Solved

telnet protocol

Posted on 2000-02-22
8
200 Views
Last Modified: 2010-04-10
I need information on how to set up a connection with a telnet server. I already have the basic app done, I just can't connect. Looking at the data the server transmits, I'm under the assumption that it's sending some kind of header and is awaiting a response from the client side. I've looked everywhere to confirm this and for any information that might help me along, but have been unsuccessful thus far. Any help would be appreciated. Thanks.
0
Comment
Question by:dwatling
  • 5
  • 3
8 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 2547946
A source code sample is available at 'http://www.musc.edu/~brannanp/telnet/'

I'm sure this will give you all the information you need...
0
 
LVL 86

Expert Comment

by:jkr
ID: 2547991
BTW: For a full description of the telnet protocol, see http://www.cis.ohio-state.edu/htbin/rfc/INDEX.rfc.html(there are several RFC dealing with the telnet protocol, and I don't want to pollute this Q with dozens of links ;-)
0
 

Author Comment

by:dwatling
ID: 2548014
This question has a deletion request Pending
0
 

Author Comment

by:dwatling
ID: 2548019
d'oh. sorry about that. i didn't realize people had answered already.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 86

Expert Comment

by:jkr
ID: 2548180
This question no longer is pending deletion
0
 
LVL 86

Expert Comment

by:jkr
ID: 2548181
No problem - why did you want to delete this?
0
 
LVL 86

Accepted Solution

by:
jkr earned 500 total points
ID: 2548203
Ooops, should have been an 'answer' ...
0
 

Author Comment

by:dwatling
ID: 2551783
I found the answer I was looking for, and no longer needed an answer. Always happens that way ;)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Often, when implementing a feature, you won't know how certain events should be handled at the point where they occur and you'd rather defer to the user of your function or class. For example, a XML parser will extract a tag from the source code, wh…
Introduction This article is the first in a series of articles about the C/C++ Visual Studio Express debugger.  It provides a quick start guide in using the debugger. Part 2 focuses on additional topics in breakpoints.  Lastly, Part 3 focuses on th…
The goal of the video will be to teach the user the concept of local variables and scope. An example of a locally defined variable will be given as well as an explanation of what scope is in C++. The local variable and concept of scope will be relat…
The goal of the video will be to teach the user the difference and consequence of passing data by value vs passing data by reference in C++. An example of passing data by value as well as an example of passing data by reference will be be given. Bot…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now