Home | Articles | About | Contact | Forum |
Friday, September 20, 2019

Lunarpages.com Web Hosting

Mailing List

By Joining the mailing list you will be notified of site updates.

Show Your Support For
This Site By Donating:

Audience: Newbies
Last Updated: 10/14/03 1:51 AM
Original Creation Date: 10/14/03 1:51 AM
**All times are EST**


By Erik Rodriguez

This article describes what telnet is and what it is used for.

The telnet service gives users the ability to access a host and perform tasks as if they were working locally. Users can access a host anywhere in the world using a telnet client. All windows operating systems have a built-in client. You can access telnet by typing "telnet" in the run box.

Telnet connects to a host using port 23. It is also used by hackers to gain access to routers, servers, and other network devices. Telnet isn't used as often on servers now because the communcation between the host and client is not secure. Most network devices still use telnet (routers, switches, and hubs) but most servers are now using SSH. Telnet can be used to "hop" through multiple devices. See Telnet Hacking.

Juniper SRX anti-spam filtering config
Windows Server 2008 Clustering Configuration
Windows 2008 R2 Network Load Balancing (NLB)
Extreme Networks: Downloading new software image
Juniper SRX save config to USB drive
Juniper SRX logout sessions
Extreme Networks Syslog Configuration
Command line drive mapping
Neoscale vs. Decru
Data Security vs. Data Protection
Juniper SRX Cluster Configuration
HOWTO - Create VLAN on Extreme Switch
Using a Non-local Colocation Facility
Linux Server Administration
IT Chop Shops
Flow Viewers: SFLOW, NetFLOW, and JFLOW
Exchange 2007 Back Pressure
IPtables open port for specific IP
Politics in IT Departments
HOWTO - Block Dropbox
Cisco IOS Cheat Sheet
Subnet Cheat Sheet
Design a DMZ Network
How DNS works
Firewall Configuration
Juniper SSG Firewalls
Server Management
Configuring VLANs
Runlevels in Linux
Server Clustering
SONET Networks
The Red Hat Network
Server Colocation
Complicated Linux Servers
Dark Fiber
Data Center Network Design
Firewall Types
Colocation Bandwidth

Copyright © 2002-2016 Skullbox.Net All Rights Reserved.
A division of Orlando Tech Works, LLC
By using this site you agree to its Terms and Conditions.
Contact Erik Rodriguez