answersLogoWhite

0


Best Answer

Telnet is a protocol for transferring plain text over TCP

.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is transferred between computers using telnet?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Why is using TELNET a security risk for an IP network infrastructure?

Because the telnet session is in clear text and programs can capture the passwords to log in to telnet sessions.


IFUsing telnet or ftp which is the highest layer you are using to transmit data?

Normally both using transport layer for communication but they are using tcp protocol which uses application layer so application layer is correct answer..


What is the process of using computers and robots to conduct thousands of test to determine the interaction between compounds and a disease called?

High-throughput screening


Short note on telnet and remote login?

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. Historically, Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most network equipment and operating systems with a TCP/IP stack support a Telnet service for remote configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this purpose has waned in favor of SSH.


Small computers are ordered using normal EAID procedures. Select the?

Small computers are ordered using normal EAID procedures. Select the correct answer

Related questions

How do you do serial port communication between two computers in Linux using c language?

You should use pppd to define a connection between the two computers, then normal TCP/IP networking (telnet, ftp, http, NFS, SMB etc) will work without any programming.


Why is using TELNET a security risk for an IP network infrastructure?

Because the telnet session is in clear text and programs can capture the passwords to log in to telnet sessions.


What is a terminal emulation protocol used to log on to remote hosts using the TCPIP protocol suite?

Telnet


When using Telnet can you create a user account using the control panel?

No. Telnet is a CLI-only interface. You can't use graphical applications or tools like the Control Panel.


What is the advantage of using telnet in router configuration?

The main advantage of using this is remote access on the network.


What are firewalls intended to accomplish?

Firewalls protect one computer (or network) from another computer (or network) by imposing limits on how those two computers (or networks) can interact. In one example, you might have several computers in your internal network. You can control them by using telnet. You could use a firewall between your internal network and an external network to prevent a computer in the external network from accessing a computer in the internal network using telnet. Since telnet can be a security risk, blocking external telnet like this is highly appropriate. In another example, you might have a private firewall on your computer. You use the computer to browse other computers using http. You firewall could be configured to ensure that only the processes iexplore.exe or firefox.exe were allowed to use http. This way, if some malicious program, for instance malware.exe, attempted to use http, it would be blocked. Blocking can also be applied to external sites by address. There are many possibilities... Most modern firewalls are extremely complex, because there are many different possible interactions. Some are good, and some are bad.


What cannot be performed when using a telnet session to a remote router?

Password recovery


How can port no can be changed for telnet in Windows Vista?

Windows Vista does not provide a Telnet server. The instructions on how to change the port the server runs on will vary by software package. Without knowing what package you are using to provide Telnet, we can't provide instructions on how to configure it.


Can you login as root using telnet?

Yes, you can, but this is a very dangerous thing to do. Firstly, telnet is an insecure protocol, and anyone with a packet sniffer can find out your root password. Secondly, one should really never log in as the root account; use su or sudo after logging in as an ordinary user using a more secure protocol such as ssh. There are some settings in some versions of telnet that may prevent root logins, but the standard telnet will allow that.


What is the function telnet protocol?

It stands for TELECOMMUNICATIONS NETWORK. You can remotely control web servers through Telnet. By using Telnet programs you can enter commands. By exchanging data over internet two programs can work cooperatively. With Telnet you can not only control their server but can also communicate with other servers on the network


Can spyware be transfered from one PC to another from using the same wifi router?

If you have a sufficient firewall on your computer and an up-to-date OS then no. All the vulnerable ports would be covered. if you're file sharing within a home network between computers then files could be transferred between computers via the router but they would not be able to execute them. A user might accidentally execute a file on their system though.


Which application belongs to the category of the client server model?

Internet browser.