[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] ... FINGER Introduction This note describes the Name/Finger protocol. ... Finger programs at several network ...
Missing: sca_esv= 01af4ce885a5a2f8 Sca_esv 09379ecd0b6efd91
People also ask
What is the finger command in computer network?
The finger command may also be used to look up users on a remote system. The format is to specify the user as User@Host. If you omit the user name, the finger command provides the standard format listing on the remote system.
What is finger daemon?
The fingerd daemon returns information about the users currently logged in to a specified remote host. If you execute the finger command specifying a user at a particular host, you will obtain specific information about that user. The FINGER Protocol must be present at the remote host and at the requesting host.
Where did the finger command come from?
The finger program was written in 1971 by Les Earnest who created the program to solve the need of users who wanted information on other users of the network. Information on who is logged in was useful to check the availability of a person to meet.
What is the finger network utility?
You use finger to find out information about other users on your network, seeing if they are logged in or if they have received mail. host displays address information about a system on your network, giving you a system's IP and domain name addresses.
In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented ...
Missing: sca_esv= 01af4ce885a5a2f8 Sca_esv 09379ecd0b6efd91