Telnet and remote login - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Telnet and remote login

Description:

From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web ... Attachments are the most common culprit. Some attachments contain scripts ... – PowerPoint PPT presentation

Number of Views:344
Avg rating:3.0/5.0
Slides: 28
Provided by: charlott89
Category:

less

Transcript and Presenter's Notes

Title: Telnet and remote login


1
Introduction
  • Telnet and remote login
  • File transfer
  • Computer viruses

2
Telnet and Remote Login
  • Introduction
  • Telnet
  • Remote Login

3
Telnet and Remote Login
Introduction
  • Allow to log in to another computer
  • Need second computer account
  • Second computer at different location

4
Telnet and Remote Login
5
Telnet and Remote Login
Telnet
  • telnet command
  • Telnet protocol
  • Windows environment
  • Connect
  • Remote System
  • Host Name
  • Port
  • TermType

6
Telnet and Remote Login
Telnet
  • UNIX environment
  • telnet at prompt
  • open hostname
  • Browser
  • telnet//hostname
  • Escape sequence

7
Telnet and Remote Login
Remote Login
  • rlogin command
  • Where logging in from
  • UNIX
  • .rhosts
  • rlogin hostname

8
File Transfer
  • Introduction
  • Graphical File Transfer Clients
  • Text-Based File Transfer Clients
  • File Compression
  • Anonymous File Transfer
  • Archie

9
File Transfer
Introduction
  • Move scan images to another computer
  • Work on home computer and transfer files to work
    computer
  • Exchange files with collaborator
  • Download applications
  • Develop software on computer and move to another
    computer

10
File Transfer
Introduction
  • Application for transferring files between two
    computers
  • Internet
  • Same network
  • Copy file from another computer
  • Send file to another computer

11
File Transfer
12
File Transfer
Graphical File Transfer Clients
  • Easy to use
  • Transfer setting mode
  • Text transfer mode
  • Binary transfer mode

13
File Transfer
14
File Transfer
Text-Based File Transfer Clients
  • UNIX commands
  • bye cd
  • get help
  • ls put
  • pwd

15
File Transfer
File Compression
  • Makes files smaller

Anonymous File Transfer
  • Log in with anonymous account name
  • Files accessible to public

16
File Transfer
Archie
  • Maintains databases of files from file transfer
    sites
  • Archie in search engines

17
  • To access our server you must use secure versions
    of Telnet (e.g Putty) and FTP (e.g SmartFTP).

    Descriptions of such versions are
    available at
  • http//www.cosc.brocku.ca/security/software.shtml

18
Computer Viruses
  • Definitions
  • Virus Avoidance and Precautions

19
Viruses, Trojan Horses, and Worms
  • Some software is a security risk
  • The mainstream news calls all such software
    viruses, but there are three different classes
    of such software
  • A virus is a computer program that can replicate
    itself through files to move from computer to
    computer
  • Some viruses are benign
  • Others are very destructive

20
Viruses, Trojan Horses, and Worms
  • A Trojan horse is a program that slips into a
    computer under the guise of another program
  • Someone could e-mail a game to you that contains
    a Trojan horse. If you run the game you also run
    the Trojan horse
  • The Trojan horse could record your keystrokes or
    allow someone to access your computer

21
Viruses, Trojan Horses, and Worms
  • A worm is a program that is similar to a virus,
    but spreads through a network
  • Software can be exploited by worms
  • Some worms run over several computers
  • Others communicate among themselves over the
    network
  • A worm may be malicious or may take up system
    resources, causing a slowdown in performance

22
Viruses, Trojan Horses, and Worms
  • You can take control and secure your computer
  • Use antivirus software and keep it updated
  • Antivirus software can scan files moving from the
    computer onto disks and CDs
  • Your email and downloaded files can also be
    scanned
  • Since new viruses are created every day, the data
    files needed to detect these viruses needs to be
    kept up-to-date

23
Viruses, Trojan Horses, and Worms
  • Keep floppy disks out of your floppy drive unless
    you are actively working with the files on the
    floppy disk
  • Some viruses can hide on the boot sector on a
    floppy
  • These are triggered when the computer starts up
    and accesses the floppy disk
  • If you need to work without a virus scanner
    running in the background, you should manually
    scan each file before opening or executing it

24
Viruses, Trojan Horses, and Worms
  • Install a firewall on your home computer
    (especially if you use a broadband connection)
  • Do not download files offered to you in chat
    rooms or personal Web pages
  • For maximum safety, encrypt all files that
    contain sensitive information or store them
    offline on removable media
  • Do not leave your computer connected to the
    Internet any longer than necessary

25
E-Mail Viruses
  • E-mail is the number one source of computer
    viruses
  • Attachments are the most common culprit
  • Some attachments contain scripts
  • A script is a small program written in a
    scripting language (e.g. Visual Basic)
  • You can take precautions
  • Configure your mailer to not open attachments
    automatically
  • Save attachments and scan them first

26
E-Mail Viruses
  • Microsoft Word documents are a popular source of
    viruses
  • Someone can spread a virus unknowingly
  • Precautions include
  • Keeping your antivirus software up-to-date
  • Saving an attachment and make sure that it is
    scanned before you open it
  • Not opening a document that contains a macro

27
E-Mail Viruses
  • Mailers that render messages into Web-like
    displays are susceptible to script attacks
  • Some messages contain scripts
  • If the script is automatically executed, it can
    cause harm
  • Some threats can contain a blend of different
    types of attacks
  • Nimda
  • Love Letter
Write a Comment
User Comments (0)
About PowerShow.com