85 relations: AbsoluteTelnet, ASCII, Banner grabbing, Berkeley r-commands, Byte-oriented protocol, Client (computing), Client–server model, Command-line interface, Computer security, Computer terminal, Computing platform, Connection-oriented communication, Daemon (computing), Debugging, Dell Wyse, Encryption, Ericom Software, File Transfer Protocol, Firewall (computing), Gateway (telecommunications), Hub (network science), Hypertext Transfer Protocol, HyTelnet, IBM 3270, IBM 5250, IBM i, IBM System i, In-band signaling, Internet, Internet Engineering Task Force, Internet Relay Chat, Internet Standard, Kermit (protocol), Line Mode Browser, Linux, List of GNU packages, Local area network, MacOS, Man-in-the-middle attack, Microsoft Windows, NCSA Telnet, Netcat, Network address translation, Network Control Program, Network switch, Octet (computing), Operating system, Packet analyzer, Passwd, Port (computer networking), ..., Post Office Protocol, Public-key cryptography, PuTTY, Reliability (computer networking), Reverse telnet, Router (computing), Rtelnet, RUMBA, SANS Institute, Secure Shell, SecureCRT, Security hacker, Server (computing), Simple Authentication and Security Layer, Simple Mail Transfer Protocol, SOCKS, SSH File Transfer Protocol, STD 8, Synchronet, Tera Term, Terminal emulator, Transmission Control Protocol, Transport Layer Security, University of California, Los Angeles, Unix, Unix-like, Verb, Virtual terminal, VT420, Vulnerability (computing), Web browser, Windows Embedded Compact, Windows NT, ZOC (software), 8-bit clean. Expand index (35 more) » « Shrink index
AbsoluteTelnet is a software terminal client for Windows that implements Telnet, SSH 1 and 2, SFTP, TAPI Dialup and direct COM port connections.
ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports.
The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.
Byte-oriented framing protocol is "a communications protocol in which full bytes are used as control codes.
A client is a piece of computer hardware or software that accesses a service made available by a server.
The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
A computer terminal is an electronic or electromechanical hardware device that is used for entering data into, and displaying or printing data from, a computer or a computing system.
A computing platform or digital platform is the environment in which a piece of software is executed.
Connection-oriented communication is a network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent.
In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
Debugging is the process of finding and resolving defects or problems within a computer program that prevent correct operation of computer software or a system.
Wyse is an American manufacturer of cloud computing systems.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Ericom Software, Inc., founded in 1993, is located in Closter, New Jersey, and provides software for enterprise-wide application access and application publishing for server-based computing environments.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A gateway is the piece of networking hardware used in telecommunications via communications networks that allows data to flow from one discrete network to another.
In network science, a hub is a node with a number of links that greatly exceeds the average.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.
HyTelnet (sometimes rendered Hytelnet or HYTELNET) was an early attempt to create a universal or at least simpler interface for the various Telnet-based information resources available before the World Wide Web.
The IBM 3270 is a class of block oriented computer terminal (sometimes called display devices) introduced by IBM in 1971 normally used to communicate with IBM mainframes.
IBM 5250 is a family of block-oriented terminals originally introduced with the IBM System/34 midrange computer systems in 1977.
IBM i is an operating system that runs on IBM Power Systems and on IBM PureSystems.
The IBM System i is IBM's previous generation of midrange computer systems for IBM i users, and was subsequently replaced by the IBM Power Systems in April 2008.
In telecommunications, in-band signaling is the sending of control information within the same band or channel used for voice or video.
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.
In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet.
Kermit is a computer file transfer/management protocol and a set of communications software tools primarily used in the early years of personal computing in the 1980s.
The Line Mode Browser (also known as LMB,, WWWLib, or just www) is the second web browser ever created.
Linux is a family of free and open-source software operating systems built around the Linux kernel.
This list of GNU packages lists notable software packages developed for or maintained by the Free Software Foundation as part of the GNU Project.
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
NCSA Telnet is an implementation of the Telnet protocol created at the University of Illinois at Urbana-Champaign National Center for Supercomputing Applications in 1986 and continuously developed until 1995.
Netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP.
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
The Network Control Program (NCP) provided the middle layers of the protocol stack running on host computers of the ARPANET, the predecessor to the modern Internet.
A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
The octet is a unit of digital information in computing and telecommunications that consists of eight bits.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
passwd is a tool on most Unix and Unix-like operating systems used to change a user's password.
In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a server in an Internet Protocol (IP) network.
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
PuTTY is a free and open-source terminal emulator, serial console and network file transfer application.
In computer networking, a reliable protocol provides notifications to the sender as to the delivery of transmitted data, as opposed to an unreliable protocol, which does not provide assurance of the delivery of data to the intended recipient(s).
Reverse telnet is a specialized application of telnet, where the server side of the connection reads and writes data to a computer terminal line (RS-232 serial port), rather than providing a command shell to the host device.
A router is a networking device that forwards data packets between computer networks.
RTelnet is a SOCKS client version of telnet in Unix-like systems.
Rumba is a terminal emulation software program with user interface (UI) modernization properties.
The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training and selling Certificates.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
SecureCRT is a commercial SSH and Telnet client and terminal emulator by VanDyke Software.
A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols.
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.
In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream.
STD 8 refers to two Internet Engineering Task Force standards proposed by Jonathan B. Postel and Joyce K. Reynolds from University of Southern California Information Sciences Institute in their Request for Comments published in May 1983.
Synchronet is a multiplatform BBS software package, with current ports for Microsoft Windows, Linux, and BSD variants.
Tera Term (alternatively TeraTerm) is an open-source, free, software implemented, terminal emulator (communications) program.
A terminal emulator, terminal application, or term, is a program that emulates a video terminal within some other display architecture.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
The University of California, Los Angeles (UCLA) is a public research university in the Westwood district of Los Angeles, United States.
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.
A verb, from the Latin verbum meaning word, is a word (part of speech) that in syntax conveys an action (bring, read, walk, run, learn), an occurrence (happen, become), or a state of being (be, exist, stand).
In open systems, a virtual terminal (VT) is an application service that.
The VT420 was an ANSI standard computer terminal introduced in 1990 by Digital Equipment Corporation (DEC).
In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.
Windows Embedded Compact, formerly Windows Embedded CE and Windows CE, is an operating system subfamily developed by Microsoft as part of its Windows Embedded family of products.* Unlike Windows Embedded Standard, which is based on Windows NT, Windows Embedded Compact uses a different hybrid kernel.
Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.
ZOC is a popular computer-based terminal emulator and Telnet software client for the Microsoft Windows and Apple Macintosh macOS operating systems that supports telnet, modem, SSH 1 and 2, ISDN, serial, TAPI, Rlogin and other means of communication.
8-bit clean describes a computer system that correctly handles 8-bit character encodings, such as the ISO 8859 series and the UTF-8 encoding of Unicode.