Upload
rahul-hosmani
View
226
Download
0
Embed Size (px)
Citation preview
7/30/2019 DC Assignment RAHULcc
1/20
7/30/2019 DC Assignment RAHULcc
2/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
2
Solution
Solution 1: Windows Platform Remote login
Find out which OS platform is currently installed
To remote login from one node to another [one computer to another];Find out the OS installed in computer where one wants to remote login.
In this case 192.168.20.68,
If it is a Windows Family, like Windows XP, Windows Vista, Windows 7 etc.
One can use REMOTE DESKTOP CONNECTION
Fig.1(Remote Desktop connection of Windows XP)
7/30/2019 DC Assignment RAHULcc
3/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
3
Fig.1.1(Remote Desktop connection of Windows XP)
Fig.2(Remote Desktop connection of Windows 7)
7/30/2019 DC Assignment RAHULcc
4/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
4
Fig.2.1(Remote Desktop connection of Windows 7)
Before Remotely Logging into computer,one must allow other computers to connect to computer.
To do so,
In Windows XP,
Go to start -> Right Click on My Computer ->Properties
In Remote Tab,
7/30/2019 DC Assignment RAHULcc
5/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
5
In Remote Desktop pane, Check Allow users to connect remotely to this computer and
apply it, otherwise you wont be able to remotely login to the computer.
In Windows 7,
Go to start -> Right Click on Computer ->Properties
7/30/2019 DC Assignment RAHULcc
6/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
6
Click on Remote Settings,
7/30/2019 DC Assignment RAHULcc
7/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
7
In Remote Desktop pane,
Option 1: This option will help one connect from any windows older versions.Check Allow connections from computers running any version of Remote Desktop(less
secure) and apply it, otherwise you wont be able to remotely login to the computer.
Option 2: This option will help one connect from windows 7 and above.
Check Allow connections from computers running Remote Desktop with Network leve
Authentication (more secure) and apply it, otherwise you wont be able to remotely login
to the computer.
Note: Remote Desktop connection is more secure in 7 than it was in XP. So one must
choose an appropriate option.
In my Experiment I chose Option 1, because I was using windows xp and wanted to
connect to windows 7.
Now that the computer is allowed to be remotely accessed, one must open Remote
7/30/2019 DC Assignment RAHULcc
8/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
8
Desktop Connection.
In Windows XP,
Start -> All Programs-> Accessories -> Communications-> Remote Desktop connection.
If this is not found then
In Command prompt, type mstsc
In Windows 7,
Start-> in search text field type remote,
7/30/2019 DC Assignment RAHULcc
9/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
9
Click on Remote Desktop Connection,
Or just like in XP, In Command prompt, type mstsc.
7/30/2019 DC Assignment RAHULcc
10/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
10
Now to find out the IP Address of the computer where one wants to remotely login,
To do so double click on network,
7/30/2019 DC Assignment RAHULcc
11/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
11
In Details tab, one can get the IP Address (Client IP Address), used to Remotely connect to
the computer.
Or, in Command Prompt, type ipconfig
7/30/2019 DC Assignment RAHULcc
12/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
12
Or, if internet is on, Google whats is my IP
Now, you got the IP address, Insert it into computer field.
Username is the user account present in the computer to be logged on.
After entering these two fields, click on connect.
7/30/2019 DC Assignment RAHULcc
13/20
7/30/2019 DC Assignment RAHULcc
14/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
14
This is the remote desktop of the other computer as seen in my computer. One can
minimize the window to see as a window. Or Maximize to use the computer in full screen.
Note:
Only one person can Login to a computer,
If one has remotely logged in to a computer, the other person using the computer will be
logged out. And if we log back in to the computer which is being accessed, the remote
desktop connection will be disconnected.
7/30/2019 DC Assignment RAHULcc
15/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
15
7/30/2019 DC Assignment RAHULcc
16/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
16
Solution 2: non Windows Platform
[BRIEF DESCRIPTION OF TELNET AND SSH;]
[PROCEDURE TO USE NOT DISCUSSED]
Telnet:Telnet is a network protocol used on the Internet orlocal area networks to provide a
bidirectional interactive text-oriented communication facility using a
virtual terminal connection. User data is interspersed in-band with Telnet control
information in an 8-bitbyte oriented data connection over the Transmission Control
Protocol (TCP).
Telnet provided access to a command-line interface (usually, of an operating system) on
a remote host. Most network equipment and operating systems with a TCP/IP
stacksupport a Telnet service for remote configuration (including systems based on
Windows NT). Because of security issues with Telnet, its use for this purpose has waned in
favor of SSH.
http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/wiki/Text_terminalhttp://en.wikipedia.org/wiki/In-band_signalinghttp://en.wikipedia.org/wiki/Byte_orientedhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Byte_orientedhttp://en.wikipedia.org/wiki/In-band_signalinghttp://en.wikipedia.org/wiki/Text_terminalhttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Network_protocol7/30/2019 DC Assignment RAHULcc
17/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
17
7/30/2019 DC Assignment RAHULcc
18/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
18
SSH:
Secure Shell (SSH) is a cryptographic network protocol for secure data communication,
remote shell services or command execution and other secure network services between
two networked computers that connects, via a secure channel over an insecure
network, a server and a client (running SSH serverand SSH client programs, respectively).
It is best-known application of the protocol is for access to shell accounts on Unix-
like operating systems (it can be used in a similar fashion for accounts on Windows,
though it is not a very popular option due to Remote Desktop Services.
It was designed as a replacement forTelnet and other insecure remote shell protocols
such as the Berkeley rsh, rex protocols, which send information, notably passwords,
in plaintext, rendering them susceptible to interception and disclosure using packet
analysis. The encryption used by SSH is intended to provide confidentiality and integrity of
data over an unsecured network, such as the Internet.
SSH uses public-key cryptography to authenticate the remote computer and allow it to
authenticate the user. Anyone can produce a matching pair of different keys (public
and private). The public key is placed on all computers that must allow access to theowner of the matching private key (the owner keeps the private key secret). While
authentication is based on the private key, the key itself is never transferred through the
network during authentication.
SSH only verifies whether the same person offering the public key also owns the matching
private key. Hence, in all versions of SSH it is important to verify unknown public keys,
i.e. associate the public keys with identities, before accepting them as valid.
http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Public-key_cryptographyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Public-key_cryptography#Associating_public_keys_with_identitieshttp://en.wikipedia.org/wiki/Public-key_cryptography#Associating_public_keys_with_identitieshttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Public-key_cryptographyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/Network_protocol7/30/2019 DC Assignment RAHULcc
19/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
19
7/30/2019 DC Assignment RAHULcc
20/20
Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072
20
Conclusion
One can remote login to any computer remotely, provided the computer is part of the network and is
turned on.
Using Windows Remote Desktop Connection is very easy as compared to SSH or telnet.
IP address can identify a computer in the network, which is used to login to the computer remotely.
The computer which one wants to connect must have a password [for security reasons].
One can also use the computer name to identify the computer in the network [specifically works on
windows remote desktop connection].
Reference
Website Links
http://en.wikipedia.org/wiki/Secure_Shell
http://en.wikipedia.org/wiki/Telnet http://support.microsoft.com/kb/284931
http://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connection
http://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utility
http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7
http://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Telnethttp://support.microsoft.com/kb/284931http://support.microsoft.com/kb/284931http://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://support.microsoft.com/kb/284931http://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Secure_Shell