Upload
harsh-singh
View
864
Download
0
Tags:
Embed Size (px)
Citation preview
GROUPGROUP
KRAZZY 4KRAZZY 4 PRESENTSPRESENTS
AnAn
Aayush Himanshu Royston Aayush Himanshu Royston VinayakVinayak
PresentationPresentation
AnAn
ISE FacultyISE Faculty ProductionProduction
ContentsContents Introduction Introduction What are the requisites for Remote What are the requisites for Remote
Login?Login? How does Remote Login workHow does Remote Login work Remote Login DemonstrationsRemote Login Demonstrations• Connecting Windows to Linux.Connecting Windows to Linux.• Connecting Windows to Windows.Connecting Windows to Windows.• TelnetTelnet
IntroductionIntroduction
What is Remote Login?What is Remote Login?
Remote Login means to access native Remote Login means to access native
computer from the other computer on computer from the other computer on the the
network when you are connected to network when you are connected to internet.internet.
What does remote Login do?What does remote Login do?
Remote login allows workers to Remote login allows workers to
access their work computers from any access their work computers from any
Internet-enabled device, including Internet-enabled device, including home home
computers, laptops and even PDAs. computers, laptops and even PDAs.
Requisites for Remote LoginRequisites for Remote Login
Remote Login requires three Remote Login requires three componentscomponents
Software DownloadSoftware Download Internet ConnectionInternet Connection Secure Desktop Sharing NetworkSecure Desktop Sharing Network
Remote login will only work if the host Remote login will only work if the host computer is powered on, connected to the computer is powered on, connected to the Internet and running the desktop sharing Internet and running the desktop sharing software. software. Each time you open and run the desktop Each time you open and run the desktop sharing software on the host computer, the sharing software on the host computer, the software starts a new session. software starts a new session. Each session has a particular ID and/or Each session has a particular ID and/or password that's required to remotely log in to password that's required to remotely log in to the host computer. the host computer. Once the session has been established, most Once the session has been established, most desktop sharing software quietly runs in the desktop sharing software quietly runs in the background of the host computer until a background of the host computer until a remote login request is made.remote login request is made.
SSHSSH It stands for Secure Shell.It stands for Secure Shell. Secure Shell or SSH is a Secure Shell or SSH is a network protocol
that allows data to be exchanged using a that allows data to be exchanged using a secure channel between two networked between two networked devices. devices.
Used primarily on Used primarily on Linux and and Unix based based systems to access systems to access shell accounts..
SSH uses SSH uses public-key cryptography to to authenticate the remote computer and the remote computer and allow the remote computer to authenticate allow the remote computer to authenticate the user, if necessarythe user, if necessary
SSH is a protocol that can be used for many SSH is a protocol that can be used for many applications. Some of the applications below applications. Some of the applications below may require features that are only available or may require features that are only available or compatible with specific SSH clients or compatible with specific SSH clients or servers. For example, using the SSH protocol servers. For example, using the SSH protocol to implement a to implement a VPN is possible, but presently is possible, but presently only with the OpenSSH server and client only with the OpenSSH server and client implementation.implementation.
for login to a shell on a remote host (replacing for login to a shell on a remote host (replacing Telnet and rlogin) Telnet and rlogin)
for executing a single command on a remote for executing a single command on a remote host (replacing rsh) host (replacing rsh)
for copying files from a local server to a remote for copying files from a local server to a remote host. See host. See SCP, as an alternative for , as an alternative for rcp
in combination with in combination with SFTP, as a secure , as a secure alternative to alternative to FTP file transfer file transfer
in combination with in combination with rsync to backup, copy and to backup, copy and mirror files efficiently and securely mirror files efficiently and securely
for for port forwarding or tunneling a port (not to a port (not to be confused with a be confused with a VPN which which routes packets packets between different networks or bridges two between different networks or bridges two broadcast domains into one.). broadcast domains into one.).
for using as a full-fledged encrypted VPN. for using as a full-fledged encrypted VPN. Note that only OpenSSH server and client Note that only OpenSSH server and client supports this feature. supports this feature.
for forwarding X11 through multiple hosts for forwarding X11 through multiple hosts for browsing the web through an for browsing the web through an
encrypted proxy connection with SSH encrypted proxy connection with SSH clients that support the SOCKS protocol. clients that support the SOCKS protocol.
for securely mounting a directory on a for securely mounting a directory on a remote server as filesystem on a local remote server as filesystem on a local computer using SSHFS. computer using SSHFS.
for automated remote monitoring and for automated remote monitoring and management of servers through one or management of servers through one or more of the mechanisms as discussed more of the mechanisms as discussed above. above.
PuTTYPuTTYPuTTY is a terminal emulator PuTTY is a terminal emulator
applicationapplication
which can act as a client for the ssh, which can act as a client for the ssh, telnet,telnet,
rlogin and raw TCP computing rlogin and raw TCP computing protocols.protocols.
Features of PuTTYFeatures of PuTTYStoring of hosts and preferences for Storing of hosts and preferences for
later use.later use.Control over the ssh encryption key Control over the ssh encryption key
and protocol version.and protocol version.Control over the port forwarding with Control over the port forwarding with
ssh(local, remote or dynamic port ssh(local, remote or dynamic port forwarding)forwarding)
Its supports IPv6Its supports IPv6Support for local serial port connectionsSupport for local serial port connectionsSelf contained executable requires no Self contained executable requires no
installationinstallation
VNCVNC
Virtual network computing is a Virtual network computing is a graphicalgraphical
desktop sharing system that uses the desktop sharing system that uses the RFBRFB
protocol to remotely control anotherprotocol to remotely control another
computer.computer.
Connecting the Windows OSConnecting the Windows OS1.1. IntroductionIntroduction
2.2. What software can be used?What software can be used?
3.3. FeaturesFeatures
4.4. Functioning Functioning
5.5. Security and encryptionSecurity and encryption
TELNETTELNET Telnet is an abbreviation for Terminal Telnet is an abbreviation for Terminal
Network.Network. It is a general purpose client server It is a general purpose client server
application program which is used as a application program which is used as a standard TCP/IP protocol for VTD as standard TCP/IP protocol for VTD as proposed by ISO.proposed by ISO.
It establishes the connection to a remote It establishes the connection to a remote system in such a way that the local system in such a way that the local terminal appears to be a terminal at the terminal appears to be a terminal at the remote system.remote system.
How does Local Login occur?How does Local Login occur? When a user logs in into a time-When a user logs in into a time-
sharing system it is called local login.sharing system it is called local login. As the user types at terminal the As the user types at terminal the
keystrokes are accepted by the keystrokes are accepted by the terminal driver which are in turn sent terminal driver which are in turn sent to OS.to OS.
The OS interprets the characters and The OS interprets the characters and invokes the desired application invokes the desired application program accordingly.program accordingly.
How Does Remote-login Occur in How Does Remote-login Occur in Telnet?Telnet?
Here the Telnet client and server Here the Telnet client and server programs come into use.programs come into use.
The keystrokes are sent to terminal The keystrokes are sent to terminal driver where local OS accepts it but driver where local OS accepts it but does not interpret it.does not interpret it.
The characters are sent to telnet client The characters are sent to telnet client and transformed into NVT characters and transformed into NVT characters and delivers them to local TCP/IP and delivers them to local TCP/IP protocol stack.protocol stack.
The command or text in NVT form The command or text in NVT form travels through the internet to TCP/IP travels through the internet to TCP/IP stack of remote machine.stack of remote machine.
Here characters are then delivered to Here characters are then delivered to OS and passed to Telnet server OS and passed to Telnet server which changes character into which changes character into understandable form.understandable form.
THANK YOUTHANK YOU