O'Reilly logo

TCP/IP For Dummies, 6th Edition by Candace Leiden, Marshall Wilensky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19

Sharing Compute Power

In This Chapter

Protocols in this chapter: telnet, rlogin, rsh, ssh, vnc

Using another computer’s power

Working via remote access

Clustering and volunteering

Is your computer working too hard? Is it hungry for power? (Whose computer isn’t at some time or other?) Well, don’t worry. Thanks to TCP/IP protocols, applications, and services, you can connect to other computers and use their power. Some of those capabilities are evident in Chapter 18 — file and print sharing — and so are their security issues. In this chapter, we show you how to use remote access, clusters, and more. But (no surprise here) you still have security issues to watch out for.

Sharing Network Resources

The computers on your network are often shared resources. A compute server is a computer that’s been set up specifically to share its CPU power. To distribute that power in an organized way, many businesses set up compute servers for you to use. A compute server is a powerful computer that’s configured especially for use by many users.

security.eps In this chapter, you discover how to take advantage of shared resources, but remember that computer etiquette requires — and network security demands — that you always have permission to do so. If you go after resources from networks and computers without permission, don’t be surprised if you find yourself in trouble with law enforcement agencies. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required