Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏

Slides:



Advertisements
Similar presentations
SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
Advertisements

Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
IT’s Gone Mobile: How to do your Job Anywhere Jason Hand IT Specialist, Central NM Electric Cooperative Jason Hand Cell:
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Configuring the MagicInfo Pro Display
Chapter 7: Using Windows Servers to Share Information.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
Contents Introduction Problem Definition Proposed Solution
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Remote Controller & Presenter Make education more efficiently
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
How to use WS_FTP A Step by Step Guide to File Transfer.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Introduction TO Network Administration
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
ITWIN SARATH CHANDRA.V 08Q6A05A3. ABOUT THE PRODUCT SECURE AND PRIVATE FILE COLLABORATION PLATFORM INDEPENDENT SIMPLE AND SAFE REMOTE ACCESS YOUR OWN.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
When you cannot be there Remote access and collaboration Raul Suarez Dec 2009.
Getting Connected to NGS while on the Road…
Chapter 7: Using Windows Servers
Introduction to Operating Systems
Instructor Materials Chapter 5 Providing Network Services
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
INTEGRATING LINUX WITHIN A CORPORATE ENVIRONMENT Kai Ponte
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Welcome To : Group 1 VC Presentation
CoreFTP.
IS 4506 Server Configuration (HTTP Server)
Getting Connected to NGS while on the Road…
CoreFTP.
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏

2 The world is becoming more mobile and computers, it seems, are easily accessible these days. Our information is scattered across multiple systems. It is my goal to make it easy and safe to access information one might have on a home computer.

3 MOTIVATION Forgetting an important document at home is a problem almost everyone has encountered. Why should one have to go home and get it when there is a link between your home computer and the computer at your workplace?

MOTIVATION Other points of motivation include: Secure Web browsing from a public computer Control over applications from any computer on your home network when away from home Securely transfer files from any computer on your home network to your flash drive 4

5 INTRODUCTION A portable network connection to home could be useful to a number of people in a number of ways: Business Traveling business men who need access to network files via a secure channel In meeting one can bring only a portable flash drive instead of bringing their computer from their desk. Personal If you are at a friends house and want to share music our videos that are on your hard drive at home Some public networks restrict certain sites. A secure connection would allow for HTTP requests through your home’s Internet connection.

6 PROBLEM STATEMENT To provide a free and secure way to access one’s computer at home away from home. To make this means of communication available from any PC. To allow for fast file transfers between the two computers

7 PROPOSED SOLUTION In order to access the computer at home the home computer must have: A high speed Internet connection A secure sever side software that allows for remote access over the Internet such as: VPN SSH PPoE

Proposed Solution The client would have to be portable and secure. In order to accomplish this I debated between two alternatives Portable USB drive with the appropriate client software and security features Live OS CD with appropriate client software and security features.

Results A 4GB Sandisk U3 flash drive will be used as the client. It allows for password security when the drive is inserted The software I needed could be installed onto the drive. Software used for the client was Portable Tunnelier Firefox VNC viewer

Results For the server side I used Windows XP Professional and an SSH server. Additionally an Ubuntu machine is on the same network. It can also be tunneled through the SSH server. Applications are tunneled through the SSH server in order to provide secure communication for otherwise unsecure protocols. Software used on the server side freeSSHd RealVNC SMB

RESULTS Tunnelier the client uses two configuration files which are stored on the flash drive itself. One to connect to each computer on the home network. 11

Results Port 5900 was tunneled in both configuration files to the computer’s IP address. This allows for a Virtual Network Connection

Results An FTP client would pop up once the connection was made. The initial directory will correspond to the computer that is being accessed.

Results By setting up this network configuration in Firefox it will connect via proxy through the home network.

15 CONCLUSIONS The ability to have a connection to the workplace or home at all times could be extremely beneficial to almost anyone who has data on multiple devices. There are commercial products out there that accomplish the same thing but cost monthly fees. This could be beneficial to almost anyone because data is not always centralized

Conclusions Throughout this semester I have learned a good deal about remote access. The world is becoming more mobile everyday and working on this project helped me to realize the benefits of incorporating ideas of being portable into networking.

17 FUTURE WORK There are many things that I would like to do with this project: Ensuring that no trace is left on the host computer Creating a Live OS to do the same task Making it work through more advanced network setups

Contact Information If you want to contact me: Phone (606)