REMOTE LOGIN
TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA N. 1MS07IS050 TANUSHREE A.G 1MS07IS139 TANUSHREE A.G 1MS07IS139
CONTENTS 1. INTRODUCTION 2. SSH (SECURE SHELL) 3. DIFFERENCES BETWEEN THE VARIOUS TOOLS 4. SONY ERICSON CYBERSHOT PHONE(INBUILT FEATURE) 5. REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONE(EXTERNAL SOFTWARE)
INTRODUCTION What is remote login? What is remote login? Remote login is the capability to access the files, documents and related software of one computer from another along the network.
Working of remote login: Working of remote login: *Virtual Private Network *Desktop Sharing Software *Desktop Sharing Software
Advantages: Advantages:*Efficiency*Cost*Fast Disadvantages: Disadvantages: *Lack of security
REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONE INSTRUCTIONS
RDM+(REMOTE DESKTOP FOR MOBILES) This is a communication tool that gives you the ability to connect to remote computer from your mobile device. This is a communication tool that gives you the ability to connect to remote computer from your mobile device. RDM+ software consists of two components: RDM+ software consists of two components: the desktop part (RDM+ desktop) should be installed on the remote computer the desktop part (RDM+ desktop) should be installed on the remote computer the client module (RDM+client) should be installed on your mobile devices. the client module (RDM+client) should be installed on your mobile devices.
3. RDM+ DESKTOP SETTINGS
4. RDM+ DESKTOP AND STATUS CONNECTIONS
SSH- Secure Shell Tools used for Remote Login: Tools used for Remote Login: 1. Rlogin : rlogin is a software utility for Unix- like computer operating systems that allows users to log in on another host via a network. software utilityUnix- likeoperating systemshostnetworksoftware utilityUnix- likeoperating systemshostnetwork 2. Telnet : Telnet allows remote login and can be used to access and run interactive applications on remote systems. You need to know the IP Address or the host name of the remote system and also have an account in order to access the remote system through telnet. 3. SSH – Secure shell.
Remote Login using SSH Remote Login using SSH What is SSH? What is SSH? SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.network protocolsecure channelnetwork protocolsecure channel Uses of SSH. Uses of SSH. 1. Access to the UNIX-like environment from a Windows machine. 2. Work from home with access to your filestore. 3. Copying files between your filestore and another machine. 4. Read restricted web pages. 5. For executing command on a remote host.
How to use SSH? How to use SSH? ssh user: Your teaching domain Unix login name. user: Your teaching domain Unix login name. host: The machine to login to. host: The machine to login to. Are you sure you want to continue connecting (yes/no)? Are you sure you want to continue connecting (yes/no)? This is a check to make sure that another machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'. This is a check to make sure that another machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'. Enter your password at the prompt and you will be presented with your shell command line: Enter your password at the prompt and you will be presented with your shell command line: password: password: Last login: Sun Sep 14 14:11: from Last login: Sun Sep 14 14:11: from
Using Secure Shell for Windows Using Secure Shell for Windows
Using Secure Shell for Windows Select a host name (or IP address) to connect to. Select a host name (or IP address) to connect to. User name is ‘whom’ you are going to login as. Root, or another user can be used. User name is ‘whom’ you are going to login as. Root, or another user can be used. Port number is 22 by default.You will need to use port 22 unless you alter is on the target device. Port number is 22 by default.You will need to use port 22 unless you alter is on the target device. Authentication methods are password, SecurID or others. Authentication methods are password, SecurID or others.
How do SSH, Telnet and Rlogin differ? How do SSH, Telnet and Rlogin differ? Telnet Rlogin Rlogin SSH SSH Telnet protocol offer minimal security Rlogin protocol offer minimal security SSH is a recently designed, high-security protocol Telnet allows you to pass some settings on to the server, such as environment variables. Rlogin do not support this SSH does not support this Telnet requires entering the password Rlogin allow you to log in to the server without having to type a password (not mandatory) SSH allow you to log in to the server without having to type a password (not mandatory). This privilege is not available when telnet is used This privilege is not available when rlogin command is used SSH allows you to connect to the server and automatically send a command, so that the server will run that command and then disconnect. So you can use it in automated processing.
SONY ERICSSON C510
SOFTWARE Java : Midp 2.0 Java : Midp 2.0 OS : Java OS : Java Browser : WAP 2.0/HTML(NET front),RSS Browser : WAP 2.0/HTML(NET front),RSS
CONNECTIVITY Bluetooth : File transfer Bluetooth : File transfer USB : Yes,v2.0 USB : Yes,v2.0 PC sync : Pc suite managed PC sync : Pc suite managed Remote sync : Yes Remote sync : Yes
DATA Internet : 3G Internet : 3G Wi-fi : no Wi-fi : no Streaming : Browser Compatible Streaming : Browser Compatible Security : Inbuilt Security : Inbuilt
Technology 3G : HSDPA 3G : HSDPA