DC Assignment RAHULcc

Embed Size (px)

Citation preview

  • 7/30/2019 DC Assignment RAHULcc

    1/20

  • 7/30/2019 DC Assignment RAHULcc

    2/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    2

    Solution

    Solution 1: Windows Platform Remote login

    Find out which OS platform is currently installed

    To remote login from one node to another [one computer to another];Find out the OS installed in computer where one wants to remote login.

    In this case 192.168.20.68,

    If it is a Windows Family, like Windows XP, Windows Vista, Windows 7 etc.

    One can use REMOTE DESKTOP CONNECTION

    Fig.1(Remote Desktop connection of Windows XP)

  • 7/30/2019 DC Assignment RAHULcc

    3/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    3

    Fig.1.1(Remote Desktop connection of Windows XP)

    Fig.2(Remote Desktop connection of Windows 7)

  • 7/30/2019 DC Assignment RAHULcc

    4/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    4

    Fig.2.1(Remote Desktop connection of Windows 7)

    Before Remotely Logging into computer,one must allow other computers to connect to computer.

    To do so,

    In Windows XP,

    Go to start -> Right Click on My Computer ->Properties

    In Remote Tab,

  • 7/30/2019 DC Assignment RAHULcc

    5/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    5

    In Remote Desktop pane, Check Allow users to connect remotely to this computer and

    apply it, otherwise you wont be able to remotely login to the computer.

    In Windows 7,

    Go to start -> Right Click on Computer ->Properties

  • 7/30/2019 DC Assignment RAHULcc

    6/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    6

    Click on Remote Settings,

  • 7/30/2019 DC Assignment RAHULcc

    7/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    7

    In Remote Desktop pane,

    Option 1: This option will help one connect from any windows older versions.Check Allow connections from computers running any version of Remote Desktop(less

    secure) and apply it, otherwise you wont be able to remotely login to the computer.

    Option 2: This option will help one connect from windows 7 and above.

    Check Allow connections from computers running Remote Desktop with Network leve

    Authentication (more secure) and apply it, otherwise you wont be able to remotely login

    to the computer.

    Note: Remote Desktop connection is more secure in 7 than it was in XP. So one must

    choose an appropriate option.

    In my Experiment I chose Option 1, because I was using windows xp and wanted to

    connect to windows 7.

    Now that the computer is allowed to be remotely accessed, one must open Remote

  • 7/30/2019 DC Assignment RAHULcc

    8/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    8

    Desktop Connection.

    In Windows XP,

    Start -> All Programs-> Accessories -> Communications-> Remote Desktop connection.

    If this is not found then

    In Command prompt, type mstsc

    In Windows 7,

    Start-> in search text field type remote,

  • 7/30/2019 DC Assignment RAHULcc

    9/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    9

    Click on Remote Desktop Connection,

    Or just like in XP, In Command prompt, type mstsc.

  • 7/30/2019 DC Assignment RAHULcc

    10/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    10

    Now to find out the IP Address of the computer where one wants to remotely login,

    To do so double click on network,

  • 7/30/2019 DC Assignment RAHULcc

    11/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    11

    In Details tab, one can get the IP Address (Client IP Address), used to Remotely connect to

    the computer.

    Or, in Command Prompt, type ipconfig

  • 7/30/2019 DC Assignment RAHULcc

    12/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    12

    Or, if internet is on, Google whats is my IP

    Now, you got the IP address, Insert it into computer field.

    Username is the user account present in the computer to be logged on.

    After entering these two fields, click on connect.

  • 7/30/2019 DC Assignment RAHULcc

    13/20

  • 7/30/2019 DC Assignment RAHULcc

    14/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    14

    This is the remote desktop of the other computer as seen in my computer. One can

    minimize the window to see as a window. Or Maximize to use the computer in full screen.

    Note:

    Only one person can Login to a computer,

    If one has remotely logged in to a computer, the other person using the computer will be

    logged out. And if we log back in to the computer which is being accessed, the remote

    desktop connection will be disconnected.

  • 7/30/2019 DC Assignment RAHULcc

    15/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    15

  • 7/30/2019 DC Assignment RAHULcc

    16/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    16

    Solution 2: non Windows Platform

    [BRIEF DESCRIPTION OF TELNET AND SSH;]

    [PROCEDURE TO USE NOT DISCUSSED]

    Telnet:Telnet is a network protocol used on the Internet orlocal area networks to provide a

    bidirectional interactive text-oriented communication facility using a

    virtual terminal connection. User data is interspersed in-band with Telnet control

    information in an 8-bitbyte oriented data connection over the Transmission Control

    Protocol (TCP).

    Telnet provided access to a command-line interface (usually, of an operating system) on

    a remote host. Most network equipment and operating systems with a TCP/IP

    stacksupport a Telnet service for remote configuration (including systems based on

    Windows NT). Because of security issues with Telnet, its use for this purpose has waned in

    favor of SSH.

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/wiki/Text_terminalhttp://en.wikipedia.org/wiki/In-band_signalinghttp://en.wikipedia.org/wiki/Byte_orientedhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/TCP/IP_stackhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Byte_orientedhttp://en.wikipedia.org/wiki/In-band_signalinghttp://en.wikipedia.org/wiki/Text_terminalhttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Network_protocol
  • 7/30/2019 DC Assignment RAHULcc

    17/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    17

  • 7/30/2019 DC Assignment RAHULcc

    18/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    18

    SSH:

    Secure Shell (SSH) is a cryptographic network protocol for secure data communication,

    remote shell services or command execution and other secure network services between

    two networked computers that connects, via a secure channel over an insecure

    network, a server and a client (running SSH serverand SSH client programs, respectively).

    It is best-known application of the protocol is for access to shell accounts on Unix-

    like operating systems (it can be used in a similar fashion for accounts on Windows,

    though it is not a very popular option due to Remote Desktop Services.

    It was designed as a replacement forTelnet and other insecure remote shell protocols

    such as the Berkeley rsh, rex protocols, which send information, notably passwords,

    in plaintext, rendering them susceptible to interception and disclosure using packet

    analysis. The encryption used by SSH is intended to provide confidentiality and integrity of

    data over an unsecured network, such as the Internet.

    SSH uses public-key cryptography to authenticate the remote computer and allow it to

    authenticate the user. Anyone can produce a matching pair of different keys (public

    and private). The public key is placed on all computers that must allow access to theowner of the matching private key (the owner keeps the private key secret). While

    authentication is based on the private key, the key itself is never transferred through the

    network during authentication.

    SSH only verifies whether the same person offering the public key also owns the matching

    private key. Hence, in all versions of SSH it is important to verify unknown public keys,

    i.e. associate the public keys with identities, before accepting them as valid.

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Public-key_cryptographyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Public-key_cryptography#Associating_public_keys_with_identitieshttp://en.wikipedia.org/wiki/Public-key_cryptography#Associating_public_keys_with_identitieshttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Public-key_cryptographyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/Network_protocol
  • 7/30/2019 DC Assignment RAHULcc

    19/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    19

  • 7/30/2019 DC Assignment RAHULcc

    20/20

    Author Name: Rahul Hosmani Division: A Roll No: 30 USN: 2BV10IS072

    20

    Conclusion

    One can remote login to any computer remotely, provided the computer is part of the network and is

    turned on.

    Using Windows Remote Desktop Connection is very easy as compared to SSH or telnet.

    IP address can identify a computer in the network, which is used to login to the computer remotely.

    The computer which one wants to connect must have a password [for security reasons].

    One can also use the computer name to identify the computer in the network [specifically works on

    windows remote desktop connection].

    Reference

    Website Links

    http://en.wikipedia.org/wiki/Secure_Shell

    http://en.wikipedia.org/wiki/Telnet http://support.microsoft.com/kb/284931

    http://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connection

    http://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utility

    http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7

    http://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Secure_Shellhttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Telnethttp://support.microsoft.com/kb/284931http://support.microsoft.com/kb/284931http://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Remote-Desktop-in-Windows-7http://www.wikihow.com/Use-Windows-XP's-Built-in-Remote-Desktop-Utilityhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://windows.microsoft.com/en-IN/windows-vista/Connect-to-another-computer-using-Remote-Desktop-Connectionhttp://support.microsoft.com/kb/284931http://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Secure_Shell