SlideShare a Scribd company logo
1 of 27
REMOTE  LOGIN
TEAM MEMBERS ,[object Object],[object Object],[object Object],[object Object]
CONTENTS ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION  ,[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REMOTE LOGIN TO DESKTOP USING BLACKBERRY PHONE INSTRUCTIONS
RDM+(REMOTE DESKTOP FOR MOBILES) ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
3. RDM+ DESKTOP SETTINGS
4. RDM+ DESKTOP AND STATUS CONNECTIONS
RDM+ CLIENT  THE RDM+ CLIENT CAN BE DOWNLOADED BY GOING TO THE WEBSITE  http://www.rdmplus.com/rdm/bb/download.html and download the software on the mobile phone enter the unique computer number and access the desktop remotely from the blackberry phone.
SSH- Secure Shell ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],ssh  user @ host user : Your teaching domain Unix login name.  host : The machine to login to. Are you sure you want to continue connecting (yes/no)?   This is a check to make sure that another machine is not masquerading as the remote machine. In most cases it is safe to say 'yes'. Enter your password at the prompt and you will be presented with your shell command line: username@hostname password: Last login: Sun Sep 14 14:11:57 2003 from
[object Object]
Using Secure Shell for Windows ,[object Object],[object Object],[object Object],[object Object]
[object Object],SSH allows you to connect to the server and automatically send a command, so that the server will run that command and then disconnect. So you can use it in automated processing.   This privilege is not available when rlogin command is used   This privilege is not available when telnet is used   SSH allow you to log in to the server without having to type a password   (not  mandatory). Rlogin allow you to log in to the server without having to type a password (not  mandatory) Telnet requires entering the password   SSH does not support this   Rlogin do not support this   Telnet allows you to pass some settings on to the server, such as environment variables. SSH is a recently designed, high-security protocol   Rlogin protocol offer minimal security Telnet protocol offer minimal security SSH   Rlogin   Telnet
SONY ERICSSON C510
SOFTWARE ,[object Object],[object Object],[object Object]
CONNECTIVITY ,[object Object],[object Object],[object Object],[object Object]
DATA ,[object Object],[object Object],[object Object],[object Object]
Technology ,[object Object]

More Related Content

What's hot

Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
WILLA REYES
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
Sourav Roy
 
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
webhostingguy
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
leminhvuong
 

What's hot (18)

Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Telnet
TelnetTelnet
Telnet
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
telnet
telnettelnet
telnet
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
View PowerPoint Presentation on Pragma Systems - Stay-Linked ...
 
Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
 
Project Pt1
Project Pt1Project Pt1
Project Pt1
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Telnet
TelnetTelnet
Telnet
 

Viewers also liked (6)

Chap24
Chap24Chap24
Chap24
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 

Similar to Remote Login

Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
Sourav Roy
 
Ssh
SshSsh
Ssh
gh02
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...
andega
 

Similar to Remote Login (20)

Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
Ssh
SshSsh
Ssh
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Secure shell
Secure shellSecure shell
Secure shell
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Ssh
SshSsh
Ssh
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
 
Discuss what is SSH and the advantages and disadvantages of using it.pdf
Discuss what is SSH and the advantages and disadvantages of using it.pdfDiscuss what is SSH and the advantages and disadvantages of using it.pdf
Discuss what is SSH and the advantages and disadvantages of using it.pdf
 
Administering Remote System in Linux
Administering Remote System in Linux Administering Remote System in Linux
Administering Remote System in Linux
 
WHONIX OS
WHONIX OSWHONIX OS
WHONIX OS
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Cn file
Cn fileCn file
Cn file
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Creating SSH Key.pptx
Creating SSH Key.pptxCreating SSH Key.pptx
Creating SSH Key.pptx
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Remote Login