Skip to main content

What are Telnet and SSH Protocols?

What are Telnet and SSH Protocols?


Now let's start developing good applications gradually. While I am sharing my Linux information, I am also thinking about sharing my basic network information.

Telnet


Telnet is a connection used to access the computer remotely. This connection uses the TCP/IP protocol. Of course, this connection does not happen immediately on the computer you want. You have to go through some necessary steps. For example, to login to the computer you want to connect to, You need to know the password and you will be asked when you are doing a connection. What can you do with Telnet access?

Telnet does all this, isn't it beautiful? It often removes a lot of burdens on us. Especially telnet is a great chance for those who want to use their old computer at home as a server. Yes, telnet is a very good application, but in this beautiful application, it will bother us There is also the situation. While the file transfer is being made or the connection is being established, third parties are listening to your connection and you cannot interfere in any way. Likewise, the third parties are common to the file you have received, they can also shoot that file, of course, Actually, to summarize telnet briefly, we can say that it provides open communication.

Stop, don't be disappointed immediately :) At this point, our savior ssh comes into play.

SSH


So what is the benefit of ssh? It does the same function as telnet in SSH protocol, but with a difference. SSH makes the connection secure. The connection makes secret encryption between two computers when requested, and third parties can never decipher it. Let's take a look at SSH usage :).

First of all, if you want to use SSH in system, you should set your external ip address as static ip. Then, you should give static ip to the computer you want to connect. After you give static IP, you should open port 22 for the computer you want to connect to in your modem and direct it to the ip address of that computer.

You can use SSH with both IPv4 and IPv6.

You can copy a file on your own computer with SSH, or you can copy a file on a computer that you connect with an ssh connection to your computer with a secondary ssh connection.

Popular posts from this blog

Does turning the computer off and on every day reduce its lifespan?

 Does turning the computer off and on every day reduce its lifespan? Turning off your computer every day or leaving it on all the time increases its lifespan? While turning off your computer at the end of the day really means you are exposing it to additional wear and tear, in fact, the actual wear comes from the act of safely shutting down the computer, not when you turn it on later. Just as the internal combustion engine in cars is subject to increased wear during start-up due to the high levels of friction created by moving parts, a personal computer is subject to a similar type of start-up wear. However, this is directly proportional to the multitude of mechanical parts inside the computer. In other words, modern computers have almost no moving parts, except for a few fans and the hard drive, which is now rare. However, there may still be wear with the inrush current given to the circuits. Because electronic circuits consisting of indicators, capacitors and transformers draw a ...

Experts warned! Don't click on this post

Experts warned! Don't click on this post Experts warned users about the heavily used WhatsApp application. Special days, such as celebration messages that appear to be links to the virus and said that these messages should not be clicked.

WhatsApp, Cevapsız Aramaları Etkileyen Kötü Amaçlı Yazılım Keşfetti

Şirket, "gelişmiş bir siber aktör" tarafından hazırlanan casus yazılımların, popüler WhatsApp iletişim programı aracılığıyla, uygulama içi sesli görüşmelerde herhangi bir kullanıcı müdahalesi olmadan, çok sayıda hedefli cep telefonunu etkilediğini belirtti. Financial Times, oyuncuyu İsrail’in NSO Grubu olarak tanımladı ve bir WhatsApp sözcüsü daha sonra “gördüğünüz kapsama alanını kesinlikle reddetmediğimizi” söyledi. Facebook yan kuruluşu sözcüsü Pazartesi günü geç saatlerde yaptığı açıklamada, kötü amaçlı yazılımın, uygulamanın sesli arama işlevi aracılığıyla tek başına yapılan cevapsız aramalardan telefonlara sızabileceğini söyledi. Bilinmeyen sayıda insan - en azından düzinelerce bir miktar yanlış olmaz - şirketin Mayıs ayı başında keşfedildiğini söyleyen kötü amaçlı yazılımdan etkilendiğini söyledi. İnternet izleme uzmanı Citizen Lab'ın araştırmacısı olan John Scott-Railton, “çok korkutucu bir güvenlik açığı” olarak adlandırılan hack adını verdi. ”Burada, b...