Registry Setting will lead to Improper/Non working of CyberCon system
Shutting Down the Task Manager
The task manager has to be disabled manually (Permanent basis) by over ridingthe windows default settings using the "Task Disabler" provided with the CyberCon.
Server Interface
The server interface at the start up is show in the picture below. It contains fields
to display the active clients and the users logged in. Also it has two check boxes foremergency purpose. Two Over Ride settings have been provided for use of theadministrator during the emergency.
Manual Over Rides
1) Stop Server Response
This setting over rides any process performed by the server. But theclients remain opened and do not close. This could be used in a casewhen the administrator presumes to encounter any hacking step. All the
hacks would be over ridden by cyber con. Under this circumstance, theuser cannot logout.
2) Lock All Clients
This is also another over ride setting in which all the cyber con clients arelocked up. No login attempt made would be succeeded. But the serverremains open. This could also be used at the time of discrepancies.
-
8/3/2019 CyberCon Documentation
11/14
Server Interface with one active client and no user logged in
Server Interface with One active client and one user Logged in
-
8/3/2019 CyberCon Documentation
12/14
Server with Response Over Ride setting Enabled
Status bar showing the Over ride status
-
8/3/2019 CyberCon Documentation
13/14
A Simple CyberCon Network
Client 1
Client 3Client 2
Server
I/O Pipes
Client 1
Client 2
Client 3
Server
-
8/3/2019 CyberCon Documentation
14/14
ADVANTAGES
Complete automation gives us a great relief
bord
high standard environmentr Large scale
tation
I can go on specifying the advantage of this software as we all know that
pplication
This software is implemented for a small scale purpose i.e. LAN i.e. just
onclusion
In this software, I have put my innovative ideas and hope that the best of it
I have presented my best through this software and hope that it would be
Security features prevent maximum hacks User needs no external assistance User finds easy to work Saves a lot of Manual La A Lot of Paper work is reduce Provides the cyber center with a Cheap and best when compared to Lacks of Rupees given fo
software ( Taking a agreement from Sify or any other such organizationscosts Lacks of rupees)No Account Expiry Limi
there is no current implementation of this type of software in a small scale basis.
A
within a cyber center. Any future use of it would surely inspire for a large scaledevelopment in WAN basis.
C
would benefit for the future of the world. I am planning to develop a large scaleproject of this even if there is any least sign of success. But I surely do hope forthe best.
liked by all.