1980
DOI: 10.17487/rfc0764
|View full text |Cite
|
Sign up to set email alerts
|

Telnet Protocol specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

1986
1986
2019
2019

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(14 citation statements)
references
References 1 publication
0
13
0
1
Order By: Relevance
“…CodeRed uses HTTP [12]. Other vulnerabilities exploit Telnet [29], SMB [38], HTTP or RPC. We have also examined some other protocols such as RTP [36] and SMTP [17] during the design of our policy language.…”
Section: Methodsmentioning
confidence: 99%
“…CodeRed uses HTTP [12]. Other vulnerabilities exploit Telnet [29], SMB [38], HTTP or RPC. We have also examined some other protocols such as RTP [36] and SMTP [17] during the design of our policy language.…”
Section: Methodsmentioning
confidence: 99%
“…Analyzing the ratio of different types of traffic in the total transit route traffic revealed that monitoring (management) traffic occupied negligible capacity compared to total network requirements. Telecommunication equipment is most frequently monitored using Telnet [45], SSH [46], SNMP [47], and TR-69 CPE WAN [48] management protocols. These protocols use two-way communication and losing packets hinders their interactive functioning.…”
Section: Impact Of Network Performance On Monitoring Internet Andmentioning
confidence: 99%
“…• Telnet server is setup at server side of the network for accepting Telnet requests, commonly over TCP port 23 [31].…”
Section: Telnet Servermentioning
confidence: 99%