1: let’s assume that the internal desktop is used by alice and she
1: Let’s assume that the internal desktop is used by Alice and she wants to remotely log into the external machine denoted as the Telnet server. Alice runs a Telnet client program on her desktop. 2: Let’s first assume that the Proxy Firewall does not exist. In this case, when Alice needs to remotely login into the external Telnet server, the Telnet client program […]
Recent Comments