Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
The project aims to develop various network utilities which are required to effectively monitor, control via GSM and to provide security to a LAN network. It aims to develop an integrated software solution that allows a network administrator to monitor, control his LAN also by providing Security to the Hardware resources which is the essential property of any Network lab, In a concern, computers are grouped together to form a network to manage and control activities of network which very panic task for administrator to release some sort of pressure we have integrated three modules into one. This project is to provide the maximum control over the client’s pc, security to the hardware resources about the network to the administrator, maximum control via GSM Modem on the his mobile phone when admin is away from Network lab
Authors and Affiliations
Amir Sheikh , Mr. Rahul Hendawe , Mr. Rajnish Singh , Mr. Anmol Rohan
DATA STORAGE SECURITY IN CLOUD BY USING JAR FILES AND HIERARCHICAL ID-BASED CRYPTOGRAPHY
Cloud computing is one of the most modern research areas due to its ability to decrease costs coupled with computing while growing scalability and flexibility for computing services. Cloud computing is one of the gre...
Techniques for Reducing Power in Multipliers
In this work, a new topology was proposed to optimize the power dissipation of Multipliers. Low power digital Multiplier Design based on bypassing technique mainly used to reduce the switching power dissipation....
Selfishness of Discriminate Node in Caching Based Wireless Sensor Network
The size of wireless sensor node is small and the battery power of these sensor nodes is also limited. The wireless sensor nodes consume battery power in transmitting, processing the data. Generally, Wireless sen...
Improving authentication mechanism for using extended public key cryptography in mobile adhoc network
Mobile ad hoc network is a special kind of wireless networks formed without any centralized administration. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile ad hoc networ...
Image Steganography With LSB
:The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modif...