Introduction
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?Learn
Do you really know about Telnet?
Created:Article attributes: originalArticle submission: iqst (papabang_at_qingdaonews.com)
Author: iqstFrom: http://ccbirds.yeah.netRetain above info to transport
Directory:
Summary2. Remote Logon3. Telnet
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?
2. Remote
Telnet command detailsTelnet [-8 acdEfFKLrx] [-B ] [-e ] [-k ] [-l ] [-n ] [-S ] [-X ] [host name or IP address ]
Note: Execute the telnet command to start operations at the terminal stage and log on to the remote host.
Parameters:-8: 8 characters
We all know that Telnet is a protocol for remote logon and also an important protocol in TCP/IP. When using Telnet, we often use Telnet commands. Let's summarize this part. First, let's take a look at the specific process of using Telnet.
Use Telnet
The Telnet command is an exclusive command for the Telnet service to perform some special remote logon operations. Let's take a look at this part.
Use Telnet
Application to: Windows Server 2008, Windows Vista
Using Telnet involves three basic steps:
General considerations
A telnet connection is used to transmit data through the transmission control protocol. The telnet protocol is based on the following three ideas: first, the concept of the network virtual terminal, second, the method of
TelnetWhat is Telnet protocol?Telnet Server Software is our most commonly used Telnet Server software and is a typical client/server model service that uses the Telnet protocol to work. So, what is the Telnet protocol? What features does it
Many users are not familiar with AIX telnet commands. So here we will summarize and summarize these commands. I hope you can refer to this article to obtain the required content. Use the EMULATE environment variable or the-e flag to override
Article Title: Configure and use the Telnet and ssh services in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.