Saturday, December 31, 2016

Understanding Telnet


Understanding Telnet - Telnet stands for Telecommunications Network Protocol, is a remote login is happening on the Internet network due to the service of the Telnet protocol. With the Telnet could allow users to access another computer remotely through the Internet.

Telnet is a protocol that allows users to log in and work on a remote system, such as if there is a program or file that is stored on a remote computer that is in the user's computer itself. In short Telnet is a software (softwere) used to remotely control the computer system.

Telnet or Telecommunications Network Protocol is the software used to remotely control the computer system.
Definition of Telnet remote login can be described as that which occurs on a computer network that allows users to login and work from a long distance through the Internet. Users can access and run the computer from a long distance through the service of the telnet protocol.

Telnet (Telecommunication Network) is a client-server protocol that enables remote login access to the destination computer in a network. Telnet can also be interpreted as a virtual / terminal emulation using the telnet protocol to access your computer remotely purposes. Telnet is used to log into another computer on the Internet and access various public services, including library catalogs and various databases.

Tuesday, December 27, 2016

Understanding Secure Shell


Understanding Secure Shell - SSH is an acronym for Secure Shell is a network protocol that utilizes cryptography to perform data communications on a network device to make it more secure. In concept using SSH must be supported by the server or device or client computers to exchange data. Both must have the SSH server on the side of the computer server and SSH client to the recipient's computer (the client).
Widely used on operating systems based on Linux and Unix Shell to access your account, SSH was designed as a replacement for Telnet and other insecure remote shell, which send information, especially passwords, in plain text form that makes it easy to be intercepted. Encryption used by SSH provides confidentiality and integrity of data over an insecure network such as the Internet.

Understanding SSH is an acronym for Secure Shell is a network protocol that utilizes cryptography to perform data communications on a network device to make it more secure. In concept the use of SSH is to be supported by the server or device or client computers to exchange data. Both must have the SSH server on the computer server and SSH client to the recipient's computer (the client).

SSH remote login is replacement applications such as telnet, rsh, and rlogin, which is much safer. The main function of this application is to access the machine remotely. Just like telnet, SSH Client provides the user with Shell for the remote machine. Unlike telnet, SSH provides encrypted connection between client and server. In practice, the use of using telnet and ssh as the difference with regular access websites with websites that are more secure (HTTPS).