0% found this document useful (0 votes)
16 views18 pages

Final Merged Chapter5

The document presents a project report on three LAN tools: BeeBEEP, Dukto, and Net Monitor for Employees, detailing their historical backgrounds, usage scenarios, step-by-step guides, advantages, disadvantages, and key features. BeeBEEP is a secure messaging tool ideal for internal communications, Dukto is a simple file transfer tool for trusted environments, and Net Monitor for Employees is a monitoring tool for supervising employee activity. Each tool is designed to enhance communication and file management within local area networks.

Uploaded by

hooyomadiino2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views18 pages

Final Merged Chapter5

The document presents a project report on three LAN tools: BeeBEEP, Dukto, and Net Monitor for Employees, detailing their historical backgrounds, usage scenarios, step-by-step guides, advantages, disadvantages, and key features. BeeBEEP is a secure messaging tool ideal for internal communications, Dukto is a simple file transfer tool for trusted environments, and Net Monitor for Employees is a monitoring tool for supervising employee activity. Each tool is designed to enhance communication and file management within local area networks.

Uploaded by

hooyomadiino2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

DECLARATION A

We hereby declare that this project report is our own original work and has not been submitted anywhere else.

DECLARATION B

We certify that the work presented in this report is carried out by the team as part of the course requirements.

APPROVAL SHEET

This project report has been approved and accepted as a partial fulfillment of the requirement.

I
1
1. BeeBeep Secure LAN masseging Tool .......................................................................... 1
1.1 Historical Background and Versions ............................................. 1.1
1.2 Usage Scenarios .............................................................................. 1.2
1.3 Step-by-Step Usage Guide ............................................................. 1,3
1.4 Advantages and Disadvantages ..................................................... 1.4
1.5 Key Features ................................................................................... 1.5
2. Dukto: Simplified LAN File Transfer ........................................................................... 2

2.1 Historical Background and Versions ............................................. 2.1


2.2 Usage Scenarios ............................................................................. 2.2
2.3 Step-by-Step Usage Guide ............................................................. 2.3
2.4 Advantages and Disadvantages ..................................................... 2.4
2.5 Key Features .................................................................................. 2.5
3. Net Monitor for Employees: ................................................................................................. 3

3.1 Historical Background and Versions ............................................. 3.1


3.2 Usage Scenarios ............................................................................. 3.2
3.3 Step-by-Step Usage Guide ............................................................. 3.3
3.4 Advantages and Disadvantages ..................................................... 3.4
3.5 Key Features .................................................................................. 3.5

2
Chapter Five
TECHNOLOGY TOOLS IN LAN ENVIRONMENTS

1
1. BeeBEEP: Secure LAN Messaging and File Transferring Tool

1.1 Historical Background and Versions

BeeBEEP is a free and open-source secure LAN messenger developed by Marco


Mastroddi. It was first released in 2010 to address the need for a decentralized
communication system that functions over local area networks without the need for
internet connectivity or central servers. The application was inspired by earlier
LAN messengers like WinPopup and IP Messenger, but BeeBEEP added modern
cryptographic security and a user-friendly interface.
Over the years, BeeBEEP has seen consistent development, driven by both user
feedback and evolving security standards. Key releases include BeeBEEP 2.x
which introduced AES encryption, and 4.x which expanded cross-platform support,
including Windows, macOS, and Linux. The latest versions support themes, chat
history, file sharing, and plugin-based extensibility. Each version is optimized for
LAN environments with a focus on privacy, performance, and zero-configuration
deployment.
Developed by Marco Mastroddi in 2010.
Inspired by older LAN messengers with added modern security.
Uses AES-256 encryption for message protection.
No internet or server required – fully decentralized.
Compatible with Windows, macOS, and Linux.
Regular updates include UI improvements, new features, and bug fixes.
BeeBEEP 5.x emphasizes GUI enhancements and better file transfer speed.

3
How Is Look like BeebEEP software icon:

1.2 Usage Scenarios

BeeBEEP is ideal in environments where communication must remain internal and


secure. Offices, schools, hospitals, and government agencies benefit from using
BeeBEEP for quick, private, and encrypted messaging without relying on external
servers or the internet. In locations with restricted internet access or high
cybersecurity concerns, BeeBEEP ensures data confidentiality while allowing
instant communication and file transfer.

4
BeeBEEP is particularly useful in emergency coordination rooms, where the
internet might be down or unreliable. It is also applicable in exam halls for
supervisors, in banks for internal alerts, and in warehouses where machines or
workers need coordinated instruction in real time. The lightweight nature of
BeeBEEP allows it to run smoothly on older systems too.
Suitable for secure internal communications in LAN-only networks.
Widely used in:
Corporate offices
Government institutions
Hospitals and clinics
Universities and schools
Excellent for IT departments, system admins, and helpdesk communication.
Useful in emergency and disaster recovery centers.
Works well in isolated environments with no internet access.
1.3 Step-by-Step Usage Guide

Using BeeBEEP is straightforward. The software is designed with simplicity in


mind to ensure that even non-technical users can operate it with minimal training.
Download & Installation:
Go to www.beebeep.net.
Download the correct version for your OS.
Install using the installer wizard.
Initial Setup:
On first launch, enter a display name.
Optionally choose a custom avatar.
The application auto-detects users on the same LAN.
Sending Messages:

5
Select a user from the left sidebar.
Type your message and press enter.
Messages are encrypted before transmission.
File Transfer:
Drag and drop a file into the chat window.
The recipient receives a prompt to accept.
Group Messaging:
Create groups using the top menu.
Add multiple users to initiate a group chat.
Security Settings:
Access ‘Settings’ > ‘Security’ to manage encryption preferences.
Chat History:
Stored locally and accessible via ‘History’ tab.
1.4 Advantages and Disadvantages

Advantages:
Strong Encryption: AES-256 ensures message and file confidentiality.
Offline Operation: Works entirely without internet or central server.
Open Source: Customizable and community supported.
Cross-platform: Supports Windows, macOS, and Linux.
Zero Configuration: Detects LAN peers automatically.
Disadvantages:
LAN Only: Cannot be used over the internet.
Limited Remote Features: No remote desktop or monitoring.
UI Simplicity: May lack modern chat features like emoji reactions.
No Admin Controls: Lacks centralized user management or access control.
No Mobile Version: Only available for desktop OS.

6
Genaral Features OF BeebEEP:

1.5 Key Features

End-to-End Encryption: All messages and file transfers are encrypted.


Offline Chat History: Messages are stored locally and readable offline.
User Presence Detection: Shows who is online automatically.
Drag-and-Drop File Sharing: Quick and reliable transfer.
Group Chat and Broadcasting: Create chat rooms or send one-to-many messages.
Custom Avatars and Status: Personalize user profiles and availability.
No Server Required: Peer-to-peer architecture reduces maintenance.
Theme Customization: Dark/light themes and UI enhancements.

7
2. Dukto: Simplified LAN File Transfer
2.1 Historical Background and Versions:

Dukto is a cross-platform LAN file transfer tool created by Emanuele Colombo, an


Italian software developer. The software was designed with a primary focus on
simplicity and speed, enabling users to transfer files and text between computers
on the same LAN without any configuration. The initial release of Dukto came
around 2009 and quickly gained popularity for its minimalistic design and ease of
use.

The last major version, Dukto R6, was released around 2014. Though development
officially ended and Dukto is now discontinued, it remains widely used due to its
lightweight nature and performance.

- Developed by Emanuele Colombo in 2009.


- Focused on fast, configuration-free LAN transfers.
- Latest version: Dukto R6.
- Now discontinued, but still functional and used.
- Supported platforms: Windows, Linux, macOS, Android, Symbian, Windows
Phone.
- Source code was released under GNU GPL license.
- No encryption or authentication by default—aimed at trusted LANs.

How is look like Dukto Features:

8
2.2 Usage Scenarios:

Dukto is ideal for users and environments where file sharing needs to be quick,
intuitive, and without complicated setup. It shines in trusted networks where
security is not a major concern, such as home offices, classrooms, and small
businesses.

It is particularly useful for IT support professionals needing to transfer diagnostics,


logs, or patches between machines quickly.

Best for trusted environments with quick sharing needs.


Commonly used in:
Classrooms and training labs
Home and small offices
IT troubleshooting scenarios
Multi-device households
Multi-platform environments
Useful for transferring:
Files and folders
Text snippets or code
IP addresses and LAN details

2.3 Step-by-Step Usage Guide:

Download and Install:


Go to the official GitHub repository or trusted archives.
Download the appropriate version for your OS.
Run the installer or portable file.

Launch Dukto:
Open Dukto. The main screen shows other connected Dukto users on the LAN.

9
Send a File:
Select the device/user you want to send files to.
Choose "Send files" or "Send folders."
Use the file picker to select your data and click "Send."

Send Text:
Choose "Send text."
Type or paste your text and press "Send."

Receive Files:
- Accept incoming files; they’re saved to your default Dukto folder.

Cross-Platform Transfers:
- Install Dukto on each device.
- All connected devices will see each other automatically.

General Of Display Feature of Dukto Software:

10
2.4 Advantages and Disadvantages:
Advantages:
- Extremely Simple Interface: No learning curve or configuration.
- Fast LAN Transfer: Instant detection and direct data transmission.
- Cross-platform Support: Works across multiple OS.
- Portable Version Available: Can be run without installation.
- Free and Open Source: No cost or licensing.

Disadvantages:
- No Security Measures: No encryption, passwords, or access control.
- Discontinued: No future updates or support.
- Limited Features: No chat, no group transfers, no logging.
- Unreliable in Complex Networks: May struggle in segmented LANs.
- Fixed Destination Folder: May require manual management of files.

Key Features:

✓ Zero Configuration: Auto-detects LAN peers.


✓ File & Folder Transfer: Supports entire directory sharing.
✓ Text Snippet Sharing: Fast exchange of messages and links.
✓ IPv4/IPv6 Support: Adapts to modern network setups.
✓ Multi-OS Compatibility: Supports Windows, Linux, macOS, Android, Symbian.
✓ No Internet Required: Local communication only.
✓ Simple UI: Clear buttons for sending files/text.
✓ Activity Log: Basic transfer history (within session).

Net Monitor for Employees:


3.1 Historical Background and Versions

Net Monitor for Employees is a professional-grade monitoring and file management tool
developed by EduIQ. It was designed to help administrators and business owners supervise
employee activity on a LAN. First released in the early 2000s, the software has gone through
several major updates, improving its monitoring capabilities, user interface, and cross-platform
compatibility.

11
The tool has evolved to support real-time desktop monitoring, remote control, screen recording,
and file transfer features. Earlier versions focused on classroom monitoring, but later versions
(especially post-2015) emphasized business environments with employee tracking, logging, and
compliance tools. Current versions support both Windows and macOS agents and offer encrypted
data transmission.

Developed by EduIQ in the early 2000s.

Focused on employee supervision and training assistance.

Available for Windows and macOS.

Features evolved from basic screen monitoring to full control and reporting.

Supports AES encryption for data and communication.

Used globally in schools, call centers, offices, and government agencies.

Current version includes remote desktop, live camera, file control, and activity logs.

General Feature of Net Monitoring Of Employee:

12
3.2 Usage Scenarios

Net Monitor for Employees is ideal in environments where administrators need oversight of
multiple systems. It is commonly deployed in corporate offices to monitor productivity, IT labs
to supervise student behavior, and call centers to ensure policy compliance. The tool allows live
screen viewing and can record sessions, making it a powerful tool for auditing, performance
reviews, or even security investigations.

In schools, teachers use the software to guide students during lessons by sharing screens, locking
PCs, or sending files during tests. In companies, it's used to prevent time-wasting or data leakage
by checking website activity and app usage. The tool also facilitates efficient technical support
by allowing remote desktop access without leaving the administrator’s station.

Popular in:

Offices for employee tracking

Schools for classroom control

Call centers for compliance enforcement

IT departments for remote troubleshooting

Supports use cases like:

Monitoring screen activity

Sending/receiving files

Blocking apps or websites

Managing group communication

Controlling PC power remotely

3.3 Step-by-Step Usage Guide

Download and Installation:

Visit www.networklookout.com to download.

13
Install “Net Monitor for Employees Professional” on the admin PC.

Install “Client Agent” on all target computers.

Initial Configuration:

Launch the console on the admin system.

Add IP addresses or use LAN discovery to detect client PCs.

Assign passwords for connection security.

Live Monitoring:

View desktops in thumbnail or full-screen mode.

Switch between real-time views of each client.

Remote Control:

Take control of keyboard and mouse remotely.

Use for tech support or administrative actions.

File Transfer:

Select a connected PC and initiate file push.

Files can be sent silently or with user notification.

Commands and Messages:

Lock PC, restart, log off, or power off remotely.

Send messages, alerts, or instructions to users.

Recording & Logging:

Enable session recording for activity tracking.

Export logs for compliance review.

14
How is look like The display Feature of Software:

3.4 Advantages and Disadvantages

Advantages:

Real-time Monitoring: Instant view of employee activity.

Remote Control: Full remote desktop access and control.

File Distribution: Mass file push or targeted transfers.

Logging and Recording: Ideal for audits and legal compliance.

Administrative Controls: Lock, reboot, or shut down systems remotely.

Disadvantages:

Paid Software: Requires licensing per monitored device.

Complex Setup: Needs agent installation and IP configuration.

15
Privacy Concerns: Misuse may violate privacy laws.

LAN/Local Network Focus: Internet-based monitoring is limited.

Resource Usage: High traffic on large networks may cause lag.

3.5 Key Features

Live Desktop Viewing: See what users are doing in real-time.

Remote Control Access: Take control of systems securely.

Screen Recording: Capture activity sessions for training or evidence.

Application & Website Monitoring: Track software usage and visited URLs.

File Transfer Utility: Send or collect files from clients instantly.

Messaging System: Send announcements or direct alerts.

Group Management: Organize users by department or role.

Security Features: Encrypted connections and password protections.

Admin Commands: Lock, restart, shutdown, or log off users remotely.

16

You might also like