Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. Visual Basic
  4. How to monitor the sites open on particular pc

How to monitor the sites open on particular pc

Scheduled Pinned Locked Moved Visual Basic
helptutorialsysadmin
22 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    Sumit Prakash Sharma
    wrote on last edited by
    #1

    My problem is that i want to know the web sites open in my network's pc so that i could monitor all the web site open on that computer. i want to develop a desktop application that will be install on each machine and will keep the url information and at particular time it will send an email containing all the requested URLs. Please help and guide me.

    M L 2 Replies Last reply
    0
    • S Sumit Prakash Sharma

      My problem is that i want to know the web sites open in my network's pc so that i could monitor all the web site open on that computer. i want to develop a desktop application that will be install on each machine and will keep the url information and at particular time it will send an email containing all the requested URLs. Please help and guide me.

      M Offline
      M Offline
      Mycroft Holmes
      wrote on last edited by
      #2

      Surely all this information is already available to the network administrator in various logs. This has more than a wiff of malicious software X|.

      J D 2 Replies Last reply
      0
      • M Mycroft Holmes

        Surely all this information is already available to the network administrator in various logs. This has more than a wiff of malicious software X|.

        J Offline
        J Offline
        Johan Hakkesteegt
        wrote on last edited by
        #3

        Either that or 1984 might be good reading for him. ;)

        My advice is free, and you may get what you paid for.

        M 1 Reply Last reply
        0
        • J Johan Hakkesteegt

          Either that or 1984 might be good reading for him. ;)

          My advice is free, and you may get what you paid for.

          M Offline
          M Offline
          Mycroft Holmes
          wrote on last edited by
          #4

          I think he either uses it to put himself to sleep or thinks we are complete idiots. No doubt someone will point him to an article that will allow him to do this.

          S 1 Reply Last reply
          0
          • M Mycroft Holmes

            I think he either uses it to put himself to sleep or thinks we are complete idiots. No doubt someone will point him to an article that will allow him to do this.

            S Offline
            S Offline
            Sumit Prakash Sharma
            wrote on last edited by
            #5

            Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help. so tell me is it possible by vb.net programming or not. Thanks

            A D D T 4 Replies Last reply
            0
            • S Sumit Prakash Sharma

              Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help. so tell me is it possible by vb.net programming or not. Thanks

              A Offline
              A Offline
              Ashfield
              wrote on last edited by
              #6

              Sumit Prakash Sharma wrote:

              Actually there is a client

              here's the crux of it coming....

              Sumit Prakash Sharma wrote:

              it is totally new task for me

              ... won a contract but doesn't know how.... So try google, there should be something there

              Bob Ashfield Consultants Ltd Proud to be a 2009 Code Project MVP

              S 1 Reply Last reply
              0
              • S Sumit Prakash Sharma

                Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help. so tell me is it possible by vb.net programming or not. Thanks

                D Offline
                D Offline
                dan sh
                wrote on last edited by
                #7

                You can have a service that will read the url from the browser and collect it somewhere. Then at a predefined time, it can get all of that and send it in email. Do not rely on checking history since, user can clear it any time and you wont get correct result. Google would tell how to get the url from browser.

                50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                1 Reply Last reply
                0
                • M Mycroft Holmes

                  Surely all this information is already available to the network administrator in various logs. This has more than a wiff of malicious software X|.

                  D Offline
                  D Offline
                  dan sh
                  wrote on last edited by
                  #8

                  Mycroft Holmes wrote:

                  This has more than a wiff of malicious software

                  I don't get that point. How can reading internet history or the current url be malicious? I dont see any extremely important data in URLs which needs to be secured from others. If it was the case, why keep it in url in first place.

                  50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                  M T 2 Replies Last reply
                  0
                  • D dan sh

                    Mycroft Holmes wrote:

                    This has more than a wiff of malicious software

                    I don't get that point. How can reading internet history or the current url be malicious? I dont see any extremely important data in URLs which needs to be secured from others. If it was the case, why keep it in url in first place.

                    50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                    M Offline
                    M Offline
                    Mycroft Holmes
                    wrote on last edited by
                    #9

                    There are existing tools for achieving this, any semi competant network administrator knows how and where to set this type of monitoring up. The person wants to create a monitoring system outside the standard channels that will periodicalyy email all the URL to ... someone. While it may not be malicious it feels that way to me. If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile and any online banking sites you visit. I can tailor a phishing attack directly at you. Scuse me while I just go and get my foil beanie but I recently got an email from my daughter inviting me to facebook, the only clue was that she did not use her married name and sure enough there was a trojan at the other end of the link. If this is innocent I am willing to appologise, but I will not help this person. As Bob said, he got the contract with no knowledge how to acheive the clients needs.

                    Never underestimate the power of human stupidity RAH

                    D 1 Reply Last reply
                    0
                    • S Sumit Prakash Sharma

                      Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help. so tell me is it possible by vb.net programming or not. Thanks

                      D Offline
                      D Offline
                      Dave Kreskowiak
                      wrote on last edited by
                      #10

                      This is what a proxy server is for. You don't install something like this on every client PC. You set it up between your clients and the Internet. The clients browsers would have to do through the proxy to get at the Internet. The proxy does all the filtering for blocked sites and can log all activity.

                      A guide to posting questions on CodeProject[^]
                      Dave Kreskowiak Microsoft MVP Visual Developer - Visual Basic
                           2006, 2007, 2008
                      But no longer in 2009...

                      1 Reply Last reply
                      0
                      • M Mycroft Holmes

                        There are existing tools for achieving this, any semi competant network administrator knows how and where to set this type of monitoring up. The person wants to create a monitoring system outside the standard channels that will periodicalyy email all the URL to ... someone. While it may not be malicious it feels that way to me. If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile and any online banking sites you visit. I can tailor a phishing attack directly at you. Scuse me while I just go and get my foil beanie but I recently got an email from my daughter inviting me to facebook, the only clue was that she did not use her married name and sure enough there was a trojan at the other end of the link. If this is innocent I am willing to appologise, but I will not help this person. As Bob said, he got the contract with no knowledge how to acheive the clients needs.

                        Never underestimate the power of human stupidity RAH

                        D Offline
                        D Offline
                        dan sh
                        wrote on last edited by
                        #11

                        The requirement is awful, I agree. There must be a proxy server to monitor all this. But if the application is for some school/college or something on similar lines, I suspect they would have one.

                        Mycroft Holmes wrote:

                        If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile

                        Absolutely not required. Facebook or many other social profiles can be obtained very easily (just a click away, seriously). Hence I would not waste time in making such application if I had wrong intentions.

                        Mycroft Holmes wrote:

                        If this is innocent I am willing to appologise, but I will not help this person.

                        Sorry, but I don't care. I was just curious why you thought this application malicious.

                        Mycroft Holmes wrote:

                        he got the contract with no knowledge how to acheive the clients needs.

                        True again.

                        50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                        L 1 Reply Last reply
                        0
                        • D dan sh

                          The requirement is awful, I agree. There must be a proxy server to monitor all this. But if the application is for some school/college or something on similar lines, I suspect they would have one.

                          Mycroft Holmes wrote:

                          If I manage to get that app onto your machine, I get all the URLs you visit, I now know your social profile

                          Absolutely not required. Facebook or many other social profiles can be obtained very easily (just a click away, seriously). Hence I would not waste time in making such application if I had wrong intentions.

                          Mycroft Holmes wrote:

                          If this is innocent I am willing to appologise, but I will not help this person.

                          Sorry, but I don't care. I was just curious why you thought this application malicious.

                          Mycroft Holmes wrote:

                          he got the contract with no knowledge how to acheive the clients needs.

                          True again.

                          50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                          L Offline
                          L Offline
                          Lost User
                          wrote on last edited by
                          #12

                          d@nish wrote:

                          Sorry, but I don't care

                          You should, actually; you could get into a heap o' trouble if you aid someone who is breaking the law.

                          I are Troll :suss:

                          L D 2 Replies Last reply
                          0
                          • L Lost User

                            d@nish wrote:

                            Sorry, but I don't care

                            You should, actually; you could get into a heap o' trouble if you aid someone who is breaking the law.

                            I are Troll :suss:

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #13

                            Not in this regard, you have to know before-hand that you are contributing to a malicious cause, in this case this type of functionality could very well be justified. Either way I wouldn't help, but you can't say something like that without justifiable reason behind it. Otherwise you are just fear-mongering.

                            Check out the CodeProject forum Guidelines[^] The original soapbox 1.0 is back![^]

                            L 1 Reply Last reply
                            0
                            • S Sumit Prakash Sharma

                              Actually there is a client, he wants to monitor all the web request, he don't wants to go on particular machine but he wants to receive an email containing that URI/URLs. it is totally new task for me and i thought that code project family member can do everything that's why i need your help. so tell me is it possible by vb.net programming or not. Thanks

                              T Offline
                              T Offline
                              The Man from U N C L E
                              wrote on last edited by
                              #14

                              So your client doesn't know how to use his proxy server, can't be bothered to look in the help, and you have agreed to provide him with something he already has. Monitoring this on each PC is insane when there are already server logs and reporting built in to all proxy server software to give him the information he wants. Or does you client have every machine in the office separately connected to their own individual internet connections? This is a basic network administration task not a programming exercise. Plus of course while you can monitor browser activity and send the visited URL list to someone, that is definitely Hacker territory. Such software exists already and are known as trojan horse viruses, malware etc.

                              If you have knowledge, let others light their candles at it. Margaret Fuller (1810 - 1850) www.JacksonSoft.co.uk

                              S 1 Reply Last reply
                              0
                              • D dan sh

                                Mycroft Holmes wrote:

                                This has more than a wiff of malicious software

                                I don't get that point. How can reading internet history or the current url be malicious? I dont see any extremely important data in URLs which needs to be secured from others. If it was the case, why keep it in url in first place.

                                50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                                T Offline
                                T Offline
                                The Man from U N C L E
                                wrote on last edited by
                                #15

                                Interesting Article on this E-mail-monitoring-may-contravene-European-laws[]. From what I have read, here in Europe, where I am an app on the PC monitoring and reporting internet usage would be in breach of European human rights legislation unless there was a company policy previously in place and enforced stating that the internet cannot be used from company machines for personal use, and that all traffic will be monitored to log business usage (which is lawful). So, what is the purpose of a monitoring application, to enforce the company policy or to check what people are viewing? Enforcing policy would be better done by regulating site access on the proxy server, and checking usage is also best done there even when illegal. So my read on this is that anyone installing software (or writing software for installation) on an end user PC for the purpose of reporting on their internet usage is very likely acting in breach of European law, if that is where the software is used. Seeing as we had a high profile case of a British Hacker being extradited to the U.S. for contravening their laws (not British law where he lived) there is no way I would get involved in something like this, and I would advise anyone else to stay well away. You just don't know where the software will end up with your name on it.

                                If you have knowledge, let others light their candles at it. Margaret Fuller (1810 - 1850) www.JacksonSoft.co.uk

                                S 1 Reply Last reply
                                0
                                • L Lost User

                                  Not in this regard, you have to know before-hand that you are contributing to a malicious cause, in this case this type of functionality could very well be justified. Either way I wouldn't help, but you can't say something like that without justifiable reason behind it. Otherwise you are just fear-mongering.

                                  Check out the CodeProject forum Guidelines[^] The original soapbox 1.0 is back![^]

                                  L Offline
                                  L Offline
                                  Lost User
                                  wrote on last edited by
                                  #16

                                  EliottA wrote:

                                  you have to know before-hand that you are contributing to a malicious cause

                                  It's not that black and white; if the client is a internet-cafe, then he/she might not be aware of the implications of tracking personal data. It's their computers, it's their data. Right? The client might not even have a malicious intent, and still ask you to break the law. Most of us won't be sure whether it's being broken, as an engineer isn't a lawyer. Does that mean that we can thread any law, just because we don't know them? If this is seen as mongering, then please, do accept my apologies. It's not like I just wanted to troll around and spread some paranoia; I just stumbled over an "I don't care" and tried to point out that there's a risk in simply shrugging your shoulders.

                                  I'm a blue cow, stuck at level 74 - still looks like a Troll in a fancy dress :suss:

                                  1 Reply Last reply
                                  0
                                  • L Lost User

                                    d@nish wrote:

                                    Sorry, but I don't care

                                    You should, actually; you could get into a heap o' trouble if you aid someone who is breaking the law.

                                    I are Troll :suss:

                                    D Offline
                                    D Offline
                                    dan sh
                                    wrote on last edited by
                                    #17

                                    It is not in relation to what OP is asking. I said that for Mycroft saying that he would apologize if he was wrong about OP's intentions. I really don't care if he does that or doesn't. He had an opinion, told that to OP. What's wrong in it? I had different opinion, so I gave a different reply.

                                    50-50-90 rule: Anytime I have a 50-50 chance of getting something right, there's a 90% probability I'll get it wrong...!!

                                    1 Reply Last reply
                                    0
                                    • S Sumit Prakash Sharma

                                      My problem is that i want to know the web sites open in my network's pc so that i could monitor all the web site open on that computer. i want to develop a desktop application that will be install on each machine and will keep the url information and at particular time it will send an email containing all the requested URLs. Please help and guide me.

                                      L Offline
                                      L Offline
                                      Lost User
                                      wrote on last edited by
                                      #18

                                      you can use monitoring sofwares like keylogger.

                                      If you can think then I Can.

                                      D 1 Reply Last reply
                                      0
                                      • L Lost User

                                        you can use monitoring sofwares like keylogger.

                                        If you can think then I Can.

                                        D Offline
                                        D Offline
                                        Dave Kreskowiak
                                        wrote on last edited by
                                        #19

                                        A key logger does nothing in this case. Sure, you can get a URL, but you cannot use the content of a site and classify it.

                                        A guide to posting questions on CodeProject[^]
                                        Dave Kreskowiak Microsoft MVP Visual Developer - Visual Basic
                                             2006, 2007, 2008
                                        But no longer in 2009...

                                        1 Reply Last reply
                                        0
                                        • A Ashfield

                                          Sumit Prakash Sharma wrote:

                                          Actually there is a client

                                          here's the crux of it coming....

                                          Sumit Prakash Sharma wrote:

                                          it is totally new task for me

                                          ... won a contract but doesn't know how.... So try google, there should be something there

                                          Bob Ashfield Consultants Ltd Proud to be a 2009 Code Project MVP

                                          S Offline
                                          S Offline
                                          Sumit Prakash Sharma
                                          wrote on last edited by
                                          #20

                                          Actually i don't take contract for this task, i want to reply him that it is possible or not. if possible then i will take contract from him.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups