VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

Winconnect Server XP by John Mackenzie. What is Winconnect Server XP WinConnect Server XP is software for installation onto Windows XP Pro, which transforms.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Software environment Sander Stuijk January 18th, 2006.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
11 ADMINISTERING MICROSOFT WINDOWS SERVER 2003 Chapter 2.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
1 SEEM3460 Tutorial Access to Unix Workstations in SE.
M2M Gateway Features Jari Lahti, CTO
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Remote Networking Architectures
1 Enabling Secure Internet Access with ISA Server.
Proprietary & Confidential How to enable Windows Remote Desktop Connection.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Remote access and file transfer Getting files on and off Bio-Linux.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Chapter 13 – Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
Module 11: Remote Access Fundamentals
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
A Study of Wireless Virtual Network Computing Kiran Erra.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Remote Controller & Presenter Make education more efficiently
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Field Trip #28 Securing a VNC Connection with Java By Keith Lynn.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CTC228 Nov Rest of the Semester...  Next time (Mon 23 Nov) – Go over test, prep lightning talks  Then (Wed Nov 25) – Class canceled (so you.
Module 10: Providing Secure Access to Remote Offices.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Network Computing Sangmi Lee Oct,25,2000 Florida State University.
RASPBERRY PI WORKSHOP.
Microsoft Windows NT 4.0 Authentication Protocols
Tor Good + Evil.
Virtual Network Computing
A Study of Wireless Virtual Network Computing
WSU Linux Users Group By Haven Hash
Introduction to Networking
Telnet/SSH Connecting to Hosts Internet Technology.
PPPoE Internet Point to Point Protocol over Ethernet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
This is a typical Windows user desktop
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Remote Computing Services Cloud connection Distributed system
Presentation transcript:

VNC Greg Fankhanel Jessica Nunn Jennifer Romero

What is it? Stands for Virtual Network Computing It is remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet

How VNC communicates

The Server As long as the computer is turned on and the VNC server is in service mode, the client can talk to the server without a user logged in. Client requests data from server, server sends an image of the desktop offering full access. Changes made on the client are reflected on the server.

Unsecured VNC Downloaded Real VNC Set up Server on one Windows machine Installed Client on the rest of the computers. Configured Password verification for all accounts.

Secured VNC Involves Putty and FreeSSHD Putty used to create a tunnel from viewer to server with SSH 2.0 FreeSSHD allows secure connections between the client and server, in which the data is encrypted so that it can not be intercepted. Router configuration – enabled port forwarding to a static IP.

MOCHA TIME!!!! Demonstration of our Process.