Keywords: telnet, Internet, server, security, safety, firewall,
Whenever your computer is connected to the Internet, it is opened up to attacks by
anyone experienced with the Internet technology. One of the possible attacks is by using
the Telnet protocol to log into your system. If successful, the attacker can gain complete
control of your system.
With the Imaginary Telnet Server running, he will be served a fake response which will
prevent him from accessing any resources available on your system. The server will give him
the impression that he has found a top secret military computer. But when he tries to log in,
the server will offer humorous rejections.
If he uses one of the password cracking programs and tries to log in persistently,
the server will feed him a series of completely fake data for a while, making him think
that he got in. After a while, the server will "discover" the intruder and kick him off.
No matter how hard the attacker tries, he cannot log in to your system via Telnet.
Use it by itself or alongside a firewall. The server runs in the background and stays
out of your way completely. Full assembly language source is included, so it can also be
used as a model for assembly language programming of Internet servers for Windows computers.
Please note that just because you do not have a Telnet server installed on your system,
does not mean you are safe from attackers trying to gain control of your computer using
the Telnet protocol. The truth is that a malicious program can install a Telnet server
without you ever knowing about it.
Luckily, only one server can control any Internet port on your system (Telnet uses port 23).
That means that when the Imaginary Telnet Server is nstalled on your system and configured
to run every time your system boots, one of two things will happen:
If another Telnet server has snuck on to your system, the Imaginary Telnet System
will be unable to control its port and will pop up a message stating so.
Otherwise, the Imaginary Telnet Server will run quietly in the background diverting
any Telnet attacks on your system. If another Telnet server sneaks up on your system, it
will not be able to take control of port 23 because the Imaginary Telnet Server will be
holding its reins.
Either way, you are protected from attacks on your Telnet port.
Simply download the server, unzip it and double click on the setup program. It will
install the Imaginary Telnet Server and start running it. It will continue running until
you shut down your system. Whenever you restart the system, the Imaginary Telnet Server will
restart as well.
If you want to remove it (for example, if you want to run a real Telnet server—though
that is not a good idea on a Windows system—just uninstall it. If you want to stop
it temporarily, just press ctl-alt-delete, select Processes, click on
imatel.exe and then on End Process. That will stop the Imaginary Web
Server until the next time you boot your system or until you double click on its icon.