telnet翻译中文(Telnet的中文含义是)

      最后更新:2022-11-16 08:17:04 手机定位技术交流文章

      请帮忙翻译

      英语: Tiered networksMAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment.Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats that can also log file analysis.日语:ひとつの阶のネットの组织を分けます MACアドレスと论理のネットワークアドレス(例えばTCP/IPとIPX/SPX)の间のが主に区别するのが论理のネットワークアドレスが多いネットを段阶の构造によって组织するのです。ネットワークアドレスの论理の组织形式は企业のすでにある论理の组织形式と适応することができて、组织によって构造を管理することを得て各部门のLANを建设します。あるいは企业の地理(学)によって分布して行って、すべての支店机构はすべて1つのぽつんと立っているLANを持ちます。通常の情况の下で、この2种类の情况は混じって使うことができ(ありえ)ます。ルータは异なっているLANにつながることに用いて、たとえばのイーサネットとトークンリング・ネットワークなどのLANの标准的なトポロジーの制限を突破して1つの更に大规模のネットを作り上げます。Internetは1つの最も良い例で、彼の多くて分散したネットは构成して、集中统一の管理がなくて、しかし彼は论理を使ってひとつの阶の住所の空间を分けて组织を行います 。ルータはこれらの数千のネットにつながって、そして最优秀ルートの选択をして、1台のホストコンピュータの上の情报の手渡しを异なったネットの上の别の1台の1台のホストコンピュータに着いて、すべてのはこれらはすべて経常的な変更と経常的な更新のルートの情报に基づきます。ルートはソーティングして関连している情报によってどのようにデータを包んでInternetの上の不一致のネットを送り届けることを决定します。ルートは表してネット上のこれらのルータを追迹して、そして最终の目的のネットのパスのが数を跳びますまで(へ)含みます。ルータはデータが目的地のすべてのルートの情报まで(へ)包むことを知っている必要はありません。もし目的のネットはルータの上でつながったことその他に1つのLANだならば、それではルータも隣り合っている目的のネットを知っている必要はないことができます。このような情况の下で、ルータは“デフォルトゲートウエイ”を使ってデータの包みを発送します。Internetの上で、1つのデータは通常多数のルータを通り抜けて目的地に到着することを包んで、ルータの上のルートはただデータだけを保留して包んで目的地の“おりて跳びますと”の情报に到着することを表します。パスの上のすべてのルータはすべて目的地のに到着して下跳ぶこととを知っていて、あるいはルートが表す中にデフォルトゲートウエイを使います。ルータは限られてTCP/IP合意を使うだけではなくて、しかしInternetの上で、ほとんど所有するルータはすべてIPルートを使っています。たくさんの会社と企业级の的のルータはルートのその他の合意を配置することができて、例えばIPX/SPXとAppleTalk。しかし、SOHOルータ、たとえたとえばもあれらはケーブルを使ってDSLモデムの接続ネットワークの経络のルータとただTCP/IP合意だけを使いますとしても。安全性を提供しますルータの仕事の原理はネットワークプロトコルのデータの包みの中の头部の情报を検査するので、そしてルートの选択をします。とても明らかで、ルータの上でネットのために1つの“検査して点検します”を创立することができます。つまりルータの配置の规则を使って、そしてネットに基づいて包みの头部の情报を数えますネットの流量を许しますかます禁止することを决定します。例えば、ルータを使ってファイアウォールの第1本の防御线として、特定のポートの上のTCPあるいはUDP通信を起用しますかます闭锁することができて、禁止でネットを通じて(通って)特定のアプリケーションを访问します。例えば、ルータの上でTelnetの流量(ポートの23)がふさがって、ある人がTelnet登录のネットの中のコンピュータを使うことを阻止することができて、特定のネットワークアドレスがルータを通じて(通って)私有のネット(あるいはこれに反して)を访问することをも阻止することができて、これらはすべてファイアウォールの中で一部の机能です。ファイアウォールは简単なルートの机能を含むだけではなくて、また状态の検査・测定する技术を含んでと代行などの机能を使用します。规模の绝えず広げるInternetは初めの学术の环境は现在の状态まで(へ)発展して、すでに言う値打ちがあったいかなる安全性がなくて、この过程の中で、ルータは最初に“ファイアウォール”の设备を创建することに用いるのです。 ルータは通常日志にツールを提供して、日志のデータの判断のネットを使ってすでにしみ込むかどうかことができます。今の多数のハッカーの攻撃の手段はとても复雑ですけれども、しかもIPアドレスを伪造することができて、しかし新米はよくInternetの上からただダウンロードして无料のハッカーのツールを使うだけ、ルータの上の日志のファイルを検査しますを通じて(通って)Unix nuxホストコンピュータの上のsyslogまで(へ)过程を见守って、ルータ时にの安全を受ける胁しは、日志のファイルをも分析することができます。
      Tiered networks MAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment. Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats, can also Analysis log file.
      Lamination network organization The MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use.The router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves the gateway.The router is not only restricted in uses the TCP/IP agreement, but on Internet, nearly all routers is using the IP route. Many companies and the enterprise routers may dispose route other agreements, for example IPX/SPX and AppleTalk. But, SOHO router, also, even if such as these use electric cable and the DSL modem turning on network's router only uses the TCP/IP agreement.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the routing. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions.Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. The router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.
      The lamination network organizes the MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use. the router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves thegateway.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the outlet by the choice. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions. Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. the router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.
      请帮忙翻译

      telnet怎么用?在不同的操作系统上用法一样吗?

      基本上是一样的。telnet在WINXP上的命令与参数功能一样。 怎么用就看一下以下的说明吧:telnet 命令允许您与使用 Telnet 协议的远程计算机通讯。运行 telnet 时可不使用参数,以便输入由 Telnet 提示符 (telnet>) 表明的 telnet 上下文。可从 Telnet 提示符下,使用下列命令管理运行 Telnet Client 的计算机。tlntadmn 命令允许您远程管理运行 Telnet Server 的计算机。这些命令都从命令提示符中运行。如果没有使用参数,tlntadmn 将显示本地服务器设置。在 Telnet 提示符下使用 telnet 命令启动 Telnet Client 并输入 Telnet 提示符语法telnet [\RemoteServer]参数\RemoteServer指定要连接的服务器的名称。/?在命令提示符显示帮助。注释不使用参数时,telnet 将启动 Telnet Client。当您在 Telnet 提示符时,必须使用 Telnet 命令。停止 Telnet Client语法quit参数无注释可以将该命令简化为 q。将 Telnet Client 连接到远程计算机语法open [\RemoteServer] [Port]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。Port指定要使用的端口。如果没有指定端口,则假定使用默认端口。注释可以将该命令简化为 o。范例若要通过 44 号端口连接到远程服务器 Redmond,请键入:o redmond 44断开 Telnet Client 与远程计算机的连接语法close [\RemoteServer]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。注释可以将该命令简化为 c。范例若要与远程服务器 Redmond 断开连接,请键入:c redmond44设置 Telnet Client 选项语法set [\RemoteServer] [ntlm] [localecho] [term {ansi | vt100 | vt52 | vtnt}] [escape Character] [logfile FileName] [logging] [bsasdel] [crlf] [delasbs] [mode {console | stream}] [?]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。ntlm打开 NTLM 身份验证(如果在远程服务器上可用)。localecho打开本地回显。term {ansi | vt100 | vt52 | vtnt}将终端设置为所指定的类型。escape Character设置 escape 字符。escape 字符可以是单个字符,也可以是 CTRL 键和字符的组合。若要设置控制键组合,请在键入要分配的字符时按住 CTRL。logfile FileName将文件设置成用于登录 Telnet 活动。日志文件必须位于本地计算机上。设置此选项时,自动开始记录。logging打开日志记录。如果没有设置日志文件,将会出现错误信息。bsasdel将 BACKSPACE 设置成删除键。crlf设置新的行模式,该模式将导致 ENTER 键发送 0x0D、0x0A。delasbs将 DELETE 设置成退格键。mode {console | stream}设置操作模式。?允许查看该命令的完整语法。注释若要在 Telnet 提示符位置关闭上一次设置的选项,请键入:unset [Option]若要设置 escape 字符,请键入:-e Character在 Telnet 的非英文版本上,codeset Option 可用。Codeset Option 将当前代码集设置成下面的某个选项:Shift JIS、 Japanese EUC、 JIS Kanji、 JIS Kanji (78)、 DEC Kanji、 NEC Kanji。应该在远程计算机上设置相同的代码集。发送 Telnet Client 命令语法send [\RemoteServer] [ao] [ayt] [esc] [ip] [synch] [?]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。ao终止输出命令。ayt发送“Are you there?”命令。esc发送当前的转义字符。ip中断过程命令。synch执行 Telnet 同步操作。?允许查看该命令的完整语法。查看 Telnet 客户端的当前设置语法display参数无注释显示命令列出 Telnet 客户端的当前操作参数。如果您在 Telnet 会话中(换句话说,如果您连接到 Telnet 服务器),则可以按 CTRL+} 退出 Telnet 会话以修改参数。若要返回到 Telnet 会话,请按 ENTER 键。在命令提示符使用 tlntadmn 命令管理运行 Telnet Server 的计算机语法tlntadmn [\RemoteServer] [start] [stop] [pause] [continue]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。start启动 Telnet Server。stop停止 Telnet Server。pause中断 Telnet Server。continue恢复 Telnet Server。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。管理 Telnet 会话语法tlntadmn [\RemoteServer] [-s] [-k{SessionID | all}] [-m {SessionID | all} "Message"]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。-s显示活动的 Telnet 会话。-k{SessionID | all}终止会话。键入会话 ID 以终止特定会话,或者键入 all 终止所有会话。-m {SessionID | all} "Message"向一个或多个会话发送消息。键入会话 ID 以便将消息发送给特定会话,或者键入 all 将消息发送给所有会话。在引号内键入要发送的消息(即"Message")。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。在运行 Telnet Server 的计算机上设置登录选项语法tlntadmn [\RemoteServer] config [auditlocation={eventlog | file | both}] [audit=[{+ | -}admin][{+ | -}user][{+ | -}fail]]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。auditlocation={eventlog | file | both}指定是否将事件信息发送给事件查看程序、文件,或同时发送给这二者。audit=[{+|-}admin][{+|-}user][{+|-}fail]指定要审核哪个事件(管理性登录事件、用户登录事件或失败的登录尝试)。要审核特殊类型的事件,请在该事件类型之前键入加号 (+)。要停止审核特殊类型的事件,请在该事件类型之前键入减号 (-)。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。如果指定发送事件信息的位置但不指定要审核的信息类型,那么只审核关于管理性登录事件的信息,并将其发送到指定位置。范例若要将事件信息发送给事件查看程序,请键入:tlntadmn config auditlocation=eventlog若要审核管理性登录事件和失败的登录尝试,请键入:tlntadmn config audit=+admin +fail在运行 Telnet Server 的计算机上设置默认域语法tlntadmn [\RemoteServer] config [dom=DomainName]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。dom=DomainName指定要设置为默认域的域。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。范例若要使 Redmond 作为本地服务器的默认域,请键入:tlntadmn config dom=Redmond在运行 Telnet Server 的计算机上映射 Alt 键语法tlntadmn [\RemoteServer] config [ctrlakeymap={yes | no}]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。ctrlakeymap={yes | no}指定是否要让 Telnet 服务器把 CTRL+ 翻译为 ALT。键入 yes 映射快捷键,或者键入 no 禁止映射。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。如果不映射 ALT 键,则 Telnet 服务器不会把 ALT 键发送给可能依靠该键的应用程序。在运行 Telnet Server 的计算机上设置连接的最大数量语法tlntadmn [\RemoteServer] config [maxconn=PositiveInteger]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。maxconn=PositiveInteger设置连接的最大数量。必须使用小于 10,000,000 的正整数来指定该数。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。在运行 Telnet Server 的计算机上设置失败登录尝试的最大次数语法tlntadmn [\RemoteServer] config [maxfail=PositiveInteger]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。maxfail=PositiveInteger设置允许用户执行的最大失败登录尝试次数。必须用一个小于 100 的正整数来指定该数。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。在运行 Telnet Server 的计算机上设置操作模式语法tlntadmn [\RemoteServer] config [mode={console | stream}]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。mode={console | stream}指定操作模式。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。在运行 Telnet Server 的计算机上设置 Telnet 端口语法tlntadmn [\RemoteServer] config [port=IntegerValue]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。port=IntegerValue设置 Telnet 端口。必须使用小于 1,024 的整数指定端口。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。在运行 Telnet Server 的计算机上设置身份验证方法语法tlntadmn [\RemoteServer] config [sec=[{+ | -}ntlm][{+ | -}passwd]]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。sec=[{+ | -}ntlm][{+ | -}passwd]指定是否使用 NTLM、密码或这两者对登录尝试进行身份验证。要使用特定类型的身份验证,请在该身份验证类型前键入加号 (+)。要防止使用特定类型的身份验证,请在该类身份验证之前键入减号 (-)。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。NTLM 是两台计算机之间的事务的身份验证协议,而这两台计算机中间至少有一台运行 Windows NT 4.0 或更早版本。另外,NTLM 是为没有加入到域中的计算机(如单机服务器和工作组)提供的身份验证协议。在运行 Telnet Server 的计算机上设置空闲会话超时语法tlntadmn [\RemoteServer] config [timeout=hh:mm:ss]参数\RemoteServer指定要管理的服务器名称。如果没有指定服务器,则假定使用本地服务器。timeout=hh:mm:ss以小时、分钟和秒为单位设置超时时间段。/?在命令提示符显示帮助。注释如果两台计算机都运行 Windows XP,则可以使用 tlntadmn 命令远程管理运行 Telnet Server 的计算机。无法通过 tlntadmn 命令从运行 Windows XP 的计算机远程管理运行 Windows 2000 和 Telnet Server 的计算机。注释 若要从 Telnet Client 切换到命令模式,请在 Telnet 提示符按 CTRL+ ]。若要切回到 Telnet Client,请按 ENTER 键
      1.如果你是想被别人远程登录的话,就必须打开telnet 服务,输入services.msc找到telnet服务,打开就可以了。telnet默认端口为23,你可以自己修改。 2.如果你是想登陆别人的话,使用cmd,命令为telnet 192.168.1.1 23前面为IP,后紧接端口就可以了!23为默认端口可以不输入,如果你把端口改为2009,就为telnet 192.168.1.1 2009即可! 3.还有就是有路由的话,你要在路由上把你所开的端口给打开!不然的话,外网的人就不能telnet登录内网的!
      直接输入这个命令就可以了,至于参数,看着办吧。 我只用它来干一件事:telnet bbs.*.edu.cn (涉及具体网址,这里用“*”代替)
      这个命令比较特殊,一般情况下,任何系统都是适用的)。只不过参数可能不一样。xp下, telnet ip地址或者域名
      telnet怎么用?在不同的操作系统上用法一样吗?

      哪位大侠帮忙翻译一下,谢谢!

      4 种网络应用 即然学生看见了什么发生在数据包当他们旅行表示层, 是时间看数据包旅行通过在到达他们的最终目的地之前的最后层数。最后层数或层数7 开放系统互连模式指应用层。应用层是最接近终端用户, 协调直接地与层数7 电子邮件被送或每次被接受。您将看见怎么应用层处理数据包从客户服务器应用、域名服务, 和网络应用由审查以下: .客户服务器 .Redirectors .域名系统 .电子邮件 .Telnet .FTP .HTTP 4.1 应用层的基本 4.1.1 应用过程 就OSI 模型的状况, 应用层(层数7) 支持应用的通信的组分。应用层负责对以下: .辨认和建立意欲的通信的可及性成为伙伴 .同步合作的应用 .建立关于规程的协议为错误校正 .控制数据正直 应用层是开放系统互连层最接近结束系统。这确定是否充足的资源为通信存在在系统之间。没有应用层, 有会是没有网络通信支持。 应用层不提供服务对其他开放系统互连层。它提供服务对应用过程说谎在开放系统互连模式的范围之外。例子的这样应用过程包括空白表格程序、文字处理程序, 和银行业务终端程序。另外, 应用层为开放系统互连模式的剩余供给一个直接接口由使用网络应用(例如, 浏览器, 电子邮件, FTP, Telnet), 或一个间接接口由使用独立应用(例如, 文字处理软件、报表, 介绍经理) 网络redirector 。 呵呵
      4网络应用,现在学生拭目以待,因为他们的数据包旅行颁奖层 正是在这层去看看,通过旅游数据包才到达目的地. 最后层或7层的OSI模型的应用层是指. 应用层是最接近终端用户、 接口层7人直接与每一次电子邮件发送或接收. 你会看到应用层处理数据包从客户机服务器应用、域名服务 与网络应用的研究: ●客户服务器转向器●●●域名系统的电子邮件的FTP●●●远程登录4.1HTTP协议基本鸭 折叠层4.1.1应用程序的某方面的系统互连参考模型、次 电子应用层(第七层)的通信内容应用支持. 应用层负责如下: ●确定并提供拟建立同步沟通●合作伙伴●申请设立程序协定>儿 ●完整的数据回收管控系统互连应用层是最接近底层系统. 这就决定是否有足够的资源存在沟通系统. 无应用层,就不会有网络通信支持. 应用层没有提供任何其他服务互连层. 它提供的服务范围以外的应用程序说谎OSI模型. 例如应用程序包括电子表格程式,文字处理程序、银行终端节目. 另外, 应用层提供直接的互连接口,其余用网络应用示范(例如 浏览器、电子邮件、文件传输、远程登录),或者用间接接口独立申请(如文字处理机、电子表格、 颁奖经理)与网络转向器.
      哪位大侠帮忙翻译一下,谢谢!

      谁能帮忙翻译一下,这些命令代表什么意思?

      ist Print command list ping send ICMP ECHO_REQUEST to network hostsping6 send ICMPv6 ECHO_REQUEST to network hostsquit Exit current mode and down to previous modeshow Show running system informationtcpsyn Tcp SYN to destinationterminal Set terminal line parameterstraceroute Trace route to destinationS1313_TianMaDianZi> enS1313_TianMaDianZi#application Applicationaudit_log audit log switchboot-loader Boot-loader from one file to anotherclear Reset functionsconfigure Configuration from vty interfacecopy Copy from one file to anotherdate Set system datedebug Debugging functions (see also 'undebug')end End current mode and change to enable modeerase Erase file contentContentes of startup configurationexec execute commandexit Exit current mode and down to previous modeexport export exception info to serverflowfast Flow fast setimport Importip IP informationipsec Ipsec configipv6 IPv6 informationlist Print command listmax-ident-packet max application identify packet per conntrackmax-ips-detect Intrusion prevention systemno Negate a command or set its defaultsntpupdate NTP update system timeping send ICMP ECHO_REQUEST to network hostsping6 send ICMPv6 ECHO_REQUEST to network hostspki Config pkireboot Reboot Systemrecover recoversave Save running configuration to disksd1 sd1 is configured as a diskshow Show running system informationswitch Switchsync Syncsystem-view Configuration terminaltcpsyn Tcp SYN to destinationtelnet Open a telnet connectionterminal Set terminal line parameterstraceroute Trace route to destinationupdate Update malware url.usb1 USB1 is configured as a diskwatchdog watchdog switchwho show login administrator usersist打印命令列表ping发送ICMP ECHO_REQUEST到网络主机ping6将ICMPv6 ECHO_REQUEST发送到网络主机退出退出当前模式并返回上一个模式显示显示正在运行的系统信息tcpsyn Tcp SYN到目标端子设置端子线参数traceroute跟踪到目的地的路线S1313_天马店子> zhS1313_天马点子#应用程序audit_log审核日志开关引导加载程序引导加载程序从一个文件到另一个文件清除重置功能从vty界面配置配置从一个文件复制到另一个日期设置系统日期debug调试功能(另请参见“ undebug”)结束当前模式并更改为启用模式擦除擦除文件内容启动配置的内容exec执行命令退出退出当前模式并返回上一个模式将导出异常信息导出到服务器flowfast流量快速设置进口进口ip IP信息ipsec ipsec配置ipv6 IPv6信息list打印命令列表max-ident-packet最大应用程序每个conntrack标识数据包max-ips-detect入侵防御系统否否定命令或设置其默认值ntpupdate NTP更新系统时间ping发送ICMP ECHO_REQUEST到网络主机ping6将ICMPv6 ECHO_REQUEST发送到网络主机pki配置pki重新启动重新启动系统恢复恢复保存将运行配置保存到磁盘sd1 sd1配置为磁盘显示显示正在运行的系统信息开关开关同步同步系统视图配置终端tcpsyn Tcp SYN到目标telnet打开telnet连接端子设置端子线参数traceroute跟踪到目的地的路线更新更新恶意软件URL。USB1 USB1已配置为磁盘看门狗看门狗开关 谁显示登录管理员用户
      谁能帮忙翻译一下,这些命令代表什么意思?

      telnet翻译成中文叫什么

      远程登陆
      电信
      运动
      telnet翻译成中文叫什么

      本文由 在线网速测试 整理编辑,转载请注明出处,原文链接:https://www.wangsu123.cn/news/45937.html

          热门文章

          文章分类