![]() ![]() Typically, this protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening. " Telnet is a client-server protocol, based on a reliable connection-oriented transport. Reason: I'd like to quote Wikipedia, the host of all the knowledge in the world: (toot toot!) ![]() :) )įIRST OFF: Why am I addressing this? Why make such a big fuss about Telnet?Īnswer to that : T elnet is not safe to use on a multi-daemon server (Notice how I didn't say "secure". (Again, anyone, even forum mods, let me know if this should be somewhere else or I've accidentally bashed the TeamSpeak software or cramped on the TOS for TeamSpeak, I love this software to death, and if it's already been addressed, I hate beating a dead horse. So, here's a solution I've come up with that enables a nice and safe usage of ServerQuery away from prying eyes. While I agree ServerQuery is AWESOME for when you don't want to connect via the client (for those sneaky ninja-kicks or ninja-bans, I've had to do a few of those :) ), I don't much like that you can connect to it via Telnet. ![]() Something I've come across, and anyone correct me if I'm wrong, is that there doesn't seem to be any kind of guide on here about securing one's ServerQuery. Hey folks, I'm happy to say I just joined the forum and this would be my first post! *insert first post gag here* ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |