SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1197
Centralized Tool for Software and USB
Prof. Bhanu Tekwani1, Shubhangi Mishra2, Mythri Ravindra2
1Professor, 2Student
1,2Vidyalankar Institute of Technology, Mumbai, India
How to cite this paper: Prof. Bhanu
Tekwani | Shubhangi Mishra | Mythri
Ravindra "Centralized ToolforSoftware
and USB" Published in International
Journal of Trend in Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-3, April 2019,
pp.1197-1200, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
187.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under the terms of the
Creative Commons
Attribution License
(CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
We propose a standalone application which facilitates a user to sendrequestfor
USB access to the server, and after an approval from the administrator the user
can use the USB. Along with that, the application also generates report for the
administrator regarding hardware configuration and list of software in a
computer, in a given network. Another additional feature includes, automated
and silent software installation in the client computers over a network.
KEYWORDS: Centralized, Remote,Automated,Customized,USB, blocking, Software,
Installation.
I. INTRODUCTION
This paper proposes an application for centralized
management of USB access. Currently, the institute needs a
tool that can help with centralized USB blocking, and if
someone requests permission for USB access then it would
be granted by the server room after authenticating the
requester. This would ensure security because only
authorized users are allowed to access the USB port. Also,
this tool would facilitate remote software installation in the
host computers. If any software is requested from a host
computer, it would be automatically and silently installed
from the client computer to all the computers in the
network. This automated, remoteinstallation foraninstitute
would save a lot of time, energy and cost. This tool can also
generate a report of all the hardware and software
configurations of an individual computer when requested
from the server. The proposed project aims to focus at
developing a centralized network by automated software
installation from a peer to peer machines residing in the
network, silently. This tool will also generate a report of all
the host machines; regarding their hardware and software
list. Thus, this tool helps at integrating many networking
features and managing devices from a remote center with
cost and time efficiency.
LITERATURE SURVEY
[1]In this paper they present the implementation of access
and identity management for endpoint protection and data
security from USB devices to maintain information security
and data theft prevention in a corporate environment. The
vision of this project is to track record and limits the use of
USB devices in a secured environment (network) thus
maintains confidentiality and integrity to meet information
security standards. We are proposing to keep a centralized
repository of allowed devices such as USB keyboard,mouse,
and printer etc. based on organization’s security
standards.[1]
[2] In this paper, we proposed a model that can remotely
perform various software maintenance related actions.
These actions can be software release upgrade, run-time
patching and status monitoring etc. All these actions can be
performed in four different node configuration-standalone,
active-passive, combo and parallel. Proposed modelisa very
simple and scalable in nature which makes it extremely
suitable choice for software maintenance in
telecommunication network.[2]
[3] Ansible is open source software that automatessoftware
provisioning, configuration management, and application
deployment.. it is designed for multi-tier deployments since
day one, Ansible models your IT infrastructurebydescribing
how all of your systems inter-relate, rather than just
managing one system at a time.[3]
IJTSRD23187
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1198
II. EXISTING SYSTEM
Currently, the institute has blocked all the USB ports in all
the computer for the sake of security. If somelegitimateuser
wants to access the USB devices then the system
administrator is called upon. Similarly, if we want to install
any software on any computer the administrator has to
download and install it on every computer personally and
individually. The administrator has no way of knowing the
hardware and software configurations of any computer in
the network unless he/she goes up to the computer.
III. LIMITATION OF EXISTING SYSTEM
In the current system, a lot of time and effort is wasted on
installing software on multiple computers.TheUSBaccessis
blocked permanently whereas its access can be managed
efficiently. The logging of reports of individual computers’
configuration is done nowhere.
IV. PROPOSED SYSTEM
The proposed system is to create a tool for the college which
will give the following features in the following way:
1. Centralized USB blocking and unblocking.
The default setting for all the systems would be to block
the USB device plugged in. If any genuine user wantsthe
access, then the person can send a request to the server
room via a an user interface with authentication using
username and password and the request will be
responded with accepting or rejecting the request for
the access.
2. Remote software installation.
Through a portal, any teacher can request forasoftware
installation in a particular lab and after the
authentication of the requester, the software will be
installed in that lab automatically.
3. Report of all software installed.
Whenever the administrator wants to know about the
software and hardware installed in any one of the host
machines, a report will be generated of that terminal
and sent to the server.
Fig 6.1 Work flow diagram for USB module
Fig 6.2 Work flow diagram for Software installation
V. METHODOLOGY
Server side:
Server side application has a login page and after successful
login in database connection, a dashboard frame is opened.
The dashboard contains two tabs; one to keep track of USB
requests and other gives the option to generate reports of
the client computers in the network.
The USB tab:
This tab contains a table which extractstherequests entered
in the database from the client side. Each row displays the
detail of the request such as the IP address, hostname, MAC
address, and two buttons labelled “Enable” and “Disable”.
The administrator can allow or deny the request. The
response is updated in the database and fetched from the
client side application. As soon as any response is provided
for a row, the row is removed from the table of the tab. The
database will have the log of USB requests received by the
server.
The Report tab:
This tab contains a table with details of the computers
present in the network: IP address, hostname and two
buttons available: one for software report request and
another for hardware configuration report request to the
client machine.
The communication between the server and the client is
done using TCP/IP connection. The client is listening
continuously on the port 5000. As soon as the request is
generated, it connects to the client port and file transfer
takes place from the client machine to the server machine.
These files are stored in the “reports” folder with the
hostname and timestamp as the name of the file and can be
accessed at any point of time. This file is read and the
content is displayed on the text frame present on the UI.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1199
Client side:
Server side application has a login page and after successful
login in database connection, a dashboard frame is opened.
The dashboard contains two tabs; one to keep track of USB
requests and other gives the list of software in the database.
The USB tab:
The user can send request for USB access to the server. Only
after the access permission from server, the USB will be
enabled unless it will be disabled. Even after the USB access
given, the USB will be disabled after a timeout of few
minutes say, 20 minutes, predefined by the administrator.
Software tab:
There will be a list of software from the database. After
clicking on a software, the software will beinstalled inthe all
the computers in a given range of ip address in the network.
This will save time and effort of installing software in a
multiple computers in a single click.
VI. IMPLEMENTATION SCREENSHOTS:
4.1: Client side :
Fig: 4.1.1 Login page
Fig 4.1.2 Request for USB access
Fig 4.1.3 Database entry for requests
Fig 4.1.4 Request response for access
4.1.2. Server side:
Fig 4.2.1 Login page
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1200
Fig 4.2.2 List of requests
Fig 4.2.3 Reports generated saved in a folder
withtimestamp.
Fig 4.2.4. List of software
VII. ADVANTAGES OF PROPOSED SYSTEM
1. Centralized system.
2. Automated system.
3. Saves time and effort.
4. Cost of the institute is saved.
5. No manual labor is required.
6. The system is more organized and efficient.
7. The system has become more organized.
VIII. CONCLUSION
Data protection and data maintenance is one of the biggest
administrational concern of the institute. This application
aims at legitimate access and usage of the USB devices. This
tool is centralized at its core, hence, the access permission
can only be granted by the server administrator after
authenticating the user. With the help of this project, we
focus on reducing the time, cost and effort that goes into the
logging of information of the individual computers in the
network. The administrator can know about the hardware
configuration as well as the software installed in each
computer. Plus, the files of those reports can also be stored
on the server side. The effort of installing a single software
on to multiple computers is reduced down to one click on a
computer and that software will installed in all the
computers in the given network.
REFERENCES
[1] Saurabh Verma, Abhishek Singh. Data theft prevention
& endpoint protection from UnauthorizedUSBdevices.
IEEE- Fourth International Conference on Advanced
Computing, ICoAC 2012 MIT, AnnaUniversity,Chennai.
December 13-15, 2012.
[2] Promila Jangra, Soma Das, Sandeep Kumar Khurana.
Remote software maintenance system for telecom
network. 2017 International Conference on Advances
in Computing, Communications and Informatics
(ICACCI).
[3] Using Ansible for network automation.CellStream,Inc.
www.ansible.com
[4] https://emcosoftware.com/remote-installer
[5] https://www.remoteutilities.com/support/docs/remo
te-install-tool/
[6] https://4sysops.com/archives/free-usb-blocker-
centralized-access-control-for-usb-devices/
[7] https://www.usb-lock-rp.com

More Related Content

What's hot

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
Audit and security application report
Audit and security application reportAudit and security application report
Audit and security application reportRihab Chebbah
 
IRJET- Screen Monitoring using Windows Service
IRJET- Screen Monitoring using Windows ServiceIRJET- Screen Monitoring using Windows Service
IRJET- Screen Monitoring using Windows ServiceIRJET Journal
 
Ijret20120103031 head line mismatch
Ijret20120103031 head line mismatchIjret20120103031 head line mismatch
Ijret20120103031 head line mismatcheSAT Journals
 
IBM System i Security Study 2013
IBM System i Security Study 2013IBM System i Security Study 2013
IBM System i Security Study 2013Keith Braswell
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemImplementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemeSAT Publishing House
 
College Information System using Android
College Information System using AndroidCollege Information System using Android
College Information System using Androidijtsrd
 
Online Examination System using Raspberry pi
Online Examination System using Raspberry piOnline Examination System using Raspberry pi
Online Examination System using Raspberry piijceronline
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA AuditDavid Sweigert
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
Smart irrigation system and plant disease detection
Smart irrigation system and plant disease detectionSmart irrigation system and plant disease detection
Smart irrigation system and plant disease detectionIRJET Journal
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
 
IRJET - Acet Sports Alert
IRJET - Acet Sports AlertIRJET - Acet Sports Alert
IRJET - Acet Sports AlertIRJET Journal
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 

What's hot (20)

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Audit and security application report
Audit and security application reportAudit and security application report
Audit and security application report
 
IRJET- Screen Monitoring using Windows Service
IRJET- Screen Monitoring using Windows ServiceIRJET- Screen Monitoring using Windows Service
IRJET- Screen Monitoring using Windows Service
 
Ijret20120103031 head line mismatch
Ijret20120103031 head line mismatchIjret20120103031 head line mismatch
Ijret20120103031 head line mismatch
 
IBM System i Security Study 2013
IBM System i Security Study 2013IBM System i Security Study 2013
IBM System i Security Study 2013
 
Srs document
Srs documentSrs document
Srs document
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemImplementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast system
 
College Information System using Android
College Information System using AndroidCollege Information System using Android
College Information System using Android
 
Online Examination System using Raspberry pi
Online Examination System using Raspberry piOnline Examination System using Raspberry pi
Online Examination System using Raspberry pi
 
I03402059063
I03402059063I03402059063
I03402059063
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
Icuautomation
IcuautomationIcuautomation
Icuautomation
 
Smart irrigation system and plant disease detection
Smart irrigation system and plant disease detectionSmart irrigation system and plant disease detection
Smart irrigation system and plant disease detection
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
20120130406025
2012013040602520120130406025
20120130406025
 
IRJET - Acet Sports Alert
IRJET - Acet Sports AlertIRJET - Acet Sports Alert
IRJET - Acet Sports Alert
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 

Similar to Centralized Tool for Software and USB

IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book LocatorIRJET Journal
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case studyeSAT Publishing House
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
IRJET- Online Programming Environment
IRJET- Online Programming EnvironmentIRJET- Online Programming Environment
IRJET- Online Programming EnvironmentIRJET Journal
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneeSAT Journals
 
Online shopping Report
Online shopping ReportOnline shopping Report
Online shopping ReportPragnya Dash
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
IRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET Journal
 
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET-  	  Electronic Notice Board Remotely Operated using Android PhoneIRJET-  	  Electronic Notice Board Remotely Operated using Android Phone
IRJET- Electronic Notice Board Remotely Operated using Android PhoneIRJET Journal
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET Journal
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security SystemIRJET Journal
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET Journal
 

Similar to Centralized Tool for Software and USB (20)

IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book Locator
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 
Intranet database
Intranet databaseIntranet database
Intranet database
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
IRJET- Online Programming Environment
IRJET- Online Programming EnvironmentIRJET- Online Programming Environment
IRJET- Online Programming Environment
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
 
20 ijcse-01225-3
20 ijcse-01225-320 ijcse-01225-3
20 ijcse-01225-3
 
Online shopping Report
Online shopping ReportOnline shopping Report
Online shopping Report
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
IRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile Application
 
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET-  	  Electronic Notice Board Remotely Operated using Android PhoneIRJET-  	  Electronic Notice Board Remotely Operated using Android Phone
IRJET- Electronic Notice Board Remotely Operated using Android Phone
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
 
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET- Voice Controlled Personal Assistant Bot with Smart Storage
IRJET- Voice Controlled Personal Assistant Bot with Smart Storage
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Centralized Tool for Software and USB

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1197 Centralized Tool for Software and USB Prof. Bhanu Tekwani1, Shubhangi Mishra2, Mythri Ravindra2 1Professor, 2Student 1,2Vidyalankar Institute of Technology, Mumbai, India How to cite this paper: Prof. Bhanu Tekwani | Shubhangi Mishra | Mythri Ravindra "Centralized ToolforSoftware and USB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-3, April 2019, pp.1197-1200, URL: https://www.ijtsrd.c om/papers/ijtsrd23 187.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT We propose a standalone application which facilitates a user to sendrequestfor USB access to the server, and after an approval from the administrator the user can use the USB. Along with that, the application also generates report for the administrator regarding hardware configuration and list of software in a computer, in a given network. Another additional feature includes, automated and silent software installation in the client computers over a network. KEYWORDS: Centralized, Remote,Automated,Customized,USB, blocking, Software, Installation. I. INTRODUCTION This paper proposes an application for centralized management of USB access. Currently, the institute needs a tool that can help with centralized USB blocking, and if someone requests permission for USB access then it would be granted by the server room after authenticating the requester. This would ensure security because only authorized users are allowed to access the USB port. Also, this tool would facilitate remote software installation in the host computers. If any software is requested from a host computer, it would be automatically and silently installed from the client computer to all the computers in the network. This automated, remoteinstallation foraninstitute would save a lot of time, energy and cost. This tool can also generate a report of all the hardware and software configurations of an individual computer when requested from the server. The proposed project aims to focus at developing a centralized network by automated software installation from a peer to peer machines residing in the network, silently. This tool will also generate a report of all the host machines; regarding their hardware and software list. Thus, this tool helps at integrating many networking features and managing devices from a remote center with cost and time efficiency. LITERATURE SURVEY [1]In this paper they present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention in a corporate environment. The vision of this project is to track record and limits the use of USB devices in a secured environment (network) thus maintains confidentiality and integrity to meet information security standards. We are proposing to keep a centralized repository of allowed devices such as USB keyboard,mouse, and printer etc. based on organization’s security standards.[1] [2] In this paper, we proposed a model that can remotely perform various software maintenance related actions. These actions can be software release upgrade, run-time patching and status monitoring etc. All these actions can be performed in four different node configuration-standalone, active-passive, combo and parallel. Proposed modelisa very simple and scalable in nature which makes it extremely suitable choice for software maintenance in telecommunication network.[2] [3] Ansible is open source software that automatessoftware provisioning, configuration management, and application deployment.. it is designed for multi-tier deployments since day one, Ansible models your IT infrastructurebydescribing how all of your systems inter-relate, rather than just managing one system at a time.[3] IJTSRD23187
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1198 II. EXISTING SYSTEM Currently, the institute has blocked all the USB ports in all the computer for the sake of security. If somelegitimateuser wants to access the USB devices then the system administrator is called upon. Similarly, if we want to install any software on any computer the administrator has to download and install it on every computer personally and individually. The administrator has no way of knowing the hardware and software configurations of any computer in the network unless he/she goes up to the computer. III. LIMITATION OF EXISTING SYSTEM In the current system, a lot of time and effort is wasted on installing software on multiple computers.TheUSBaccessis blocked permanently whereas its access can be managed efficiently. The logging of reports of individual computers’ configuration is done nowhere. IV. PROPOSED SYSTEM The proposed system is to create a tool for the college which will give the following features in the following way: 1. Centralized USB blocking and unblocking. The default setting for all the systems would be to block the USB device plugged in. If any genuine user wantsthe access, then the person can send a request to the server room via a an user interface with authentication using username and password and the request will be responded with accepting or rejecting the request for the access. 2. Remote software installation. Through a portal, any teacher can request forasoftware installation in a particular lab and after the authentication of the requester, the software will be installed in that lab automatically. 3. Report of all software installed. Whenever the administrator wants to know about the software and hardware installed in any one of the host machines, a report will be generated of that terminal and sent to the server. Fig 6.1 Work flow diagram for USB module Fig 6.2 Work flow diagram for Software installation V. METHODOLOGY Server side: Server side application has a login page and after successful login in database connection, a dashboard frame is opened. The dashboard contains two tabs; one to keep track of USB requests and other gives the option to generate reports of the client computers in the network. The USB tab: This tab contains a table which extractstherequests entered in the database from the client side. Each row displays the detail of the request such as the IP address, hostname, MAC address, and two buttons labelled “Enable” and “Disable”. The administrator can allow or deny the request. The response is updated in the database and fetched from the client side application. As soon as any response is provided for a row, the row is removed from the table of the tab. The database will have the log of USB requests received by the server. The Report tab: This tab contains a table with details of the computers present in the network: IP address, hostname and two buttons available: one for software report request and another for hardware configuration report request to the client machine. The communication between the server and the client is done using TCP/IP connection. The client is listening continuously on the port 5000. As soon as the request is generated, it connects to the client port and file transfer takes place from the client machine to the server machine. These files are stored in the “reports” folder with the hostname and timestamp as the name of the file and can be accessed at any point of time. This file is read and the content is displayed on the text frame present on the UI.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1199 Client side: Server side application has a login page and after successful login in database connection, a dashboard frame is opened. The dashboard contains two tabs; one to keep track of USB requests and other gives the list of software in the database. The USB tab: The user can send request for USB access to the server. Only after the access permission from server, the USB will be enabled unless it will be disabled. Even after the USB access given, the USB will be disabled after a timeout of few minutes say, 20 minutes, predefined by the administrator. Software tab: There will be a list of software from the database. After clicking on a software, the software will beinstalled inthe all the computers in a given range of ip address in the network. This will save time and effort of installing software in a multiple computers in a single click. VI. IMPLEMENTATION SCREENSHOTS: 4.1: Client side : Fig: 4.1.1 Login page Fig 4.1.2 Request for USB access Fig 4.1.3 Database entry for requests Fig 4.1.4 Request response for access 4.1.2. Server side: Fig 4.2.1 Login page
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23187 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1200 Fig 4.2.2 List of requests Fig 4.2.3 Reports generated saved in a folder withtimestamp. Fig 4.2.4. List of software VII. ADVANTAGES OF PROPOSED SYSTEM 1. Centralized system. 2. Automated system. 3. Saves time and effort. 4. Cost of the institute is saved. 5. No manual labor is required. 6. The system is more organized and efficient. 7. The system has become more organized. VIII. CONCLUSION Data protection and data maintenance is one of the biggest administrational concern of the institute. This application aims at legitimate access and usage of the USB devices. This tool is centralized at its core, hence, the access permission can only be granted by the server administrator after authenticating the user. With the help of this project, we focus on reducing the time, cost and effort that goes into the logging of information of the individual computers in the network. The administrator can know about the hardware configuration as well as the software installed in each computer. Plus, the files of those reports can also be stored on the server side. The effort of installing a single software on to multiple computers is reduced down to one click on a computer and that software will installed in all the computers in the given network. REFERENCES [1] Saurabh Verma, Abhishek Singh. Data theft prevention & endpoint protection from UnauthorizedUSBdevices. IEEE- Fourth International Conference on Advanced Computing, ICoAC 2012 MIT, AnnaUniversity,Chennai. December 13-15, 2012. [2] Promila Jangra, Soma Das, Sandeep Kumar Khurana. Remote software maintenance system for telecom network. 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). [3] Using Ansible for network automation.CellStream,Inc. www.ansible.com [4] https://emcosoftware.com/remote-installer [5] https://www.remoteutilities.com/support/docs/remo te-install-tool/ [6] https://4sysops.com/archives/free-usb-blocker- centralized-access-control-for-usb-devices/ [7] https://www.usb-lock-rp.com