03-04-2012, 01:39 PM
Software Requirements Specification
1. Introduction
1.1 Purpose
The purpose of this document is to present a detailed description of the KLSpy software system. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli.
1.3 Intended Audience and Reading Suggestions
This document is intended for the developers, project managers, marketing staff, users,
testers and documentation writers of the KLSpy software system.
1.4 Product Scope
This software system will be a keylogging system for the system administrators of various business organizations, educational institutions, cyber cafes and general purpose home computer users. This system will be designed to monitor the keys pressed by the users of the computer system & record them in an encrypted form locally. These logs can be transferred through E-Mail (using SMTP) or FTP transfer to a remote server on the Internet or LAN if the network connection is present. By recording the keystrokes locally and transferring the logs, the system administrators or owners will be able to monitor the activity on the systems in their absence. They will be able to retrieve and decrypt the logs stored locally or remotely and reduce the misuse of the systems largely. The system will be easy to use and configure with flexible settings.
1.5 References
IEEE Recommended Practice for Software Requirements Specifications (IEEE Std 830-1998)
2. Overall Description
2.1 Product Perspective
KLSpy will be an API-Based easy to use software keylogger for both professional and
private use. It will be able to log chats, E-Mails and any other data that would be typed from the keyboard,
constantly monitoring the keys pressed. The user will thus be able to monitor the activity going on
his/her system(s) locally or remotely with minimum possible intervention required.
2.2 Product Functions
Stealthily logs all keystrokes inputted by the target.
Runs at system startup.
Configuration settings must be encrypted with a master-key.
Logs should be recorded in an encrypted form.
All the related files including binaries, logs and settings must possess hidden attribute on the filesystem.
Detailed information for each log entry must be recorded, including the date-time stamps and window caption.
It must be able to upload logs to a remote FTP server over the LAN or Internet.
Log E-Mailing facility to a remote server on the LAN or Internet, running SMTP must be provided.