screentoaster.com 如何从浏览器捕获您的计算机屏幕?

发布于 2024-08-21 09:56:20 字数 181 浏览 4 评论 0原文

http://www.screentoaster.com 如何使用 Java Applet 从浏览器捕获计算机屏幕?对于如何实现这一目标有什么建议或指导吗?还有其他方法可以使用不同的技术(例如 Flash)吗?

How does http://www.screentoaster.com capture a computer screen from a browser using Java Applet? Any suggestion or a lead in how to accomplish this? Is there other way to do using using different technology such as Flash?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

×纯※雪 2024-08-28 09:56:20

只需 5 行代码即可完成。

1.创建一个矩形代表
屏幕。 2.创建一个 BufferedImage
存储屏幕图像。 3.拿
使用新的快照
Robot().createSnapshot() 方法。 4.
将 bufferedImage 保存在文件中。

机器人类是 java.awt 包的一部分

您可以在下面的链接中查看更多详细信息。

http://java.sun.com/ j2se/1.4.2/docs/api/java/awt/Robot.html

You can do it with just 5 lines of code.

1 . Create one rectangle representing
screen. 2 . Create one BufferedImage
to store image of the screen. 3 . Take
snapshot using new
Robot().createSnapshot() method. 4 .
Save the bufferedImage in file.

Robot class is part of java.awt package

You can see more detail in the below link.

http://java.sun.com/j2se/1.4.2/docs/api/java/awt/Robot.html

一身仙ぐ女味 2024-08-28 09:56:20

我还没有尝试过(我不想冒险!!!),但迹象表明它的屏幕烤面包机使用签名的小程序,并且您必须明确接受证书(该证书会添加到您的浏览器的可信证书中) store) 以使小程序能够突破正常的 Java 安全沙箱。 (我也相信你的话,它确实使用了一个小程序......)

我希望通过网络浏览器捕获用户屏幕的其他方法也受到类似的保护。

我还希望大多数用户不会疯狂地安装随机浏览器插件或接受随机证书。但遗憾的是,事实并非如此。

我觉得这整个想法非常冒险。如何阻止屏幕烤面包机的家伙获取屏幕上的内容、安装键盘记录器、搜索敏感文件、安装 rootkit 等?假设他们完全诚实,你怎么知道他们的小程序不存在可能被其他人利用做同样事情的安全漏洞?

I haven't tried it (I don't want to risk it!!!), but the indications are that it screen toaster uses a signed applet, and you have to explicitly accept a certificate (which gets added to your browser's trusted cert store) to enable the applet to break out of the normal Java security sandbox. (I'm also taking your word for it that it does use an applet ...)

I would hope that other methods of capturing the user's screen via a web-browser are similarly protected.

I would also like to hope that most users are not crazy enough to install random browser plugins or accept random certificates. But sadly, this is not true.

This whole idea strikes me as being very risky. What is to stop the Screen Toaster guys from taking their own copy of what is on your screen, installing a key-logger, ferreting around for sensitive files, installing a rootkit, etc? And assuming that they are entirely honest, how do you know that their applet doesn't have a security flaw that could be exploited by someone else to do the same thing?

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文