Remote Access Technologies | CompTIA A+ 220-1002 | 4.9

In this video you will learn about remote access technologies such as: RDP, Telnet, SSH, & third-party tools.

Remote Access

A remote access service is any combination of hardware & software to enable the remote access tools or information that typically reside on a network of IT devices. A remote access service connects a client to a host computer, known as a remote access server. The most common approach to this service is remote control of a computer by using another device which needs internet or any other network connection.

RDP

Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software software for this purpose, while the other computer must run RDP server software. The protocol allows for encrypted access with screen capture, mouse, and keyboard functions. Common tasks with the remote connections are support and management of remote computers. RDP is a proprietary Microsoft protocol that is preinstalled on Windows, but macOS and Linux versions of both server and client are available as well. To enable Remote Desktop in Windows 10, go to Settings > System > Remote Desktop.

Telnet

Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. Telnet enables a user to make a text-based connection to a remote computer or device and use it as if he or she were a user sitting right in front of it. Windows and Linux contain a command line Telnet program.  To open a connection to a remote computer, open a command prompt (Windows) or Terminal session (Linux) and type telnet and press the Enter key to open the Telnet command prompt. Another option is to download the Telnet application and open it to configure settings. macOS includes a menu-driven Telnet program available from Terminal. Be mindful that Telnet does not encrypt content, so information transmitted via Telnet could possibly be discovered by hackers. Telnet uses TCP port 23.

SSH

The Secure Shell protocol is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network services can be secured with SSH. This protocol offers a more secure option than FTP and Telnet. SSH uses TCP port 22.

Third-Party Tools: File Sharing

File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia, documents or electronic books. File sharing may be achieved in a number of ways. Common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking. Several protocols use SSH as a way of making a secure connection.  One of these is Secure File Transfer Protocol (SFTP). SFTP provides files access over a reliable data stream, generated and protected by SSH. Cloud file management is now doing much of the work FTP has performed in the past.  Examples of cloud storage providers are Dropbox, Google Drive, Microsoft OneDrive, and Amazon Drive.