Terminal Access Controller Access-Control System (TACACS) is client that provides an access control to network entities such as routers and network access servers. Users can log in to the entities as if they were hosts. Typically TACACS uses TCP/UDP ports 49, 65.
talk is a Unix text chat program. It originally allowed messaging only between the users logged on to one multi-user computer, but later was extended to allow chat to users on other systems.
Target Communication Framework (TCF) is a vendor-neutral, lightweight, extensible network protocol used mainly for communicating with embedded systems (targets). Its most distinguishing feature is that TCF is designed to transparently plug in value-adding servers between the tool and the target. Without value-add, the protocol can unify many currently independent communication links, thus saving resources and making setup and configuration much easier than in current embedded development scenarios.
tcp-over-dns contains a special dns server and a special dns client. The client and server work in tandem to provide a TCP tunnel through the standard DNS protocol.
The Replication Services for David enable a replication of the contents of any archives that are stored on different David Servers. David (from Tobit Software) os a mail access server that also provides other services, such as: fax, voice and document management.
TeamSound is a voice conferencing software for online game players. It can operate as a dedicated or non-dedicated peer-to-peer voice communication system, geared for use in multiplayer, networked Internet games.
TeamSpeak software is an Internet based conferencing solution that enables users to speak with one another over the Internet. The software is based on client-server architecture and is firewall and router friendly.
TeamViewer is a computer software package for remote control, desktop sharing, and file transfer between computers. The software operates with the Microsoft Windows, Mac OS X Linux, iOS and Android operating systems.
Cisco TelePresence Control protocol is used for the audio and HD video interactive conferencing of the telepresence device. The communication is done over the Internet. The control protocol includes control packets over SIP and RTCP protocols, and works simultaneously with Cisco telepresence media protocol.
Cisco TelePresence media protocol is used for the audio and HD video interactive conferencing of the telepresence device. The communication is done over the internet. The protocol consists only data packets, and works simultaneously with cisco telepresence control protocol.
Telnet is a cross-platform interactive text-based protocol used to connect remote clients over a TCP/IP network. The telnet client connects to a host and becomes a Network Virtual Terminal (NVT) allowing the user to communicate remotely with the host. Typically, the protocol uses TCP port 23.
Teredo is a tunneling protocol designed to grant IPv6 connectivity to nodes that are located behind IPv6-unaware NAT devices. It defines a way of encapsulating IPv6 packets within IPv4 UDP datagrams that can be routed through NAT devices and on the IPv4 internet.
Trivial File Transfer Protocol (TFTP) is a file transfer protocol, with the functionality of a very basic form of FTP. It is useful for booting computers such as routers which do not have any data storage devices.
The Network Time Protocol (NTP) is a protocol used to get the accurate time and date from designated time servers. The protocol works on TCP and UDP, typically on port 37.
A time server is a server computer that reads the actual time from a reference clock and distributes this information to its clients using a computer network. The time server may be a local network time server or an Internet time server.
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encrypt the segments of network connections at the Application Layer for the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity.
Tor (The Onion Router) is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis. The software is "free-software" and the network is free of charge to use.
The trinoo or trin00 is a set of computer programs to conduct a DDoS attack. It is believed that trinoo networks has been set up on thousands of systems on the Internet that have been compromised by remote buffer overrun exploits.
Tunnel HTTP represents the granular protocols that are tunneled over HTTP.
Reference
Global ID
L7:435
ID
739
Known Mappings
UDP Port
-
TCP Port
-
IP Protocol
-
IP Version
IPv4 Support
Yes
IPv6 Support
Yes
Application Group
other
Category
internet-privacy
Sub Category
tunneling-protocols
P2P Technology
No
Encrypted
No
Tunnel
Yes
Underlying Protocols
http
TWITTER
Name/CLI Keyword
twitter
Full Name
Twitter
Description
Twitter is an online social networking service and microblogging service that enables its users to send and read text-based posts of up to 140 characters, known as tweets. It was created in March 2006 by Jack Dorsey and launched that July. The service rapidly gained worldwide popularity, with over 140 million active users as of 2012, generating over 340 millions tweets daily and handling over 1.6 billion search queries per day. It has been described as the SMS of the Internet.