23
GROUP GROUP KRAZZY 4 KRAZZY 4 PRESENTS PRESENTS

Remote1

Embed Size (px)

Citation preview

Page 1: Remote1

GROUPGROUP

KRAZZY 4KRAZZY 4 PRESENTSPRESENTS

Page 2: Remote1

AnAn

Aayush Himanshu Royston Aayush Himanshu Royston VinayakVinayak

PresentationPresentation

Page 3: Remote1

AnAn

ISE FacultyISE Faculty ProductionProduction

Page 4: Remote1
Page 5: Remote1

ContentsContents Introduction Introduction What are the requisites for Remote What are the requisites for Remote

Login?Login? How does Remote Login workHow does Remote Login work Remote Login DemonstrationsRemote Login Demonstrations• Connecting Windows to Linux.Connecting Windows to Linux.• Connecting Windows to Windows.Connecting Windows to Windows.• TelnetTelnet

Page 6: Remote1

IntroductionIntroduction

What is Remote Login?What is Remote Login?

Remote Login means to access native Remote Login means to access native

computer from the other computer on computer from the other computer on the the

network when you are connected to network when you are connected to internet.internet.

Page 7: Remote1

What does remote Login do?What does remote Login do?

Remote login allows workers to Remote login allows workers to

access their work computers from any access their work computers from any

Internet-enabled device, including Internet-enabled device, including home home

computers, laptops and even PDAs. computers, laptops and even PDAs.

Page 8: Remote1

Requisites for Remote LoginRequisites for Remote Login

Remote Login requires three Remote Login requires three componentscomponents

Software DownloadSoftware Download Internet ConnectionInternet Connection Secure Desktop Sharing NetworkSecure Desktop Sharing Network

Page 9: Remote1

Remote login will only work if the host Remote login will only work if the host computer is powered on, connected to the computer is powered on, connected to the Internet and running the desktop sharing Internet and running the desktop sharing software. software. Each time you open and run the desktop Each time you open and run the desktop sharing software on the host computer, the sharing software on the host computer, the software starts a new session. software starts a new session. Each session has a particular ID and/or Each session has a particular ID and/or password that's required to remotely log in to password that's required to remotely log in to the host computer. the host computer. Once the session has been established, most Once the session has been established, most desktop sharing software quietly runs in the desktop sharing software quietly runs in the background of the host computer until a background of the host computer until a remote login request is made.remote login request is made.

Page 10: Remote1

SSHSSH It stands for Secure Shell.It stands for Secure Shell. Secure Shell or SSH is a Secure Shell or SSH is a network protocol

that allows data to be exchanged using a that allows data to be exchanged using a secure channel between two networked between two networked devices. devices.

Used primarily on Used primarily on Linux and and Unix based based systems to access systems to access shell accounts..

SSH uses SSH uses public-key cryptography to to authenticate the remote computer and the remote computer and allow the remote computer to authenticate allow the remote computer to authenticate the user, if necessarythe user, if necessary

Page 11: Remote1

SSH is a protocol that can be used for many SSH is a protocol that can be used for many applications. Some of the applications below applications. Some of the applications below may require features that are only available or may require features that are only available or compatible with specific SSH clients or compatible with specific SSH clients or servers. For example, using the SSH protocol servers. For example, using the SSH protocol to implement a to implement a VPN is possible, but presently is possible, but presently only with the OpenSSH server and client only with the OpenSSH server and client implementation.implementation.

for login to a shell on a remote host (replacing for login to a shell on a remote host (replacing Telnet and rlogin) Telnet and rlogin)

for executing a single command on a remote for executing a single command on a remote host (replacing rsh) host (replacing rsh)

Page 12: Remote1

for copying files from a local server to a remote for copying files from a local server to a remote host. See host. See SCP, as an alternative for , as an alternative for rcp

in combination with in combination with SFTP, as a secure , as a secure alternative to alternative to FTP file transfer file transfer

in combination with in combination with rsync to backup, copy and to backup, copy and mirror files efficiently and securely mirror files efficiently and securely

for for port forwarding or tunneling a port (not to a port (not to be confused with a be confused with a VPN which which routes packets packets between different networks or bridges two between different networks or bridges two broadcast domains into one.). broadcast domains into one.).

Page 13: Remote1

for using as a full-fledged encrypted VPN. for using as a full-fledged encrypted VPN. Note that only OpenSSH server and client Note that only OpenSSH server and client supports this feature. supports this feature.

for forwarding X11 through multiple hosts for forwarding X11 through multiple hosts for browsing the web through an for browsing the web through an

encrypted proxy connection with SSH encrypted proxy connection with SSH clients that support the SOCKS protocol. clients that support the SOCKS protocol.

Page 14: Remote1

for securely mounting a directory on a for securely mounting a directory on a remote server as filesystem on a local remote server as filesystem on a local computer using SSHFS. computer using SSHFS.

for automated remote monitoring and for automated remote monitoring and management of servers through one or management of servers through one or more of the mechanisms as discussed more of the mechanisms as discussed above. above.

Page 15: Remote1

PuTTYPuTTYPuTTY is a terminal emulator PuTTY is a terminal emulator

applicationapplication

which can act as a client for the ssh, which can act as a client for the ssh, telnet,telnet,

rlogin and raw TCP computing rlogin and raw TCP computing protocols.protocols.

Page 16: Remote1

Features of PuTTYFeatures of PuTTYStoring of hosts and preferences for Storing of hosts and preferences for

later use.later use.Control over the ssh encryption key Control over the ssh encryption key

and protocol version.and protocol version.Control over the port forwarding with Control over the port forwarding with

ssh(local, remote or dynamic port ssh(local, remote or dynamic port forwarding)forwarding)

Its supports IPv6Its supports IPv6Support for local serial port connectionsSupport for local serial port connectionsSelf contained executable requires no Self contained executable requires no

installationinstallation

Page 17: Remote1

VNCVNC

Virtual network computing is a Virtual network computing is a graphicalgraphical

desktop sharing system that uses the desktop sharing system that uses the RFBRFB

protocol to remotely control anotherprotocol to remotely control another

computer.computer.

Page 18: Remote1

Connecting the Windows OSConnecting the Windows OS1.1. IntroductionIntroduction

2.2. What software can be used?What software can be used?

3.3. FeaturesFeatures

4.4. Functioning Functioning

5.5. Security and encryptionSecurity and encryption

Page 19: Remote1

TELNETTELNET Telnet is an abbreviation for Terminal Telnet is an abbreviation for Terminal

Network.Network. It is a general purpose client server It is a general purpose client server

application program which is used as a application program which is used as a standard TCP/IP protocol for VTD as standard TCP/IP protocol for VTD as proposed by ISO.proposed by ISO.

It establishes the connection to a remote It establishes the connection to a remote system in such a way that the local system in such a way that the local terminal appears to be a terminal at the terminal appears to be a terminal at the remote system.remote system.

Page 20: Remote1

How does Local Login occur?How does Local Login occur? When a user logs in into a time-When a user logs in into a time-

sharing system it is called local login.sharing system it is called local login. As the user types at terminal the As the user types at terminal the

keystrokes are accepted by the keystrokes are accepted by the terminal driver which are in turn sent terminal driver which are in turn sent to OS.to OS.

The OS interprets the characters and The OS interprets the characters and invokes the desired application invokes the desired application program accordingly.program accordingly.

Page 21: Remote1

How Does Remote-login Occur in How Does Remote-login Occur in Telnet?Telnet?

Here the Telnet client and server Here the Telnet client and server programs come into use.programs come into use.

The keystrokes are sent to terminal The keystrokes are sent to terminal driver where local OS accepts it but driver where local OS accepts it but does not interpret it.does not interpret it.

The characters are sent to telnet client The characters are sent to telnet client and transformed into NVT characters and transformed into NVT characters and delivers them to local TCP/IP and delivers them to local TCP/IP protocol stack.protocol stack.

Page 22: Remote1

The command or text in NVT form The command or text in NVT form travels through the internet to TCP/IP travels through the internet to TCP/IP stack of remote machine.stack of remote machine.

Here characters are then delivered to Here characters are then delivered to OS and passed to Telnet server OS and passed to Telnet server which changes character into which changes character into understandable form.understandable form.

Page 23: Remote1

THANK YOUTHANK YOU