Telnet command detailsTelnet [-8 acdEfFKLrx] [-B ] [-e ] [-k ] [-l ] [-n ] [-S ] [-X ] [host name or IP address ]
Note: Execute the telnet command to start operations at the terminal stage and log on to the remote host.
Parameters:-8: 8 characters
A major advantage of Internet systems is that it is as convenient to manipulate computers on the other end of the world as it is to use computers on the other side. This chapter describes how to use the telnet service system to connect to a remote
Do you really know about Telnet?
Created:Article attributes: originalArticle submission: iqst (papabang_at_qingdaonews.com)
Author: iqstFrom: http://ccbirds.yeah.netRetain above info to transport
Directory:
Summary2. Remote Logon3. Telnet
Introduction
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?Learn
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?
2. Remote
Click on the computer's Start menu-run, enter the cmd command, and then OK. Open the cmd command line.
Enter Telnet test port command: Telnet IP port or Telnet domain portEnter
If the port is closed or unable to connect, display a link that
As we all know, the Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Landing service. It provides users with the ability to complete remote host work on the local computer. Use
General considerations
A telnet connection is used to transmit data through the transmission control protocol. The telnet protocol is based on the following three ideas: first, the concept of the network virtual terminal, second, the method of
In some content of AIX telnet, we cannot ignore its command usage. This part is also very important. It directly affects its settings and applications. First, let's take a look at the terminal negotiation from the console and use the EMULATE
During this period of time in the CentOS-5.1 server related configuration, also will gradually send some of their own notes and problems encountered in the experiment and solutions.
CentOS-5.1 (192.168.1.87)Client: FC6 (192.168.1.86) Windows XP (192.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.