Chapter 19

Sharing Compute Power

In This Chapter

Protocols in this chapter: telnet, rlogin, rsh, ssh, vnc

Using another computer’s power

Working via remote access

Clustering and volunteering

Is your computer working too hard? Is it hungry for power? (Whose computer isn’t at some time or other?) Well, don’t worry. Thanks to TCP/IP protocols, applications, and services, you can connect to other computers and use their power. Some of those capabilities are evident in Chapter 18 — file and print sharing — and so are their security issues. In this chapter, we show you how to use remote access, clusters, and more. But (no surprise here) you still have security issues to watch out for.

Sharing Network Resources

The computers on your network are often shared resources. A compute server is a computer that’s been set up specifically to share its CPU power. To distribute that power in an organized way, many businesses set up compute servers for you to use. A compute server is a powerful computer that’s configured especially for use by many users.

security.eps In this chapter, you discover how to take advantage of shared resources, but remember that computer etiquette requires — and network security demands — that you always have permission to do so. If you go after resources from networks and computers without permission, don’t be surprised if you find yourself in trouble with law enforcement agencies. ...

Get TCP/IP For Dummies, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.