Linux Command Directory
This directory of Linux commands is from Linux in a Nutshell, 5th Edition.
Click on any of the 687 commands below to get a description and list of available options. All links in the command summaries point to the online version of the book on Safari Bookshelf.
telnet [options] [host [port] ]
Access remote systems. telnet is the user interface that communicates with another host using the Telnet protocol. If telnet is invoked without host, it enters command mode, indicated by its prompt,
The Telnet protocol is often criticized because it uses no encryption and makes it easy for snoopers to pick up user passwords. Most sites now use ssh instead.
Automatic login to the remote system.
Use bind to bind the local socket to an aliased address or the address of an interface other than the one that would be chosen by connect.
Disable reading of the user's
Turn on socket-level debugging.
Set initial telnet escape character to escape_char. If escape_char is omitted, no escape character is predefined.
With Kerberos V5 authentication, allow forwarding of the local credentials to the remote system.
With Kerberos authentication, obtain tickets for the remote host in realm, instead of in the remote host's realm.
When connecting to remote system and if remote system understands ENVIRON, send user to the remote system as the value for variable USER. Implies the -a option.
Open tracefile for recording the trace information.
Emulate rlogin. The default escape character for this mode is a tilde (~); an escape character followed by a dot causes telnet to disconnect from the remote host; a ^Z instead of a dot suspends telnet; and a ^] (the default telnet escape character) generates a normal telnet prompt. These codes are accepted only at the beginning of a line.
Turn on data-stream encryption if possible.
Request 8-bit operation.
Disable the escape character functionality.
With Kerberos V5 authentication, allow local credentials to be forwarded to the remote system, including any that were already forwarded to the local environment.
Do not allow automatic login to the remote system.
Specify an 8-bit data path on output.
Disable the atype type of authentication.