REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Introduction to Unix GLY 560: GIS for Earth Scientists Class Home Page:
Remote Desktop Connection Techniques Wireless Communication Networks.
The Internet Useful Definitions and Concepts About the Internet.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Using FileZilla to FTP CS10001 – Computer Literacy Kent State University.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Guide To UNIX Using Linux Third Edition
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
A crash course in njit’s Afs
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Telnet/SSH: Connecting to Hosts Internet Technology1.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Accessing the Internet with Anonymous FTP Transferring Files from Remote Computers.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Computation for Physics 計算物理概論 Introduction to Linux.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 4: Add Client Computers and Devices to the Network.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Remote Controller & Presenter Make education more efficiently
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
VMware ESX and ESXi Module 3.
Enumeration.
Introduction to Operating Systems
Instructor Materials Chapter 5 Providing Network Services
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Module 4 Remote Login.
FTP - File Transfer Protocol
Logging into the linux machines
Telnet/SSH Connecting to Hosts Internet Technology.
IIS.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Logging into the linux machines
Computer Networks Protocols
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

REMOTE LOGIN

TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA N. 1MS07IS050 TANUSHREE A.G 1MS07IS139 TANUSHREE A.G 1MS07IS139

CONTENTS 1. INTRODUCTION 2. SSH (SECURE SHELL) 3. DIFFERENCES BETWEEN THE VARIOUS TOOLS 4. SONY ERICSON CYBERSHOT PHONE(INBUILT FEATURE) 5. REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONE(EXTERNAL SOFTWARE)

INTRODUCTION What is remote login? What is remote login? Remote login is the capability to access the files, documents and related software of one computer from another along the network.

Working of remote login: Working of remote login: *Virtual Private Network *Desktop Sharing Software *Desktop Sharing Software

Advantages: Advantages:*Efficiency*Cost*Fast Disadvantages: Disadvantages: *Lack of security

REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONE INSTRUCTIONS

RDM+(REMOTE DESKTOP FOR MOBILES) This is a communication tool that gives you the ability to connect to remote computer from your mobile device. This is a communication tool that gives you the ability to connect to remote computer from your mobile device. RDM+ software consists of two components: RDM+ software consists of two components: the desktop part (RDM+ desktop) should be installed on the remote computer the desktop part (RDM+ desktop) should be installed on the remote computer the client module (RDM+client) should be installed on your mobile devices. the client module (RDM+client) should be installed on your mobile devices.

3. RDM+ DESKTOP SETTINGS

4. RDM+ DESKTOP AND STATUS CONNECTIONS

SSH- Secure Shell Tools used for Remote Login: Tools used for Remote Login: 1. Rlogin : rlogin is a software utility for Unix- like computer operating systems that allows users to log in on another host via a network. software utilityUnix- likeoperating systemshostnetworksoftware utilityUnix- likeoperating systemshostnetwork 2. Telnet : Telnet allows remote login and can be used to access and run interactive applications on remote systems. You need to know the IP Address or the host name of the remote system and also have an account in order to access the remote system through telnet. 3. SSH – Secure shell.

Remote Login using SSH Remote Login using SSH What is SSH? What is SSH? SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.network protocolsecure channelnetwork protocolsecure channel Uses of SSH. Uses of SSH. 1. Access to the UNIX-like environment from a Windows machine. 2. Work from home with access to your filestore. 3. Copying files between your filestore and another machine. 4. Read restricted web pages. 5. For executing command on a remote host.

How to use SSH? How to use SSH? ssh user: Your teaching domain Unix login name. user: Your teaching domain Unix login name. host: The machine to login to. host: The machine to login to. Are you sure you want to continue connecting (yes/no)? Are you sure you want to continue connecting (yes/no)? This is a check to make sure that another machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'. This is a check to make sure that another machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'. Enter your password at the prompt and you will be presented with your shell command line: Enter your password at the prompt and you will be presented with your shell command line: password: password: Last login: Sun Sep 14 14:11: from Last login: Sun Sep 14 14:11: from

Using Secure Shell for Windows Using Secure Shell for Windows

Using Secure Shell for Windows Select a host name (or IP address) to connect to. Select a host name (or IP address) to connect to. User name is ‘whom’ you are going to login as. Root, or another user can be used. User name is ‘whom’ you are going to login as. Root, or another user can be used. Port number is 22 by default.You will need to use port 22 unless you alter is on the target device. Port number is 22 by default.You will need to use port 22 unless you alter is on the target device. Authentication methods are password, SecurID or others. Authentication methods are password, SecurID or others.

How do SSH, Telnet and Rlogin differ? How do SSH, Telnet and Rlogin differ? Telnet Rlogin Rlogin SSH SSH Telnet protocol offer minimal security Rlogin protocol offer minimal security SSH is a recently designed, high-security protocol Telnet allows you to pass some settings on to the server, such as environment variables. Rlogin do not support this SSH does not support this Telnet requires entering the password Rlogin allow you to log in to the server without having to type a password (not mandatory) SSH allow you to log in to the server without having to type a password (not mandatory). This privilege is not available when telnet is used This privilege is not available when rlogin command is used SSH allows you to connect to the server and automatically send a command, so that the server will run that command and then disconnect. So you can use it in automated processing.

SONY ERICSSON C510

SOFTWARE Java : Midp 2.0 Java : Midp 2.0 OS : Java OS : Java Browser : WAP 2.0/HTML(NET front),RSS Browser : WAP 2.0/HTML(NET front),RSS

CONNECTIVITY Bluetooth : File transfer Bluetooth : File transfer USB : Yes,v2.0 USB : Yes,v2.0 PC sync : Pc suite managed PC sync : Pc suite managed Remote sync : Yes Remote sync : Yes

DATA Internet : 3G Internet : 3G Wi-fi : no Wi-fi : no Streaming : Browser Compatible Streaming : Browser Compatible Security : Inbuilt Security : Inbuilt

Technology 3G : HSDPA 3G : HSDPA