Introduction to Multilingual Retrieval Augmented Generation (RAG)
Remote Access For Desktop With Encryption System (
1. Remote Access For Desktop With Encryption System (RADES) By, AbhishekJuyal – IT ‘C’ – 03 KunalTyagi – IT ‘C’ – 36 M.Maheshwar – IT ‘C’ – 37 Mohit Gupta – IT ‘C’ – 44 NishantRawat – IT ‘C’ – 50 @ RADES
2. Abstract Allows a user to access a Remote Desktop from a remote location and get the experience of the original platform the home computer and all of its applications without actually having physical access to the same. It gives us the File Transfer facility with our remote desktop and an optional secured file transfer facility using the DES Symmetric Key Encryption system. It gives the user full administrative privileges over the remote computer. @ RADES
3. My Documents My Network Places My Computer Recycle Bin Internet Explorer Start 12:00 PM INTRODUCTION Remote Access @ RADES
4. Definition Remote desktop is a software application that turns one computer into the boss of another or a series of others. Remote desktop is sometimes found as part of a suite of other administrative applications; other times, remote desktop is its own entity, doing nothing but what it’s supposed to do. Remote desktop software is available for all computer platforms. (Trouble Shooting) Master/Client – Slave/Server :- Remote desktop requires that the “master” and “slave” computers be connected to the same network. This remote desktop network can be wired or wireless. Wired networks can use direct connections or connections through routers. Wireless networks can be formed using routers or the Internet. @ RADES
5. Security & File Transfer Advanced security protocols are standard practice inclusions in remote desktop software, especially when the network is a wireless and/or Internet one. The latest versions of remote desktop software have 128-bit encryption protocols. Older versions might have protection of a lesser nature. If you are running remote desktop software, even if your connection is direct wired, you need to run advanced security protocols as well. Not to do so is to invite piracy. Once the administrator has entered the correct password, the remote desktop software enables that administrator to access the target computer. Then, uploads, downloads, file transfers, and software maintenance can take place. Indeed, software maintenance is one of the most common uses of remote desktop software @ RADES
6. Types of Remote Desktop Connections LAN Based:- Internet Based:- @ RADES
7. Motivation Physical Absence of user from home:- Platform Independency:- Inter-Platform File-Transfer Open Source Software High File Transfer Rate:- Comparable with Leading File transfer software like IP Messenger. @ RADES
8. MODULES INVOLVED Authentication Control Server Image Capture Server and Image Updater Event handler Server File Transfer Mechanism Encryption / Decryption