2. Telnet protocolThe Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Login service. It provides users with the ability to perform remote host work on the local computer. Use a
The computer ports are as follows:
0 Port: Invalid port, typically used to analyze operating system
1 Port: Transmission Control Protocol port Service multi-Switch Selector
2 Port: Management utility
3 Port: Compression process
5 Port: Remote
With the advancement of e-commerce, enterprise informatization, Education informatization and other informatization processes, the informatization degree of the whole society is continuously improved. Information Processing becomes more and more
View the complete version: [-- Port details and how to enable and disable ports --]
I went to trustnet-platinum Network Management-Internet-Software Development-> Windows-> port explanation and how to enable port
Original address: http://www.moon-soft.com/download/info/2826.htm
Port: 0Service: ReservedDescription: Typically used to analyze the operating system. This method works because in some systems "0" is an invalid end, you will have different results
SSL VPN principle
If you separate the two concepts of SSL and VPN, you should know what they mean, but as a new technology, how they are combined may not be well understood. From the academic and commercial point of view, because they represent a
Ssl vpn Definition
The development of ssl vpn is a supplement to the existing SSL applications. It increases the access control and security level and capability of the company.
Ssl vpn also helps enterprises that use remote access to the
TCP/UDP Common port number
7 Echo (PING)9 DiscardDaytimer19 Word Fuzhou Builder20/TCP FTP Data21/TCP FTP Control File Transfer Protocol22/TCP SSH Secure Login, File transfer (SCP), and port redirection23/tcp Telnet Unsafe Text transfer25/tcp SMTP
One: TelnetThis method is often used to detect whether a remote port is unobstructed.[[Email protected] ~]# Telnet baidu.com 80Trying 123.125.114.144 ...Connected to Baidu.com (123.125.114.144). #==> appeared connected express connectivity,
Some people say that SSH is generally used to provide secure login. SSL is only a layer added to the protocol layer to provide security.
SSH works on TCP. After an SSH application is started, other protocol applications, such as emails, can be run
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.