telnet service

[ˈtɛlˌnɛt 'sɝvɪs][ˈtelnet ˈsɜːvɪs]

[计] 远程通信网服务

  • Because the popular network operating system ( Windows Linux Unix etc ) almost support TCP / IP hosts are usually equipped with Telnet server and may offer Telnet service .

    由于当前流行的各种网络操作系统(Windows、Linux、Unix等)都支持TCP/IP协议,因此都随机安装了telnet服务器,为 远程 客户端提供 telnet 服务

  • If a valid route exists to the host and it 's responding to pings but the application service is failing to respond then you can check connectivity to the relevant ports using telnet .

    如果存在到主机的有效路由,而且它能够响应ping,但是应用 服务没有响应,那么可以使用 telnet检查到相关端口的连接。

  • However you can also use it to establish a connection to a specific port on the host ( the default being 23 the telnet service ) .

    但是,也可以使用它建立到主机上特定端口的连接(默认端口是23, telnet 服务)。

  • Using the DOS command TELNET method tools to detect whether the services are in the normal interception state can determine whether the service port is normal in the shortest possible time 30 seconds .

    使用DOS工具命令 TELNET来检测 网络 通信 服务器的三 个子服务 端口是否处于正常侦听状态,可以在最短30秒的时间内确定 服务端口侦听是否正常。

  • This system can provide access control service for FTP 、 WWW 、 TELNET .

    该系统可以为FTP、WWW、 TELNET提供访问控制 服务

  • Remote accessing is one of the most useful applications in Internet and Telnet is the factual standard to realize it . It provides a standard interface for guests when they access a remote host that is Network Virtual Terminal Service .

    远程登录是互连网上最常用的应用之一,而 Telnet已经是Internet上实现 远程 登录的事实标准,它为客户访问一个远程主机提供一个标准接口,即网络虚拟终端 服务

  • Fire wall is a very important technique to protect the network . The proxy service of screened subnet is the key of fire wall . Here introduced is the implementation of Telnet proxy .

    防火墙技术是保护网络安全的一种重要手段,外围网屏蔽式防火墙的代理 服务是防火墙技术的关键.文中叙述了 Telnet代理服务 Telnet-proxy的实现技术。

  • The entrance gate not only includes authentication system used by login program but also includes telnet ftp and even all open service programs because attackers may enter operating systems by exploiting service program vulnerabilities .

    入口门槛不仅仅是登录 服务程序的认证机制, telnet 服务、ftp 服务等也都是系统的入口门槛,甚至所有对外 提供 服务都可能成为入口门槛。因为攻击者可能通过利用服务程序漏洞进入系统。