Do you really know about Telnet?
Created:Article attributes: originalArticle submission: iqst (papabang_at_qingdaonews.com)
Author: iqstFrom: http://ccbirds.yeah.netRetain above info to transport
Directory:
Summary2. Remote Logon3. Telnet
Introduction
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?Learn
Telnet command detailsTelnet [-8 acdEfFKLrx] [-B ] [-e ] [-k ] [-l ] [-n ] [-S ] [-X ] [host name or IP address ]
Note: Execute the telnet command to start operations at the terminal stage and log on to the remote host.
Parameters:-8: 8 characters
The telnet application not only facilitates remote login, but also provides hackers with another intrusion method and backdoor. However, while enjoying the convenience that Telnet brings to you, do you really know about Telnet?
2. Remote
General considerations
A telnet connection is used to transmit data through the transmission control protocol. The telnet protocol is based on the following three ideas: first, the concept of the network virtual terminal, second, the method of
In terms of remote management, many administrators need to master this part. Now we will summarize some of the work flows of the Telnet service and some basic features and related functions in this article. First, let's take a look at the login
Although the use of the Telnet service has many security problems. However, Telnet is an important protocol for remote logon and the simplest protocol. Then we will analyze the use of Telnet. Telnet is the standard protocol and main method for
In our eyes, hackers are quite mysterious. They seem to be able to take things from the air and remotely manipulate our computers in unknown places. Then, the Telnet service can complete the simplest intrusion means. Many friends seem not familiar
For network administrators, managing dozens or hundreds of hosts, routers, switches, and other things by one person is also common. How can we manage them? This requires Batch. Now we will introduce the Batch telnet settings. I believe it will be
ObjectiveThe previous essay describes how to control a program through a pipeline, but this one was accidentally invalidated when the telnet was controlled, and Telnet flashed after CreateProcess execution.Problem analysisIf the standard input and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.