Telnet
7 Followers
Recent papers in Telnet
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was... more
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was... more
Basically creativity into something very important, when the technology changes so quickly. 486-DX computer for example, who used to be proud of now no more than an old machine that is more worthy of display company warehouses. Linux c... more
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identity by staging their attacks through intermediate "stepping... more
For many users of networks like the ARPANET, an RJE protocol is probably as important in terms of utility as the TELNET (or Virtual Terminal) protocol. In fact, the facilities provided by a TELNET and an RJE protocol are probably of most... more
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
The development of networks for converged services including voice, video and data over the same infrastructure requires appropriate planning and dimensioning. This work presents a methodology, based on discrete event simulation, that... more
The dominant operating system on the Internet, Linux is quite prevalent, considering that the overwhelming majority of servers running web services, email services, and name services all depend on other open-source code that works with... more
The dominant operating system on the Internet, Linux is quite prevalent, considering that the overwhelming majority of servers running web services, email services, and name services all depend on other open-source code that works with... more
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
Introduces the reader to the history of the Internet and the requirements for accessing it. The three major capabilities of the Internet-electronic mail, telnet, and file transfer protocolare discussed. Examples of how Jewish Internet... more
Basically creativity into something very important, when the technology changes so quickly. 486-DX computer for example, who used to be proud of now no more than an old machine that is more worthy of display company warehouses. Linux c... more
Intruders which log-in through a series of machines when conducting an attack are hard to trace because of the complex architecture of the Internet. The thumbprinting method provides an efficient way to tracing such intruders by... more
In Linux Router management, the Traffic Control tool is still the unique method provided to network managers for monitoring and configuration. Scripts invoked through telnet are used for this purpose. Router monitoring is obtained by... more
Reflection on the forms and possibilities of Internet use in education does not keep pace with the speed with which access for schools is provided worldwide. For an in-depth educational discussion, we need to differentiate types of... more
Start Network devices are generally programmed over the serial ports (COM-RS232) or over the network via telnet protocol or ssh protocol. The communication process via the Telnet protocol and COM port is done unencrypted. Therefore, there... more
Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the... more
Basically creativity into something very important, when the technology changes so quickly. 486-DX computer for example, who used to be proud of now no more than an old machine that is more worthy of display company warehouses. Linux c... more
The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates... more
Individual machines are no longer sufficient to handle the offered load to many Internet sites. To use multiple machines for scalable performance, load balancing, fault transparency, and backward compatibility with URL naming must be... more
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
Teknik Jaringan tidak pernah dipisahkan dengan kongurasi yang merupakan tugas utama yang harus dilakukan dengan tujuan untuk membuatnya berfungsi. Seperti yang kita ketahui, untuk mengkongurasi beberapa perangkat baik server, switch, atau... more
In Linux Router management, the Traffic Control tool is still the unique method provided to network managers for monitoring and configuration. Scripts invoked through telnet are used for this purpose. Router monitoring is obtained by... more
Gytech Indosantara Mandiri Ltd. in the last few years experienced many Cybercrime attacks on the Web Server which caused many moral and material losses. Therefore, it is necessary to consider ways to fight and prevent attacks on the... more
Teknik Jaringan tidak pernah dipisahkan dengan kongurasi yang merupakan tugas utama yang harus dilakukan dengan tujuan untuk membuatnya berfungsi. Seperti yang kita ketahui, untuk mengkongurasi beberapa perangkat baik server, switch, atau... more
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
Instant messaging(IM) is a real-time communication medium between two or more people. Users can exchange messages privately or involve in group conversations. Today, IM does not only allow text messages, it can also send images and audio... more
Hackers on the Internet usually send attacking packets using compromised hosts, called stepping-stones, in order to avoid being detected and caught. With stepping-stone attacks, an intruder remotely logins these stepping-stones using... more
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an intruder uses a chain of hosts on the Internet as... more
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task involving various hardware components with different... more
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
Basically creativity into something very important, when the technology changes so quickly. 486-DX computer for example, who used to be proud of now no more than an old machine that is more worthy of display company warehouses. Linux c... more
This system facilitates mailing among the users of an internet, having an efficient and easy to communicate with telecommunications. The mails are transmitted and receiving by individual users registered in a mail management server. To... more
Aplikasi penelitian agent remote akan memudahkan kerja admin untuk melakukan pengawasan terhadap server yang dikelolanya. Admin akan melakukan remote dengan cara login telnet melalui mobile device. Kemudian akan muncul tampilan terminal... more
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports,... more
We design and evaluate an adaptive traffic conditioner to improve application performance over the differentiated services assured forwarding behavior. The conditioner is adaptive because the marking algorithm changes based upon the... more
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of... more
We studied Brute-force SSH attacks carried out on six different universities campus networks by using Honeypot Techniques. Brute-force password guessing attacks against SSH, FTP and telnet servers are the most common form of attack to... more
This paper introduces JitterBugs, a class of inline interception mechanisms that covertly transmit data by perturbing the timing of input events likely to affect externally observable network traffic. JitterBugs positioned at input... more