remote login

27
REMOTE LOGIN REMOTE LOGIN

Upload: guest095022

Post on 19-Dec-2014

2.963 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Remote Login

REMOTE LOGINREMOTE LOGIN

Page 2: Remote Login

TEAM MEMBERSTEAM MEMBERS

AMULYA GURURAJ AMULYA GURURAJ 1MS07IS0061MS07IS006

BHARGAVI C.S BHARGAVI C.S 1MS07IS0131MS07IS013

MEGHANA N. MEGHANA N. 1MS07IS0501MS07IS050

TANUSHREE A.G TANUSHREE A.G 1MS07IS1391MS07IS139

Page 3: Remote Login

CONTENTSCONTENTS1.1. INTRODUCTIONINTRODUCTION2.2. SSH (SECURE SHELL)SSH (SECURE SHELL)3.3. DIFFERENCES BETWEEN THE DIFFERENCES BETWEEN THE

VARIOUS TOOLSVARIOUS TOOLS4.4. SONY ERICSON CYBERSHOT SONY ERICSON CYBERSHOT

PHONE(INBUILT FEATURE)PHONE(INBUILT FEATURE)5.5. REMOTE LOGIN TO DESKTOP REMOTE LOGIN TO DESKTOP

USING BLACKBERRY USING BLACKBERRY PHONE(EXTERNAL SOFTWARE)PHONE(EXTERNAL SOFTWARE)

Page 4: Remote Login

INTRODUCTION INTRODUCTION

What is remote login?What is remote login?

Remote login is the capability to Remote login is the capability to access the files , documents and access the files , documents and related software of one computer related software of one computer from another along the network.from another along the network.

Page 5: Remote Login

Working of remote login: Working of remote login:

*Virtual Private Network*Virtual Private Network

*Desktop Sharing Software*Desktop Sharing Software

Page 6: Remote Login

Advantages:Advantages:

*Efficiency*Efficiency

*Cost*Cost

*Fast*Fast Disadvantages:Disadvantages:

*Lack of security *Lack of security

Page 7: Remote Login

REMOTE LOGIN TO DESKTOP REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONEUSING BLACKBERRY PHONE

INSTRUCTIONSINSTRUCTIONS

Page 8: Remote Login

RDM+(REMOTE DESKTOP FOR RDM+(REMOTE DESKTOP FOR MOBILES)MOBILES)

This is a communication tool that gives This is a communication tool that gives you the ability to connect to remote you the ability to connect to remote computer from your mobile device.computer from your mobile device.

RDM+ software consists of two RDM+ software consists of two components:components:

the desktop part (RDM+ desktop) should the desktop part (RDM+ desktop) should be installed on the remote computerbe installed on the remote computer

the client module (RDM+client) should be the client module (RDM+client) should be installed on your mobile devices.installed on your mobile devices.

Page 9: Remote Login
Page 10: Remote Login
Page 11: Remote Login
Page 12: Remote Login
Page 13: Remote Login
Page 14: Remote Login

3. RDM+ DESKTOP SETTINGS3. RDM+ DESKTOP SETTINGS

Page 15: Remote Login

4. RDM+ DESKTOP AND STATUS CONNECTIONS4. RDM+ DESKTOP AND STATUS CONNECTIONS

Page 16: Remote Login

RDM+ CLIENT RDM+ CLIENT

THE RDM+ CLIENT CAN BE DOWNLOADED BY THE RDM+ CLIENT CAN BE DOWNLOADED BY GOING TO THE WEBSITE GOING TO THE WEBSITE http://www.rdmplus.com/rdm/bb/download.htmlhttp://www.rdmplus.com/rdm/bb/download.htmland download the software on the mobile phone and download the software on the mobile phone enter the unique computer number and access the enter the unique computer number and access the desktop remotely from the blackberry phone.desktop remotely from the blackberry phone.

Page 17: Remote Login

SSH- Secure ShellSSH- Secure Shell Tools used for Remote Login:Tools used for Remote Login:1.1. RloginRlogin: : rloginrlogin is a is a software utilitysoftware utility for for

Unix-likeUnix-like computer computer operating systemsoperating systems that that allows users to log in on another allows users to log in on another hosthost via a via a networknetwork..

2.2. TelnetTelnet:: Telnet allows remote login and can be Telnet allows remote login and can be used to access and run interactive applications on used to access and run interactive applications on remote systems. You need to know the IP Address remote systems. You need to know the IP Address or the host name of the remote system and also or the host name of the remote system and also have an account in order to access the remote have an account in order to access the remote system through telnet.system through telnet.

3.3. SSHSSH – Secure shell. – Secure shell.

Page 18: Remote Login

• Remote Login using Remote Login using SSHSSH

What is SSH?What is SSH? SSHSSH is a is a network protocolnetwork protocol that allows data to be that allows data to be

exchanged using a exchanged using a secure channelsecure channel between two between two networked devices.networked devices.

Uses of SSH.Uses of SSH.1.1. Access to the UNIX-like environment from a Windows Access to the UNIX-like environment from a Windows

machine.machine.2.2. Work from home with access to your filestore.Work from home with access to your filestore.3.3. Copying files between your filestore and another Copying files between your filestore and another

machine. machine. 4.4. Read restricted web pages.Read restricted web pages.5.5. For executing command on a remote host.For executing command on a remote host.

Page 19: Remote Login

• How to use SSH?How to use SSH?ssh ssh useruser@@hosthost useruser: Your teaching domain Unix login : Your teaching domain Unix login name. name. hosthost: The machine to login to.: The machine to login to. Are you sure you want to continue Are you sure you want to continue connecting (yes/no)?connecting (yes/no)? This is a check to make sure that another This is a check to make sure that another machine is not masquerading as the remote machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'.machine. In most cases it is safe to say 'yes'. Enter your password at the prompt and you Enter your password at the prompt and you will be presented with your shell command will be presented with your shell command line:line: username@hostname password:username@hostname password: Last login: Sun Sep 14 14:11:57 2003 Last login: Sun Sep 14 14:11:57 2003 fromfrom

Page 20: Remote Login

• Using Secure Shell for Using Secure Shell for Windows Windows

Page 21: Remote Login

Using Secure Shell for Using Secure Shell for WindowsWindows

Select a host name (or IP address) to connect to. Select a host name (or IP address) to connect to. User name is ‘whom’ you are going to login as. Root, or User name is ‘whom’ you are going to login as. Root, or

another user can be used. another user can be used. Port number is 22 by default .You will need to use port Port number is 22 by default .You will need to use port

22 unless you alter is on the target device.22 unless you alter is on the target device. Authentication methods are password, SecurID or others. Authentication methods are password, SecurID or others.

Page 22: Remote Login

• How do SSH, Telnet and Rlogin How do SSH, Telnet and Rlogin differ?differ?TelnetTelnet RloginRlogin SSHSSH

Telnet protocol offer minimal Telnet protocol offer minimal securitysecurity

Rlogin protocol offer minimal Rlogin protocol offer minimal securitysecurity

SSH is a recently designed, SSH is a recently designed,

high-security protocolhigh-security protocol Telnet allows you to pass some Telnet allows you to pass some settings on to the server, such settings on to the server, such as environment variables.as environment variables.

Rlogin do not support thisRlogin do not support this SSH does not support thisSSH does not support this

Telnet requires entering the Telnet requires entering the

passwordpassword Rlogin allow you to log in to Rlogin allow you to log in to the server without having to the server without having to type a password (nottype a password (not mandatory) mandatory)

SSH allow you to log in to the SSH allow you to log in to the server without having to type a server without having to type a

passwordpassword (not(not mandatory). mandatory).

This privilege is not available when This privilege is not available when

telnet is usedtelnet is used This privilege is not available This privilege is not available when rlogin command is usedwhen rlogin command is used

SSH allows you to connect to SSH allows you to connect to the server and automatically the server and automatically send a command, so that the send a command, so that the server will run that command server will run that command and then disconnect. So you and then disconnect. So you can use it in automated can use it in automated processing.processing.

Page 23: Remote Login

SONY ERICSSON SONY ERICSSON C510C510

Page 24: Remote Login

SOFTWARESOFTWARE

Java : Midp 2.0Java : Midp 2.0 OS : JavaOS : Java Browser : WAP 2.0/HTML(NET Browser : WAP 2.0/HTML(NET

front),RSSfront),RSS

Page 25: Remote Login

CONNECTIVITYCONNECTIVITY

Bluetooth : File transferBluetooth : File transfer USB : Yes,v2.0USB : Yes,v2.0 PC sync : Pc suite managedPC sync : Pc suite managed Remote sync : YesRemote sync : Yes

Page 26: Remote Login

DATADATA

Internet : 3GInternet : 3G Wi-fi : noWi-fi : no Streaming : Browser CompatibleStreaming : Browser Compatible Security : InbuiltSecurity : Inbuilt

Page 27: Remote Login

TechnologyTechnology

3G : HSDPA3G : HSDPA