By Nithin & group

14
TEAM MEMBERS: VINITH J 1MS07IS115 NITHIN KV 1MS07IS136 RAGHAVENDRA KC 1MS07IS074 JANARDHAN C 1MS08IS403

description

 

Transcript of By Nithin & group

Page 1: By Nithin & group

TEAM MEMBERS:VINITH J 1MS07IS115NITHIN KV 1MS07IS136RAGHAVENDRA KC 1MS07IS074JANARDHAN C 1MS08IS403

Page 2: By Nithin & group

Remote Login refers to any method of controlling a computer from a remote location.

It uses simple desktop sharing software to give you a "remote control" for accessing your computer and all of its software and hard drive files.

Remote login works exactly the same way as desktop sharing.

Page 3: By Nithin & group

It involves two separate parties: the host computer and the remote user.

For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software.

For security purposes, all packets of information that are sent over the network are typically encrypted on each end.

It requires both the systems to be powered on and permission from both sides.

Page 4: By Nithin & group

The three basic components required are:

• Software install (on both the host and the remote computer)

• Secured desktop sharing network.

• Connection (can be LAN, Wi-Fi or internet)

Page 5: By Nithin & group

Telnet Telnet is a network protocol used on the

Internet or local area networks to provide a bidirectional interactive communications facility.

Telnet provides command-line interface on a remote host.

Most of the network equipment and operating system with TCP/IP stack support telnet service for remote access.

Telnet is a client-server protocol.

Telnet uses TCP port number 23

Page 6: By Nithin & group

Security-Telnet, by default, does not encrypt any data sent over the connection (including passwords).

Page 7: By Nithin & group

Remote Shell The remote shell (rsh) is a command line

computer program which can execute shell commands as another user, and on another computer across a computer network.

It uses the well-known Transmission Control Protocol (TCP) port number 514.

Commonly used in Unix operating system.

The rsh protocol is not secure for network use, because it sends unencrypted information over the network.

Page 8: By Nithin & group

Secure Shell Secure Shell or SSH is a network protocol that

allows data to be exchanged using a secure channel between two networked devices.

Used primarily on Linux and Unix based systems to access shell accounts.

SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, leaving them open for interception.

The encryption used by SSH provides confidentiality and integrity of data over an insecure network, such as the Internet.

Page 9: By Nithin & group

It can transfer files using the associated SFTP or SCP protocols.

The standard TCP port 22 has been assigned for contacting SSH servers.

Page 10: By Nithin & group

Remote Administrator

Remote Administrator (Radmin) is a product of Famatech International Corp. It is remote control software for Microsoft Windows which uses the Mirror Driver (Video Hook Driver) to remotely control another computer.

Radmin consists of two separate modules:

The Server module (Radmin Server): needs to be installed on the computer which you want to access remotely.

Page 11: By Nithin & group

The Client module (Radmin Viewer): needs to be installed on the computer which you want to use to access remote computer. However, the folder contents of the installed Client module can be copied and placed on any other folders and/or computers and these computers need not have the Client module installed.

Page 12: By Nithin & group

WinSCP WinSCP (Windows Secure CoPy) is an open

source SFTP and FTP client for Microsoft Windows.

Its main function is secure file transfer between a local and a remote computer.

For secure transfers, it uses Secure Shell (SSH) and supports the SCP protocol in addition to SFTP.

Page 13: By Nithin & group

WinSCP

Page 14: By Nithin & group

WinSCP 4.1.0 editor