1 00:00:00,450 --> 00:00:07,500 Great, now that you have done that, pretty good privacy, encryption, decryption and security part, 2 00:00:07,980 --> 00:00:10,630 there is no forced focus on remote access. 3 00:00:11,460 --> 00:00:18,330 Think of remote access as a telecommunicating tool because it is used by companies to allow remote employees 4 00:00:18,510 --> 00:00:23,880 to connect to the internal network and access resources that are in the office. 5 00:00:24,450 --> 00:00:31,020 Well, despite the period of covid-19 has proved to be the most, you know, turning point in the history 6 00:00:31,020 --> 00:00:38,190 of its infrastructure because almost everyone has started using Ortez, that is remote access services. 7 00:00:38,820 --> 00:00:42,630 And that is why understanding Arias is very important. 8 00:00:43,350 --> 00:00:51,210 Now, remote access is a great for users who work from home or travel frequently, but clearly to a 9 00:00:51,210 --> 00:00:52,260 stalking hacker. 10 00:00:52,740 --> 00:00:58,500 Using an unsecured remote access connection is like stealing candy from a baby. 11 00:01:01,360 --> 00:01:09,460 Using remote access requires a server configured to accept incoming calls and also requires remote access 12 00:01:09,460 --> 00:01:11,500 software to be installed on the client. 13 00:01:12,220 --> 00:01:16,500 The first, that remote access service you're going to see is ah is. 14 00:01:16,960 --> 00:01:18,160 So basically, R. 15 00:01:18,160 --> 00:01:26,470 S is not a product, but refers to the combination of hardware and software required to make remote 16 00:01:26,470 --> 00:01:27,610 access connection. 17 00:01:28,330 --> 00:01:35,470 The term was popularized by Microsoft when the company began referring to its Windows and demoed access 18 00:01:35,470 --> 00:01:44,890 tools by Disney users with DYLON via modem, be authenticated by the server and then be asked for the 19 00:01:44,890 --> 00:01:48,810 username and password just as it they on the local network. 20 00:01:49,480 --> 00:01:56,500 Once logged in, users had access to data on the internal network, just as if they were logged in locally. 21 00:01:57,960 --> 00:02:05,010 Art is itself was not very secure, but there are options with artists to include secure protocol tool 22 00:02:05,010 --> 00:02:13,880 for tunnelling, such as BTP, that is point-to-point journalling protocol and a trap that is Microsoft 23 00:02:13,890 --> 00:02:16,970 Challenge, handshake, authentication protocol. 24 00:02:18,420 --> 00:02:26,250 Remote Access Service is versatile because it supports several other network protocols in addition to 25 00:02:26,550 --> 00:02:28,360 TCP IP as well. 26 00:02:28,860 --> 00:02:34,410 That is why artists has become very prominent in this 20-20 period. 27 00:02:34,830 --> 00:02:41,490 And I think you should know about remote desktop connection because in today's world you are required 28 00:02:41,490 --> 00:02:45,690 to connect to Clines services and machines through RTP only. 29 00:02:47,830 --> 00:02:52,390 So this is an example of remote access service if a client is here. 30 00:02:52,450 --> 00:02:56,670 Remote access client client is here and this is the Internet. 31 00:02:57,160 --> 00:03:01,630 This is a remote access server which checks for authentication and everything. 32 00:03:02,020 --> 00:03:06,370 And then this client can access the remote resources. 33 00:03:07,480 --> 00:03:10,660 What is our remote next up, protocol? 34 00:03:11,660 --> 00:03:20,240 Now, remote textile protocol allows users to connect running Microsoft remote desktop services, but 35 00:03:20,240 --> 00:03:26,660 remote computer must have the right kind of client software installed for this to happen. 36 00:03:27,670 --> 00:03:35,350 Most Windows based operating systems, including RTP, clanged and so do most other major operating 37 00:03:35,350 --> 00:03:44,800 systems like Linux, Solaris, Mac, OS, X and others, Microsoft's RTP client software is either as 38 00:03:44,800 --> 00:03:45,310 remotely. 39 00:03:45,340 --> 00:03:52,070 Next up, Connection or DC or the Terminal Services Client DC. 40 00:03:53,650 --> 00:04:01,060 Microsoft began calling all the dominant services products remoted next up with Windows Server 28 and 41 00:04:01,090 --> 00:04:10,240 our DP uses TCP Port three three eight nine, which means RTP is using transport control, transmission 42 00:04:10,240 --> 00:04:16,930 control protocol and the transport layer, which is a secure protocol, a reliable protocol and connection 43 00:04:16,930 --> 00:04:21,790 oriented protocol at board number three three eight nine. 44 00:04:23,980 --> 00:04:31,150 Now, after establishing a connection, the user sees a terminal window that's basically a pre configured 45 00:04:31,150 --> 00:04:36,310 window that looks like a Windows desktop after connecting through our DP. 46 00:04:37,280 --> 00:04:45,050 The most current version of RTP is Version 2.0, then logged in using RTP lines, are able to access 47 00:04:45,050 --> 00:04:51,140 local files and printers from the remote desktop just as if they were logged into the network. 48 00:04:51,950 --> 00:04:58,070 RTP offers 128 bit encryption using the AC for encryption algorithm. 49 00:05:00,500 --> 00:05:06,820 Now, let us try to have a look at the other remote access protocols in the next lecture.