Solved

long telnet windows 7 tutorial

Posted on 2012-12-20
9
696 Views
Last Modified: 2012-12-22
I am using windows 7

I am looking for a long telnet tutorial

every tutorial I find is very short

and tells me on 5 commands
0
Comment
Question by:rgb192
  • 3
  • 2
  • 2
  • +1
9 Comments
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 167 total points
Comment Utility
Telnet is a very simple program, not much to it.  If you are still looking for SMTP info, that is not part of the telnet commands.  Those are commands you send to a server using telnet and for that you have to look up SMTP protocol commands.

Example here: http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
0
 
LVL 6

Expert Comment

by:Leon Teale
Comment Utility
sorry the comment above says smtp i thought you were wanting telnet?

this site has a good tutorial covering most parts of telnet, most tutorials are small because theres not very much too it.

ssh is much better :)
0
 
LVL 6

Assisted Solution

by:Leon Teale
Leon Teale earned 167 total points
Comment Utility
0
 
LVL 27

Assisted Solution

by:serialband
serialband earned 166 total points
Comment Utility
You can telnet to a host of other ports, including the smtp port, which requires a tutorial on smtp to use and decipher smtp commands as DaveBaldwin pointed out.  If that's what the asker might be looking for, here's a link:

http://support.microsoft.com/kb/153119 (Yes, it's Microsoft.  And yes, it's telnet to smtp.)

I don't think there's a single telnet tutorial on all the possible ports that you can telnet to, but there are other separate tutorials that get you started on them.  Just search for the combined terms, such as  telnet to port 80 or telnet smtp, to find them.  Basically, you'd need to learn http if you want to telnet to port 80 and you'd need to learn smtp if you want to telnet to port 25.  Telnet is just a simple tool to help diagnose them.
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 6

Expert Comment

by:Leon Teale
Comment Utility
unless he is meaning to telnet to the telnet service specifically in which case there are guides. such as the one i sent, telnet can allow you to control a machine as though you had local cmd access (almost) ssh is better in my opinion as i said before but otherwise see the link in my previous response
0
 
LVL 82

Expert Comment

by:Dave Baldwin
Comment Utility
Some of @rgb192's other related questions have been about using telnet to learn about SMTP which is why I answered the way I did.
0
 
LVL 27

Expert Comment

by:serialband
Comment Utility
I had guessed that, based on your post, which was why I included a link about telnet to smtp.  It's more "advanced" than the basic telnet tutorials @rgb192 is referring to.
0
 

Author Comment

by:rgb192
Comment Utility
I am using telnet



>>http://support.microsoft.com/kb/153119



my mailserver requires a login (i think)

I sent messages but there is no 'from email address'
when I check the message in my mail inbox

maybe because I am not logged in

but how to log in
0
 

Author Closing Comment

by:rgb192
Comment Utility
these answer the question about the tutorial

thanks
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now