Open Telnet method under Win7

Source: Internet
Author: User
Tags telnet program

Telnet protocol is one of the TCP/IP protocol family, it is the standard protocol and main way of Internet remote Login service, it is often used for remote control of Web server, which can be used by users to perform work on remote host in local host. The user first executes the Telnet program on the computer, connects to the destination server, and then enters the account number and password to authenticate the identity. The user can enter a command on the local host and let the connected remote host execute as if it were entered directly on the other's console. Traditional Telnet sessions are transmitted without encryption, sensitive data such as account numbers and passwords are easily tapped, so many servers block Telnet service and switch to more secure ssh.

When testing the network, Telnet and Ping are the two commands we use most often. But Ping is just a communication protocol, part of the IP protocol, part of the TCP/IP protocol, and Ping is an executable command with Windows system. While the Telnet service is also a service of the client/server model, its greater significance is the implementation of Telnet protocol based remote logins.

Below we distinguish between ping and telnet by comparing the parameters that ping and telnet each support.

Ping Support parameters:

1. usage:ping [-t] [a] [-N Count] [-l-size] [-f] [-I TTL] [-v TOS]

2. [R Count] [-s count] [[-j host-list] | [k Host-list]]

3. [-w timeout] [-r] [-S srcaddr] [-4] [-6] Target_name

4.

5. Options:

6-T Ping the specified host until stopped.

7. To statistics and Continue-type control-break;

8. To Stop-type control-c.

9-A Resolve addresses to hostnames.

-N count number of ECHO requests to send.

-L size Send buffer size.

The-F Set Don ' t Fragment flag in Packet (ipv4-only).

I.-I TTL time to Live.

-V TOS Type of Service (ipv4-only).

-R count Record route for Count hops (ipv4-only).

-S count Timestamp for Count hops (ipv4-only).

-j host-list Loose Source route along Host-list (ipv4-only).

Host-list-K Strict Source route along Host-list (ipv4-only).

The-w timeout timeout in milliseconds to wait for each reply.

-R Trace Round-trip path (ipv6-only).

-S srcaddr Source address to use (ipv6-only).

4 Force using IPV4.

6 Force using IPV6.

Telnet support parameters:

1. telnet [-a][-e escape char][-f log file][-l user][-t term][host [Port]]

2. A attempts to log on automatically. In addition to using the currently logged on username, the-l option is the same.

3.-E skips characters into the Telnet client prompt.

4.-F file name for client login

5.-l Specifies the name of the user who is logged on on the remote system.

6. Require the remote system to support the TELNET ENVIRON option.

7.-t specifies the terminal type.

8. Supported terminal types are only: VT100, VT52, ANSI and VTNT.

9. host specifies the hostname or IP address of the remote computer to which you want to connect.

PORT specifies the number of ports or service names.

This shows that ping is usually used to check whether the network is unobstructed or the speed of network connection is ordered. Telnet is used to detect whether a specified IP is open to a specified port.

As mentioned above, in the traditional Telnet painting, many servers have blocked Telnet service, such as the Win7 system and the WIN8 system are prohibited Telnet service, need to manually add. The specific methods are:

1. Perform "Start"--"control Panel" operation

2. Perform "Programs"-"Turn Windows features on or off"

3. Select the Telnet client and Telnet server operation

4. Open Telnet Service at command prompt

This way, the Telnet service is home on your computer. Telnet application, although convenient for us to remote login, but also to provide hackers with another means of intrusion and backdoor, so we must use caution.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.