SlideShare a Scribd company logo
WMI Based Desktop Monitoring Application M.Ram Kumar J.Kingsly Jacob K.Bhaskaran
Defense Level:2 ,[object Object],[object Object],[object Object]
Defense Level:2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE LEVEL:2 ,[object Object],[object Object]
Defense Level:2 ,[object Object],[object Object],[object Object],[object Object]
Student Progress Sheet: Testing of the project Apr Developing GUI   Extracting remote computer details. Mar Connecting to a remote computer . Extract information of local computer . Feb Development of paper and implementing low level code for project . Study of WMI Architecture, Implementing  Low level code for project Jan IV week III week II week I week Mon/Week

More Related Content

What's hot

WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
netmonastery
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
dtimal
 
Mobile security and drozer tool demo
Mobile security and drozer tool demoMobile security and drozer tool demo
Mobile security and drozer tool demo
Gowthamraj Palani
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
haimkarel
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
Alexander Benoit
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
PROBOTEK
 
Man In The Browser
Man In The BrowserMan In The Browser
Man In The Browser
Save Manos
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirus
Adi Saputra
 
April2010 Sales Presentation
April2010 Sales PresentationApril2010 Sales Presentation
April2010 Sales Presentation
toddpruner
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
Philip_
 

What's hot (10)

WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
Mobile security and drozer tool demo
Mobile security and drozer tool demoMobile security and drozer tool demo
Mobile security and drozer tool demo
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Man In The Browser
Man In The BrowserMan In The Browser
Man In The Browser
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirus
 
April2010 Sales Presentation
April2010 Sales PresentationApril2010 Sales Presentation
April2010 Sales Presentation
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 

Viewers also liked

What do these sports have in common
What do these sports have in commonWhat do these sports have in common
What do these sports have in common
hsheahan
 
The-Transformational-Power-of-the-Market-v1.2
The-Transformational-Power-of-the-Market-v1.2The-Transformational-Power-of-the-Market-v1.2
The-Transformational-Power-of-the-Market-v1.2
Mark Jensen, PMP
 
Flash informativo Premios de la Academia Nominaciones 2.016
Flash informativo Premios de la Academia Nominaciones 2.016Flash informativo Premios de la Academia Nominaciones 2.016
Flash informativo Premios de la Academia Nominaciones 2.016
6 Grados
 
Empathy map
Empathy mapEmpathy map
Résultats financiers avril2013
Résultats financiers avril2013Résultats financiers avril2013
Résultats financiers avril2013VirginieJulien
 
Dossier lanzadera zamora
Dossier lanzadera zamoraDossier lanzadera zamora
Dossier lanzadera zamora
Soraya Báez Cidón
 
Smart Home Security Project
Smart Home Security Project Smart Home Security Project
Smart Home Security Project
Stephan Pacheco
 
Bancarizacion RND 10-0017-15
Bancarizacion RND 10-0017-15Bancarizacion RND 10-0017-15
Bancarizacion RND 10-0017-15
VCTORHUGO62
 
VMware vRealize Operations Management Pack | Nagios
VMware vRealize Operations Management Pack | NagiosVMware vRealize Operations Management Pack | Nagios
VMware vRealize Operations Management Pack | Nagios
Blue Medora
 
Presentación de PowerPoint sobre la sidra
Presentación de PowerPoint sobre la sidra Presentación de PowerPoint sobre la sidra
Presentación de PowerPoint sobre la sidra
AlbaAzc
 
ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
 ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA... ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
VCTORHUGO62
 
Smart Switch
Smart SwitchSmart Switch
Smart Switch
Sameer Khandekar
 
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
Erlisa Saraswati Hasiholan Hutabarat
 
Identifikasi copy
Identifikasi   copyIdentifikasi   copy
Identifikasi copy
Novia Tunggadewi
 
Sessió informativa del Servei Públic d'Ocupació de Catalunya
Sessió informativa del Servei Públic d'Ocupació de CatalunyaSessió informativa del Servei Públic d'Ocupació de Catalunya
Sessió informativa del Servei Públic d'Ocupació de Catalunya
Ocupació. Generalitat de Catalunya
 
Tourist Places of North India
Tourist Places of North India Tourist Places of North India
Tourist Places of North India
Caper Travel
 

Viewers also liked (16)

What do these sports have in common
What do these sports have in commonWhat do these sports have in common
What do these sports have in common
 
The-Transformational-Power-of-the-Market-v1.2
The-Transformational-Power-of-the-Market-v1.2The-Transformational-Power-of-the-Market-v1.2
The-Transformational-Power-of-the-Market-v1.2
 
Flash informativo Premios de la Academia Nominaciones 2.016
Flash informativo Premios de la Academia Nominaciones 2.016Flash informativo Premios de la Academia Nominaciones 2.016
Flash informativo Premios de la Academia Nominaciones 2.016
 
Empathy map
Empathy mapEmpathy map
Empathy map
 
Résultats financiers avril2013
Résultats financiers avril2013Résultats financiers avril2013
Résultats financiers avril2013
 
Dossier lanzadera zamora
Dossier lanzadera zamoraDossier lanzadera zamora
Dossier lanzadera zamora
 
Smart Home Security Project
Smart Home Security Project Smart Home Security Project
Smart Home Security Project
 
Bancarizacion RND 10-0017-15
Bancarizacion RND 10-0017-15Bancarizacion RND 10-0017-15
Bancarizacion RND 10-0017-15
 
VMware vRealize Operations Management Pack | Nagios
VMware vRealize Operations Management Pack | NagiosVMware vRealize Operations Management Pack | Nagios
VMware vRealize Operations Management Pack | Nagios
 
Presentación de PowerPoint sobre la sidra
Presentación de PowerPoint sobre la sidra Presentación de PowerPoint sobre la sidra
Presentación de PowerPoint sobre la sidra
 
ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
 ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA... ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
ENSAYO “LA AUDITORÍA DEL CONOCIMIENTO Y LA GESTIÓN DEL CONOCIMIENTO ORGANIZA...
 
Smart Switch
Smart SwitchSmart Switch
Smart Switch
 
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
01. sasaran keselamatan pasien a-spo pemasangan gelang-ewd
 
Identifikasi copy
Identifikasi   copyIdentifikasi   copy
Identifikasi copy
 
Sessió informativa del Servei Públic d'Ocupació de Catalunya
Sessió informativa del Servei Públic d'Ocupació de CatalunyaSessió informativa del Servei Públic d'Ocupació de Catalunya
Sessió informativa del Servei Públic d'Ocupació de Catalunya
 
Tourist Places of North India
Tourist Places of North India Tourist Places of North India
Tourist Places of North India
 

Similar to Wmi Based Desktop Monitoring Application

Windows Mobile
Windows MobileWindows Mobile
Windows Mobile
Mahmood Ahmed
 
Windows mobile
Windows mobileWindows mobile
Windows mobile
Shehrevar Davierwala
 
2022 December Patch Tuesday
2022 December Patch Tuesday2022 December Patch Tuesday
2022 December Patch Tuesday
Ivanti
 
Wi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber duckyWi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber ducky
TELKOMNIKA JOURNAL
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
Hardeep Bhurji
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
Ivanti
 
Not petya business case
Not petya business case Not petya business case
Not petya business case
Alexander Kravchenko
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
githe26200
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
Andrea Bissoli
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Rashmi Agale
 
STUXNET_
STUXNET_STUXNET_
Analyse Patch Tuesday - mai
Analyse Patch Tuesday - maiAnalyse Patch Tuesday - mai
Analyse Patch Tuesday - mai
Ivanti
 
2023 May Patch Tuesday
2023 May Patch Tuesday2023 May Patch Tuesday
2023 May Patch Tuesday
Ivanti
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
 
2023 March Patch Tuesday
2023 March Patch Tuesday2023 March Patch Tuesday
2023 March Patch Tuesday
Ivanti
 
Dons Resume
Dons ResumeDons Resume
Dons Resume
donjoshu
 
2023 Mars Patch Tuesday
2023 Mars Patch Tuesday2023 Mars Patch Tuesday
2023 Mars Patch Tuesday
Ivanti
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
 

Similar to Wmi Based Desktop Monitoring Application (20)

Windows Mobile
Windows MobileWindows Mobile
Windows Mobile
 
Windows mobile
Windows mobileWindows mobile
Windows mobile
 
2022 December Patch Tuesday
2022 December Patch Tuesday2022 December Patch Tuesday
2022 December Patch Tuesday
 
Wi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber duckyWi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber ducky
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
 
Not petya business case
Not petya business case Not petya business case
Not petya business case
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
Analyse Patch Tuesday - mai
Analyse Patch Tuesday - maiAnalyse Patch Tuesday - mai
Analyse Patch Tuesday - mai
 
2023 May Patch Tuesday
2023 May Patch Tuesday2023 May Patch Tuesday
2023 May Patch Tuesday
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
2023 March Patch Tuesday
2023 March Patch Tuesday2023 March Patch Tuesday
2023 March Patch Tuesday
 
Dons Resume
Dons ResumeDons Resume
Dons Resume
 
2023 Mars Patch Tuesday
2023 Mars Patch Tuesday2023 Mars Patch Tuesday
2023 Mars Patch Tuesday
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Wmi Based Desktop Monitoring Application

  • 1. WMI Based Desktop Monitoring Application M.Ram Kumar J.Kingsly Jacob K.Bhaskaran
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Student Progress Sheet: Testing of the project Apr Developing GUI Extracting remote computer details. Mar Connecting to a remote computer . Extract information of local computer . Feb Development of paper and implementing low level code for project . Study of WMI Architecture, Implementing Low level code for project Jan IV week III week II week I week Mon/Week