[cisb102su01] Re: Lesson 4 Question 4

  • From: "Chris & Michelle Blievernicht" <bleve@xxxxxxxx>
  • To: <cisb102su01@xxxxxxxxxxxxx>
  • Date: Tue, 13 Nov 2001 23:23:53 -0500

The use of Telnet seems to be the perfect method for hackers to enter other
people's computers and use / misuse their system.  Their doesn't seem to be
quite the security features you regularly find on the World Wide Web.

----- Original Message -----
From: <TRMBDML02@xxxxxxx>
To: <cisb102su01@xxxxxxxxxxxxx>
Sent: Tuesday, November 13, 2001 9:11 PM
Subject: [cisb102su01] Lesson 4 Question 4


>
> 4. The original purpose of telnet was to connect computers to one another
> before the technology was available for graphical connections.  The
purpose
> of telnet is to allow someone to log in to a machine that they don't know
and
> aren't near and do commands on it.   Telnet is widely used to connect to
> libraries today even though it is not widely used in other fields.  It is
> also used in online databases, email and statistics programs, and MOO and
> MUSH environments.  I learned this information at
> http://edt.uow.edu.au/elec195/group-projects-2k/group10/hostory.htm.
>
> I practiced telnet at telnet://140.147.254.3 .    This is the Library of
> Congress.  When I used this site I searched things on copyrights because
> files stored in braille and audio were frozen along with government
> legislation.  I learned the commands for browsing (BRWS, COHM), beginning
a
> new search (BGNS, word or phrase), ending a search (END).  I ended up
> searching for things about Orson Scott Card's copyrights and everything.
It
> was interesting.
>
> Elizabeth Ebersole


Other related posts: