remote login - WordPress.com

Download Report

Transcript remote login - WordPress.com

REMOTE LOGIN
TEAM MEMBERS
AMULYA GURURAJ
 BHARGAVI C.S
 MEGHANA N.
 TANUSHREE A.G

1MS07IS006
1MS07IS013
1MS07IS050
1MS07IS139
CONTENTS
1.
2.
3.
4.
5.
INTRODUCTION
SSH (SECURE SHELL)
DIFFERENCES BETWEEN THE
VARIOUS TOOLS
SONY ERICSON CYBERSHOT
PHONE(INBUILT FEATURE)
REMOTE LOGIN TO DESKTOP
USING BLACKBERRY
PHONE(EXTERNAL SOFTWARE)
INTRODUCTION

What is remote login?
Remote login is the capability to access the
files , documents and related software of one
computer from another along the network.

Working of remote login:
*Virtual Private Network
*Desktop Sharing Software


Advantages:
*Efficiency
*Cost
*Fast
Disadvantages:
*Lack of security
REMOTE LOGIN TO DESKTOP USING
BLACKBERRY PHONE
INSTRUCTIONS
RDM+(REMOTE DESKTOP FOR
MOBILES)




This is a communication tool that gives you the ability
to connect to remote computer from your mobile
device.
RDM+ software consists of two components:
the desktop part (RDM+ desktop) should be installed
on the remote computer
the client module (RDM+client) should be installed on
your mobile devices.
3. RDM+ DESKTOP SETTINGS
4. RDM+ DESKTOP AND STATUS CONNECTIONS
SSH- Secure Shell

Tools used for Remote Login:
1.
Rlogin: rlogin is a software utility for Unixlike computer operating systems that allows
users to log in on another host via a network.
2.
Telnet: Telnet allows remote login and can be
used to access and run interactive applications on
remote systems. You need to know the IP Address
or the host name of the remote system and also
have an account in order to access the remote
system through telnet.
3.
SSH – Secure shell.
• Remote Login using SSH

What is SSH?
SSH is a network protocol that allows data to be
exchanged using a secure channel between two
networked devices.

Uses of SSH.
1.
Access to the UNIX-like environment from a Windows
machine.
Work from home with access to your filestore.
Copying files between your filestore and another
machine.
Read restricted web pages.
For executing command on a remote host.
2.
3.
4.
5.
• How to use SSH?
ssh user@host
user: Your teaching domain Unix login
name.
host: The machine to login to.
Are you sure you want to continue
connecting (yes/no)?
This is a check to make sure that another
machine is not masquerading as the remote
machine. In most cases it is safe to say 'yes'.
Enter your password at the prompt and you
will be presented with your shell command
line:
username@hostname password:
Last login: Sun Sep 14 14:11:57 2003
from
• Using Secure Shell for Windows
Using Secure Shell for Windows




Select a host name (or IP address) to connect to.
User name is ‘whom’ you are going to login as. Root, or
another user can be used.
Port number is 22 by default .You will need to use port 22
unless you alter is on the target device.
Authentication methods are password, SecurID or others.
• How do SSH, Telnet and Rlogin
differ?
Telnet
Rlogin
SSH
Telnet protocol offer minimal
security
Rlogin protocol offer minimal
security
SSH is a recently designed,
Telnet allows you to pass some
settings on to the server, such
as environment variables.
Rlogin do not support this
SSH does not support this
Telnet requires entering the
Rlogin allow you to log in to
SSH allow you to log in to the
the server without having to
server without having to type a
type a password (not mandatory)
password (not mandatory).
password
This privilege is not available when
telnet is used
This privilege is not available
when rlogin command is used
high-security protocol
SSH allows you to connect to
the server and automatically
send a command, so that the
server will run that command
and then disconnect. So you
can use it in automated
processing.
SONY ERICSSON
C510
SOFTWARE



Java : Midp 2.0
OS : Java
Browser : WAP 2.0/HTML(NET front),RSS
CONNECTIVITY




Bluetooth : File transfer
USB : Yes,v2.0
PC sync : Pc suite managed
Remote sync : Yes
DATA




Internet : 3G
Wi-fi : no
Streaming : Browser Compatible
Security : Inbuilt
Technology

3G : HSDPA