SYSTEM ACTIVITY TRACKER
Abstract
System Activity Tracker is a tool that helps users and teams protect their computers. It is a place where you can see exactly what is happening with your files, apps, and connected devices at any time. System Activity Tracker makes it so you do not have to use many different security programs. It has file system monitoring, productivity tracking, and a dashboard where all system logs are shown together. System Activity Tracker is built with modern technology like React, Electron, and Python. It uses SQLite and Supabase to make sure everything is in sync across the cloud. This report is about how System Activity Tracker is put together, how it records every file change, and how it is designed to keep your system safe. System Activity Tracker is a tool that can help teams keep their data secure and be more aware of their work habits. It is really good for people who want to protect their hardware. Additionally, System Activity Tracker integrates cloud-powered security alerts, custom folder tracking, and external platforms like Resend for email reports. These features enhance security by automatically sending alerts for suspicious deletions and enabling deep monitoring of any folder on the device.
References
B. Schneier, "Secrets and Lies: Digital Security in a Networked World," Wiley Computer Publishing, New York, 2000. (The foundation for logging importance).
S. Forrest, et al., "A Sense of Self for Unix Processes," IEEE Symposium on Security and Privacy, pp. 120-128, 1996. (Pioneering behavior-based detection).
D. Norman, "The Design of Everyday Things," Basic Books, 2013 edition. (Applied to the usability of security dashboards).
a. Somayaji and S. Forrest, "Automated Response to Intrusions Using System Call Delays," USENIX Security Symposium, 2000.
b. Schneier, "The Importance of Logging for Forensic Evidence," Cryp-to-Gram Newsletter, 2001.
J. Nielsen, "Usability Engineering," Academic Press, 1993. (Foundational research on why people struggle with complex system tools).
S. T. Teoh, et al., "Visual Mining of Network System Log Data," Workshop on Computer Security Data Mining, 2004.
D. J. Richardson and A. L. Wolf, "Software Monitoring for Security and Reliability," ACM SIGSOFT, 1999.
S. Forrest and S. A. Hofmeyr, "Immunology as an Information Processing System," Advances in Information Systems, 2001.
M. Satyanarayanan, "The Evolution of Coda," ACM Transactions on Computer Systems, 2002. (Research on file system monitoring and consistency).
J. Saltzer and M. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE, 1975. (Classic research on auditing rules).
B. Shneiderman, "Designing the User Interface: Strategies for Effective Human-Computer Interaction," Pearson, 2004.
Refbacks
- There are currently no refbacks.