SlideShare a Scribd company logo
1 of 16
Remote  Access For Desktop With Encryption System (RADES) By, AbhishekJuyal – IT ‘C’ – 03 KunalTyagi       – IT ‘C’ – 36 M.Maheshwar  – IT ‘C’ – 37  Mohit Gupta    – IT ‘C’ – 44  NishantRawat – IT ‘C’ – 50  @ RADES
Abstract Allows a user to access a Remote Desktop from a remote location and get the experience of the original platform the home computer and all of its applications without actually having physical access to the same. It gives us the File Transfer facility with our remote desktop and an optional secured file transfer facility using the DES Symmetric Key Encryption system. It gives the user full administrative privileges over the remote computer.  @ RADES
My Documents My Network Places My Computer Recycle Bin Internet Explorer Start 12:00 PM INTRODUCTION Remote Access @ RADES
Definition Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it’s supposed to do. Remote desktop software is available for all computer platforms. (Trouble Shooting) Master/Client – Slave/Server :-     Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet. @ RADES
Security & File Transfer Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy. Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software @ RADES
Types of Remote Desktop Connections 				LAN Based:-     Internet Based:-  @ RADES
Motivation Physical Absence of user from home:- Platform Independency:- 			Inter-Platform File-Transfer 			Open Source Software High File Transfer Rate:- 			Comparable with Leading File transfer software like IP Messenger. @ RADES
MODULES INVOLVED Authentication  Control  Server Image Capture Server and Image Updater Event handler Server File Transfer Mechanism Encryption / Decryption
Getting Started !!!!!! Splash Screen Mode Selection Screen @ RADES
SERVER SIDE Authentication Control Server CLIENT SIDE @ RADES
Image Capture Server and Image Updater @ RADES
Event handler Server HANDLER TARGET CLASS TEST CLASS @ RADES
SERVER SIDE FILE TRANSFER CLIENT SIDE @ RADES
ENCRYTION / DECRYPTION Implementation Com.sun.crypto.provider.DESCipher DESCipher Abstract Class Cipher Algorithm Parameter Spec KeyGenerator
ENCRYTION / DECRYPTION JAVA CRYPTOGRAPHIC EXTENSION LIBRARY 128 Bit Data Encryption Standard @ RADES
Thank You !!!!!!!Any Questions ???? @ RADES

More Related Content

What's hot

Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computingpallavikhandekar212
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1Anne Starr
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Software Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and ControlSoftware Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and ControlBastian Fischer
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LANABHIJEET SINGH
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
THE 4M OF IT INFRASTRUCTURE
THE 4M OF IT INFRASTRUCTURETHE 4M OF IT INFRASTRUCTURE
THE 4M OF IT INFRASTRUCTUREKartheek Kein
 
legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116Melissa Ek
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 

What's hot (20)

Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
LAN Security
LAN Security LAN Security
LAN Security
 
Firewall
FirewallFirewall
Firewall
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Software Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and ControlSoftware Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and Control
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
THE 4M OF IT INFRASTRUCTURE
THE 4M OF IT INFRASTRUCTURETHE 4M OF IT INFRASTRUCTURE
THE 4M OF IT INFRASTRUCTURE
 
legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
 
Chapter 01 networking
Chapter 01 networkingChapter 01 networking
Chapter 01 networking
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 

Similar to Remote Access For Desktop With Encryption System (

Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptxMugabo4
 
Remote server
Remote serverRemote server
Remote serverRijosh vk
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkDefCamp
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & groupSourav Roy
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...elisasson
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patelShubham Patel
 

Similar to Remote Access For Desktop With Encryption System ( (20)

Amdlrmo needs
Amdlrmo needsAmdlrmo needs
Amdlrmo needs
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Remote server
Remote serverRemote server
Remote server
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
 
Welcome
WelcomeWelcome
Welcome
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Fg b
Fg bFg b
Fg b
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patel
 
system Security
system Security system Security
system Security
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Remote Access For Desktop With Encryption System (

  • 1. Remote Access For Desktop With Encryption System (RADES) By, AbhishekJuyal – IT ‘C’ – 03 KunalTyagi – IT ‘C’ – 36 M.Maheshwar – IT ‘C’ – 37 Mohit Gupta – IT ‘C’ – 44 NishantRawat – IT ‘C’ – 50 @ RADES
  • 2. Abstract Allows a user to access a Remote Desktop from a remote location and get the experience of the original platform the home computer and all of its applications without actually having physical access to the same. It gives us the File Transfer facility with our remote desktop and an optional secured file transfer facility using the DES Symmetric Key Encryption system. It gives the user full administrative privileges over the remote computer. @ RADES
  • 3. My Documents My Network Places My Computer Recycle Bin Internet Explorer Start 12:00 PM INTRODUCTION Remote Access @ RADES
  • 4. Definition Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it’s supposed to do. Remote desktop software is available for all computer platforms. (Trouble Shooting) Master/Client – Slave/Server :- Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet. @ RADES
  • 5. Security & File Transfer Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy. Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software @ RADES
  • 6. Types of Remote Desktop Connections LAN Based:- Internet Based:- @ RADES
  • 7. Motivation Physical Absence of user from home:- Platform Independency:- Inter-Platform File-Transfer Open Source Software High File Transfer Rate:- Comparable with Leading File transfer software like IP Messenger. @ RADES
  • 8. MODULES INVOLVED Authentication Control Server Image Capture Server and Image Updater Event handler Server File Transfer Mechanism Encryption / Decryption
  • 9. Getting Started !!!!!! Splash Screen Mode Selection Screen @ RADES
  • 10. SERVER SIDE Authentication Control Server CLIENT SIDE @ RADES
  • 11. Image Capture Server and Image Updater @ RADES
  • 12. Event handler Server HANDLER TARGET CLASS TEST CLASS @ RADES
  • 13. SERVER SIDE FILE TRANSFER CLIENT SIDE @ RADES
  • 14. ENCRYTION / DECRYPTION Implementation Com.sun.crypto.provider.DESCipher DESCipher Abstract Class Cipher Algorithm Parameter Spec KeyGenerator
  • 15. ENCRYTION / DECRYPTION JAVA CRYPTOGRAPHIC EXTENSION LIBRARY 128 Bit Data Encryption Standard @ RADES
  • 16. Thank You !!!!!!!Any Questions ???? @ RADES