Upload
guest095022
View
2.964
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
REMOTE LOGINREMOTE LOGIN
TEAM MEMBERSTEAM MEMBERS
AMULYA GURURAJ AMULYA GURURAJ 1MS07IS0061MS07IS006
BHARGAVI C.S BHARGAVI C.S 1MS07IS0131MS07IS013
MEGHANA N. MEGHANA N. 1MS07IS0501MS07IS050
TANUSHREE A.G TANUSHREE A.G 1MS07IS1391MS07IS139
CONTENTSCONTENTS1.1. INTRODUCTIONINTRODUCTION2.2. SSH (SECURE SHELL)SSH (SECURE SHELL)3.3. DIFFERENCES BETWEEN THE DIFFERENCES BETWEEN THE
VARIOUS TOOLSVARIOUS TOOLS4.4. SONY ERICSON CYBERSHOT SONY ERICSON CYBERSHOT
PHONE(INBUILT FEATURE)PHONE(INBUILT FEATURE)5.5. REMOTE LOGIN TO DESKTOP REMOTE LOGIN TO DESKTOP
USING BLACKBERRY USING BLACKBERRY PHONE(EXTERNAL SOFTWARE)PHONE(EXTERNAL SOFTWARE)
INTRODUCTION INTRODUCTION
What is remote login?What is remote login?
Remote login is the capability to Remote login is the capability to access the files , documents and access the files , documents and related software of one computer related software of one computer from another along the network.from another along the network.
Working of remote login: Working of remote login:
*Virtual Private Network*Virtual Private Network
*Desktop Sharing Software*Desktop Sharing Software
Advantages:Advantages:
*Efficiency*Efficiency
*Cost*Cost
*Fast*Fast Disadvantages:Disadvantages:
*Lack of security *Lack of security
REMOTE LOGIN TO DESKTOP REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONEUSING BLACKBERRY PHONE
INSTRUCTIONSINSTRUCTIONS
RDM+(REMOTE DESKTOP FOR RDM+(REMOTE DESKTOP FOR MOBILES)MOBILES)
This is a communication tool that gives This is a communication tool that gives you the ability to connect to remote you the ability to connect to remote computer from your mobile device.computer from your mobile device.
RDM+ software consists of two RDM+ software consists of two components:components:
the desktop part (RDM+ desktop) should the desktop part (RDM+ desktop) should be installed on the remote computerbe installed on the remote computer
the client module (RDM+client) should be the client module (RDM+client) should be installed on your mobile devices.installed on your mobile devices.
3. RDM+ DESKTOP SETTINGS3. RDM+ DESKTOP SETTINGS
4. RDM+ DESKTOP AND STATUS CONNECTIONS4. RDM+ DESKTOP AND STATUS CONNECTIONS
RDM+ CLIENT RDM+ CLIENT
THE RDM+ CLIENT CAN BE DOWNLOADED BY THE RDM+ CLIENT CAN BE DOWNLOADED BY GOING TO THE WEBSITE GOING TO THE WEBSITE http://www.rdmplus.com/rdm/bb/download.htmlhttp://www.rdmplus.com/rdm/bb/download.htmland download the software on the mobile phone and download the software on the mobile phone enter the unique computer number and access the enter the unique computer number and access the desktop remotely from the blackberry phone.desktop remotely from the blackberry phone.
SSH- Secure ShellSSH- Secure Shell Tools used for Remote Login:Tools used for Remote Login:1.1. RloginRlogin: : rloginrlogin is a is a software utilitysoftware utility for for
Unix-likeUnix-like computer computer operating systemsoperating systems that that allows users to log in on another allows users to log in on another hosthost via a via a networknetwork..
2.2. TelnetTelnet:: Telnet allows remote login and can be Telnet allows remote login and can be used to access and run interactive applications on used to access and run interactive applications on remote systems. You need to know the IP Address remote systems. You need to know the IP Address or the host name of the remote system and also or the host name of the remote system and also have an account in order to access the remote have an account in order to access the remote system through telnet.system through telnet.
3.3. SSHSSH – Secure shell. – Secure shell.
• Remote Login using Remote Login using SSHSSH
What is SSH?What is SSH? SSHSSH is a is a network protocolnetwork protocol that allows data to be that allows data to be
exchanged using a exchanged using a secure channelsecure channel between two between two networked devices.networked devices.
Uses of SSH.Uses of SSH.1.1. Access to the UNIX-like environment from a Windows Access to the UNIX-like environment from a Windows
machine.machine.2.2. Work from home with access to your filestore.Work from home with access to your filestore.3.3. Copying files between your filestore and another Copying files between your filestore and another
machine. machine. 4.4. Read restricted web pages.Read restricted web pages.5.5. For executing command on a remote host.For executing command on a remote host.
• How to use SSH?How to use SSH?ssh ssh useruser@@hosthost useruser: Your teaching domain Unix login : Your teaching domain Unix login name. name. hosthost: The machine to login to.: The machine to login to. Are you sure you want to continue Are you sure you want to continue connecting (yes/no)?connecting (yes/no)? This is a check to make sure that another This is a check to make sure that another machine is not masquerading as the remote machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'.machine. In most cases it is safe to say 'yes'. Enter your password at the prompt and you Enter your password at the prompt and you will be presented with your shell command will be presented with your shell command line:line: username@hostname password:username@hostname password: Last login: Sun Sep 14 14:11:57 2003 Last login: Sun Sep 14 14:11:57 2003 fromfrom
• Using Secure Shell for Using Secure Shell for Windows Windows
Using Secure Shell for Using Secure Shell for WindowsWindows
Select a host name (or IP address) to connect to. Select a host name (or IP address) to connect to. User name is ‘whom’ you are going to login as. Root, or User name is ‘whom’ you are going to login as. Root, or
another user can be used. another user can be used. Port number is 22 by default .You will need to use port Port number is 22 by default .You will need to use port
22 unless you alter is on the target device.22 unless you alter is on the target device. Authentication methods are password, SecurID or others. Authentication methods are password, SecurID or others.
• How do SSH, Telnet and Rlogin How do SSH, Telnet and Rlogin differ?differ?TelnetTelnet RloginRlogin SSHSSH
Telnet protocol offer minimal Telnet protocol offer minimal securitysecurity
Rlogin protocol offer minimal Rlogin protocol offer minimal securitysecurity
SSH is a recently designed, SSH is a recently designed,
high-security protocolhigh-security protocol Telnet allows you to pass some Telnet allows you to pass some settings on to the server, such settings on to the server, such as environment variables.as environment variables.
Rlogin do not support thisRlogin do not support this SSH does not support thisSSH does not support this
Telnet requires entering the Telnet requires entering the
passwordpassword Rlogin allow you to log in to Rlogin allow you to log in to the server without having to the server without having to type a password (nottype a password (not mandatory) mandatory)
SSH allow you to log in to the SSH allow you to log in to the server without having to type a server without having to type a
passwordpassword (not(not mandatory). mandatory).
This privilege is not available when This privilege is not available when
telnet is usedtelnet is used This privilege is not available This privilege is not available when rlogin command is usedwhen rlogin command is used
SSH allows you to connect to SSH allows you to connect to the server and automatically the server and automatically send a command, so that the send a command, so that the server will run that command server will run that command and then disconnect. So you and then disconnect. So you can use it in automated can use it in automated processing.processing.
SONY ERICSSON SONY ERICSSON C510C510
SOFTWARESOFTWARE
Java : Midp 2.0Java : Midp 2.0 OS : JavaOS : Java Browser : WAP 2.0/HTML(NET Browser : WAP 2.0/HTML(NET
front),RSSfront),RSS
CONNECTIVITYCONNECTIVITY
Bluetooth : File transferBluetooth : File transfer USB : Yes,v2.0USB : Yes,v2.0 PC sync : Pc suite managedPC sync : Pc suite managed Remote sync : YesRemote sync : Yes
DATADATA
Internet : 3GInternet : 3G Wi-fi : noWi-fi : no Streaming : Browser CompatibleStreaming : Browser Compatible Security : InbuiltSecurity : Inbuilt
TechnologyTechnology
3G : HSDPA3G : HSDPA