<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
      <title>014.06.14.General Working. Telnet - EmbLogic</title>
      <link>https://www.emblogic.com/forum/categories/014-06-14-general-working-telnet/feed.rss</link>
      <pubDate>Thu, 16 Apr 26 22:07:25 +0530</pubDate>
         <description>014.06.14.General Working. Telnet - EmbLogic</description>
   <language>en-CA</language>
   <atom:link href="/forum/discussions/feed.rss" rel="self" type="application/rss+xml" />
		<item>
			<title>5. With secure protocols like SSH, in what scenarios might Telnet still be preferred or required,why</title>
			<link>https://www.emblogic.com/forum/discussion/1326/5-with-secure-protocols-like-ssh-in-what-scenarios-might-telnet-still-be-preferred-or-requiredwhy</link>
			<pubDate>Tue, 06 Feb 2024 16:51:50 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1326@/forum/discussions</guid>
			<description><![CDATA[<p><span style="font-family: Georgia, serif; color: #800000;"><span><b>014.06.14.</b></span></span><span><span><span><strong>5. </strong></span><span>With the advent of more secure protocols like SSH, in what scenarios might Telnet still be preferred or required, and why?</span></span></span></p><br />]]></description>
		</item>
		<item>
			<title>4. Given Telnet&#039;s lack of encryption and susceptibility to security threats, how would you mitigate</title>
			<link>https://www.emblogic.com/forum/discussion/1325/4-given-telnet039s-lack-of-encryption-and-susceptibility-to-security-threats-how-would-you-mitigate</link>
			<pubDate>Tue, 06 Feb 2024 16:50:53 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1325@/forum/discussions</guid>
			<description><![CDATA[<div><span style="font-family: Georgia, serif; color: #800000;"><span><b>014.06.14.</b></span></span><span><span><span><strong>4. </strong></span><span>Given Telnet's lack of encryption and susceptibility to security threats, how would you mitigate these risks in an environment where Telnet is still necessary?</span></span></span></div><br />]]></description>
		</item>
		<item>
			<title>3. Discuss the negotiation process that occurs once a Telnet connection is established</title>
			<link>https://www.emblogic.com/forum/discussion/1324/3-discuss-the-negotiation-process-that-occurs-once-a-telnet-connection-is-established</link>
			<pubDate>Tue, 06 Feb 2024 16:50:12 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1324@/forum/discussions</guid>
			<description><![CDATA[<div><span style="font-family: Georgia, serif; color: #800000;"><span><b>014.06.14.</b></span></span><span><span><span><strong>3. </strong></span><span>Discuss the negotiation process that occurs once a Telnet connection is established and its significance for the virtual terminal session.</span></span></span></div><br />]]></description>
		</item>
		<item>
			<title>2. Can you explain the client-server model in context of Telnet, its importance for remote mgt</title>
			<link>https://www.emblogic.com/forum/discussion/1323/2-can-you-explain-the-client-server-model-in-context-of-telnet-its-importance-for-remote-mgt</link>
			<pubDate>Tue, 06 Feb 2024 16:49:44 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1323@/forum/discussions</guid>
			<description><![CDATA[<div><span style="font-family: Georgia, serif; color: #800000;"><span><b>014.06.14.</b></span></span><span><span><span><strong>2. </strong></span><span>Can you explain the client-server model in the context of Telnet and its importance for remote management?</span></span></span></div><br />]]></description>
		</item>
		<item>
			<title>1. What is the significance of Telnet operating on top of the TCP/IP protocol stack</title>
			<link>https://www.emblogic.com/forum/discussion/1322/1-what-is-the-significance-of-telnet-operating-on-top-of-the-tcpip-protocol-stack</link>
			<pubDate>Tue, 06 Feb 2024 16:49:00 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1322@/forum/discussions</guid>
			<description><![CDATA[<div><span style="font-family: Georgia, serif; color: #800000;"><span><b>014.06.14.</b></span></span><span><span><span><strong>1. </strong></span><span>What is the significance of Telnet operating on top of the TCP/IP protocol stack, and why is TCP chosen for Telnet's data transmission?</span></span></span></div><br />]]></description>
		</item>
   </channel>
</rss>