When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of TCP and UDP port numbers - Wikipedia

    en.wikipedia.org/wiki/List_of_TCP_and_UDP_port...

    This is a list of TCP and UDP port numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need one port for bidirectional traffic. TCP usually uses port numbers that match the services of the corresponding UDP implementations, if they exist, and vice versa.

  3. Telnet - Wikipedia

    en.wikipedia.org/wiki/Telnet

    Telnet consists of two components: (1) the protocol itself and (2) the service component. The telnet protocol is a client-server protocol, based on a reliable connection-oriented transport. [2] This protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23 or 2323, where a Telnet server application is ...

  4. Secure Shell - Wikipedia

    en.wikipedia.org/wiki/Secure_Shell

    An SSH tunnel can provide a secure path over the Internet, through a firewall to a virtual machine. [9] The IANA has assigned TCP port 22, UDP port 22 and SCTP port 22 for this protocol. [10] IANA had listed the standard TCP port 22 for SSH servers as one of the well-known ports as early as 2001. [11]

  5. Transmission Control Protocol - Wikipedia

    en.wikipedia.org/wiki/Transmission_Control_Protocol

    Some examples include: FTP (20 and 21), SSH (22), TELNET (23), SMTP (25), HTTP over SSL/TLS (443), and HTTP (80). [ e ] Registered ports are typically used by end-user applications as ephemeral source ports when contacting servers, but they can also identify named services that have been registered by a third party.

  6. inetd - Wikipedia

    en.wikipedia.org/wiki/Inetd

    For an example, telnet can be configured as follows (line taken from a machine running AIX version 5.1): telnet stream tcp6 nowait root /usr/sbin/telnetd telnetd -a The first word, telnet, is the official name of the service. It is resolved using the system database to map port numbers and protocols to service names.

  7. Port (computer networking) - Wikipedia

    en.wikipedia.org/wiki/Port_(computer_networking)

    In computer networking, a port or port number is a number assigned to uniquely identify a connection endpoint and to direct data to a specific service. At the software level, within an operating system , a port is a logical construct that identifies a specific process or a type of network service .

  8. Reverse telnet - Wikipedia

    en.wikipedia.org/wiki/Reverse_telnet

    Reverse telnet is a specialized application of telnet, where the server side of the connection reads and writes data to a computer terminal line (RS-232 serial port), rather than providing a command shell to the host device. Typically, reverse telnet is implemented on an embedded device (e.g. terminal/console server), which has an Ethernet ...

  9. Secure copy protocol - Wikipedia

    en.wikipedia.org/wiki/Secure_copy_protocol

    A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default. [6] Like RCP, there is no RFC that defines the specifics of the protocol.