An astonishing community of cybersecurity enthusiasts who dream, live and breathe security.
Remote Desktop Protocols
-
Accessing machines like servers or desktop was made possible a long time ago and we are able to benefit because of it during this pandemic by remotely accessing the system at our convenience. The protocol that you use depends on the system you’re trying to access. Mainly there are two types of protocols that we use, it is as follows:
· Secure Shell (SSH) also known as Secure Socket Shell, is a protocol which allows you to connect securely to a remote computer or a server by using a text-based interface it is for Linux based machines.
· Remote Desktop Protocol (RDP) is a protocol developed by Microsoft. It is used to control and manage machines with a Windows operating system remotely. Unlike Secure Shell, connections established using an RDP client provide a user with a graphical interface through which they can gain access to a remote computer and control it in the same manner as their local computer.
The two protocols use the client and server applications to establish a remote connection. These tools allow you to gain access and remotely manage other computers, transfer files, and do virtually anything you can do while physically sitting in front of the machine.
-
I primarily use SSH for remote shell login and file copying, because security threats can be greatly diminished. This is due to the SSH client and server using digital signatures to verify their identity. Additionally, all communication between the client and server systems is encrypted. Attempts to spoof the identity of either side of a communication does not work, since each packet is encrypted using a key known only by the local and remote systems. Using SSH has added security measures to prevent potential hackers from snooping into the system.
-
Long back I have used Telnet, a TCP/IP protocol for accessing remote computers. The Telnet session between the client and the server is not encrypted. Anyone with access to the TCP/IP packet flow between the communicating hosts can reconstruct the data that flows between the endpoints and read the messaging, including the usernames and passwords that are used to log in to the remote machine. Hence I started using SSH whose sessions are encrypted and secure.
-
I own a Raspberry Pi and uses it as a media server. There is no additional monitor connected to Raspberry Pi as it comes with an option to enable SSH on Raspbian OS. I use the SSH to connect to my Raspberry and setting it up to control my media server.
-
I use Remote Desktop Protocol (RDP) as I use Windows OS and the system I remote login to are Windows Operated System. It is easier to use RDP which come bundled with Microsoft’s Windows OS and is free to use. Due to convenience of it being free and comes bundled in the OS I use it over other remote desktop software.
-
Lately I has started use the remote desktop features to troubleshoot PC as onsite visits are difficult in this pandemic. Since I don’t want to spend additional fee for Remote Desktop Software I use free versions that were available and decided that Microsoft’s Remote Desktop Protocol (RDP) suits me the best as it is of graphical interface and majority of users are on Windows operated system.