Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
02-14-2009, 06:58 AM
|
#1
|
LQ Newbie
Registered: Jan 2009
Posts: 10
Rep:
|
software for monitoring use of peripherals in a LAN
hello there,
i'm working on a project pertaining to disabling of USB periherals in stand alone LANs where the server PC is on linux OS and client PCs are either windows or linux based OS.
Is it possible to run a trojan program on client PCs by command of the server PC i.e i have a trojan program whose purpose is to run on the cilent PCs and keep intimating the server PC as to which client PC has just accessed its USB peripheral and for what purpose eg USB mouse,USB mass storage devices etc. This way the server PC can monitor all the clients and whenever any client PC accesses its USB then a pop up comes on the screen of server PC giving the IP address of the PC using the USB and type of peripheral used.
other requirements are:
1. Where can i get such a trojan for the task as mentioned above.Are there any sites where i can get the program codes for such a program?
2. Will such a trojan run on LINUX and windows OS?
Thanx
|
|
|
02-14-2009, 07:10 AM
|
#2
|
LQ Guru
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
|
reported to mods ... I have a feeling requesting a trojan is illegal, no matter what purpose you say you have for it.
|
|
|
02-14-2009, 07:53 AM
|
#3
|
Moderator
Registered: May 2001
Posts: 29,415
|
If you substitute "monitoring" for "trojan" then yes, it should be possible to monitor a GNU/Linux host for accessing peripherals and send logging to a remote syslog server for further processing. For instance USB mass storage devices are represented as SCSI block devices, see an example using HAL: http://www.linuxquestions.org/questi...b-port-692836/. As far as the mcrsft side of things is concerned I don't know and I don't want to know and I'm just not interested in that. If the OP actually meant to use a trojan this thread should indeed be dealt with.
|
|
|
02-14-2009, 12:23 PM
|
#4
|
Senior Member
Registered: Feb 2002
Location: harvard, il
Distribution: Ubuntu 11.4,DD-WRT micro plus ssh,lfs-6.6,Fedora 15,Fedora 16
Posts: 3,233
|
if you dont want usb at all and you have physical sccess to the machine it might be just eaiser to turn off the usb ports in the machine's bios depending on the bios and password protect bios setup.
but if thats not what you want then yes, linux does keep logs of events as unspawn mentioned and it would be easy with the right program to monitor those events and notfy a program on the server or send an email to an administrator, depending on the purpose of why you are doing this
as mentioned above, trojan implies illicit monitoring whereas there are legitimate uses for such programs, such as in a workplace that forbids use of usb mass storage devices, monitoring for employees who violate said rule.
Last edited by frieza; 02-14-2009 at 12:28 PM.
|
|
|
02-14-2009, 10:13 PM
|
#5
|
LQ Newbie
Registered: Jan 2009
Posts: 10
Original Poster
Rep:
|
thanx for your replies.......
i was not aware of a trojan requisition being illegal. However, i have my self reported this to the moderator and requested him to delete this thread. I think i have made a mistake of using the word trojan.
|
|
|
02-14-2009, 10:24 PM
|
#6
|
LQ Guru
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733
|
Look at PolicyKit for controlling whether a user on a Linux host is permitted to mount a usb device. If you unload kernel modules that are used with usb, you might also disable other usb devices. You could also create udevinfo rules that trigger on the the UUID of an external device, allowing only certain external drives (such as a backup drive) to have nodes created.
Last edited by jschiwal; 02-14-2009 at 10:48 PM.
|
|
|
02-15-2009, 04:24 AM
|
#7
|
LQ Guru
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
|
Quote:
Originally Posted by 24653
I think i have made a mistake of using the word trojan.
|
I agree, if you want a monitoring app, say you want a monitoring app, not a trojan.
Quote:
In the context of computing and software, the term Trojan horse, also known as a trojan, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse.
|
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
|
|
|
02-15-2009, 04:33 AM
|
#8
|
LQ Guru
Registered: Nov 2003
Location: N. E. England
Distribution: Fedora, CentOS, Debian
Posts: 16,298
Rep:
|
Quote:
Originally Posted by 24653
thanx for your replies.......
i was not aware of a trojan requisition being illegal. However, i have my self reported this to the moderator and requested him to delete this thread. I think i have made a mistake of using the word trojan.
|
I've edited the title of your thread. I'll leave the thread open for now because it does not appear that you are looking for help to do something illegal.
|
|
|
All times are GMT -5. The time now is 11:50 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|