One of the mysteries of the English language finally explained.
1A network protocol that allows a user on one computer to log into another computer that is part of the same network.
- ‘The technology also searches for known viral vulnerabilities such as ‘listening’ ports, open shares and well-known applications in use throughout the network, such as Microsoft IIS, ftp and telnet.’
- ‘Using packet filtering, firewalls can restrict the types of activity allowed, such as permitting web access and email but denying telnet and ftp.’
- ‘By connecting through the console server to a device console using simple telnet, the network manager is able to do so without the need for vendor-specific or other specialized software.’
- ‘But inside such a network, rlogin, telnet and the other r * commands give excellent and much more convenient service within their respective realms of use.’
- ‘To allow telnet access into a Cisco router, configure the VTY lines with a password and the login command.’
- 1.1 A program that establishes a connection from one computer to another by means of a telnet program.
- ‘With no fancy graphic interfaces or elaborate designs, a user simply connects to a server using a MOO client program or telnet, logs in and begins interacting within the environment.’
- ‘If the user is to be allowed to enter privileged exec mode during a telnet session, an enable password or enable secret must be set.’
- ‘This doesn't seem like much time to wait when browsing a Web site but imagine trying to use a program like telnet.’
- ‘One of the applications that we used at the time was a telnet emulator called Kermit.’
- 1.2 A link established by a telnet program.
- ‘Once the dæmon is running, connect from a terminal window by doing a telnet to the port you defined.’
- ‘Oooh, I see you've a large number of telnet connections to dialup lines in the Netherlands.’
- ‘Thus, a telnet connection between two computers will almost certainly include two IP addresses, an arbitrary port on the client, and the well-known port 23 on the server.’
Log into a remote computer using a telnet program.
- ‘This password would apply to all five simultaneous Telnet connections if more than one user were telnetting in at once.’
- ‘There's also another method to use so the user is placed directly into privileged exec mode when telnetting in, avoiding the enable password prompt.’
- ‘After the UNIX script telnets to the EM and executes the configuration script, the EM is fully configured.’
- ‘So far, we have been telnetting or SSHing to each machine one at a time to get the new root password in, because the root password won't map to each machine.’
- ‘Just five years ago, cutting-edge college students were telnetting to their University libraries to find research materials.’
1970s: blend of telecommunication and network.
In this article we explore how to impress employers with a spot-on CV.