What is the difference between Telnet and SSH?
Answers were Sorted based on User's Feedback
ssh is a secured shell, where telnet is not a secured
one.when you ssh to trasnfer data between a system, the data
will be send in the encrypted form, where the hacker cannot
encode or decode it. While you telnet,the data send between
the system is alphabetical format(ASCII), where every one
can understand. More over as per network security, telnet
and ftp are prohibited. Always, trust SSL based data transfer.
Is This Answer Correct ? | 151 Yes | 5 No |
Answer / neha sharan
Telnet ->
Its just getting (Telenet) a connection to the server.
Its not more secure. Anybody can use it.
It can be easly hacked.It can be easily read by anybody in
that network
SSH -> secured shocket shell
Its more secure than Telnet .
This has an encrption and decrption of the data /usr/pwd
None can hack this. It is the good way to transfer the data
Is This Answer Correct ? | 47 Yes | 5 No |
Telnet:- Telent is a service, which works on Port 23.
Telnet and FTP both we use to access the Server or
Transferred the between Server to Server and Client to
Server. But Telnet is not secure because at Time Data
Transferred, The data Transferred in ASCII form, any Hacker
can read it and Understand easily. But as per Network
Security its Prohibited.
SSH:- As per Name SSH is Secure Shell. SSH works on port
22. SSH is the new resarch on FTP and Telnet. Purpose of
SSH is same as TELNET & FTP. But in SSH data transferred in
Encrypted mode. Encrypted means no body can ENCODE &
DECODE. If any Hacker try to hack the Data at time data
transferred through SSH, cannot ENCODE and DECODE due to
the Encryption Advantage of SSH Services.
Is This Answer Correct ? | 34 Yes | 1 No |
Answer / aakash mishra
ssh is a secure way for transfering data where a hacker can
not read your data bcoz of being in incrypted form.
Telnet is not a secure way bcoz it used ASCII format which
is easily to understand.
so be alert while using the TELNET and fell free while ssh.
Is This Answer Correct ? | 23 Yes | 6 No |
Answer / srinivas
Both are RDP's for remote Log-In's.In Telnet it will be in
Clear text format where as in SSH it will be in Encrypted
format.
Is This Answer Correct ? | 16 Yes | 5 No |
Answer / kiruba
telnet not secure.But ssh secure.SSH using PORT 22 and
telnet using Port 23.
Is This Answer Correct ? | 16 Yes | 5 No |
Answer / nishant mendhe
telnet is works on 23 n ssh is works on 22.
telnet is no secure n ssh is secure.
telnet is uses unencrypted connection n ssh is secure b'coz
(passwd).
Is This Answer Correct ? | 9 Yes | 1 No |
Answer / manoj
ssh is secure shell is providing encryption rule need
authentication. with paired keys to encryp or decrypt the
data. Also we can securely communicate or transfer file
with each other over network by copying private & public
keys with rsa & dsa.
Telnet is not secure it doesnt provide encryption rule
usually not demanding username & password..
Is This Answer Correct ? | 7 Yes | 3 No |
Answer / mcmarc
both are services to connect two m/c
telnet is unsecure as it uses unencrypted connection
whereas ssh is secure as it uses encrypted connection, so
people cannot sniff ur password, etc
Is This Answer Correct ? | 8 Yes | 5 No |
Answer / vijay
SSH is a secured shocket shell where telnet is not a
secured one.
SSH using PORT 22 and telnet using Port 23.
when you ssh to trasnfer data between a system, the data
will be send in the encrypted form.
In telnet,the data send between
the system is alphabetical format(ASCII).
Is This Answer Correct ? | 7 Yes | 5 No |
What is the difference between an argument and an option/switch?
1. User gaves df -h and the system get hanged. why ? 2. what is the hardlink and softlink mount ? 3. why is portmape should be started ? 4. what is nologin option 5. how to restrict users from accessing nfs ? 6. what is the difference between cpio and tar 7. what are the kernel parameters ? how to find out it ? 8. why we use sysctl.conf ? 9. if we gives init1 from multiuser runlevel, will it affect other users who already logged in to the system ? 10. what will be the available space to use after configuering raid5 with 5 disks each having 5gb spce ?
What is LILO?
rpm package installation error in centos 6.4 [root@localhost packages6.4]# rpm -ivh nfs-utils-1.2.3-36.el6.i686.rpm warning: nfs-utils-1.2.3-36.el6.i686.rpm: Header V3 RSA/SHA1 Signature, key ID c105b9de: NOKEY error: Failed dependencies: keyutils >= 1.4-4 is needed by nfs-utils-1:1.2.3-36.el6.i686 libevent is needed by nfs-utils-1:1.2.3-36.el6.i686 libevent-1.4.so.2 is needed by nfs-utils-1:1.2.3-36.el6.i686 libgssglue is needed by nfs-utils-1:1.2.3-36.el6.i686 libgssglue.so.1 is needed by nfs-utils-1:1.2.3-36.el6.i686 libgssglue.so.1(libgssapi_CITI_2) is needed by nfs-utils-1:1.2.3-36.el6.i686 libnfsidmap.so.0 is needed by nfs-utils-1:1.2.3-36.el6.i686 libtirpc is needed by nfs-utils-1:1.2.3-36.el6.i686 libtirpc.so.1 is needed by nfs-utils-1:1.2.3-36.el6.i686 nfs-utils-lib >= 1.1.0-3 is needed by nfs-utils-1:1.2.3-36.el6.i686 rpcbind is needed by nfs-utils-1:1.2.3-36.el6.i686
In Linux(RHEL) server have two users with same name. one is local user and second one is NIS user. if you login the server which user will login (local or NIS)
what are the default permissions for files and folders..?
Who owns the data dictionary?
How to catagories tickets in RHEL, which tickets are belong to PROBLEM, INCIDENT and CHANGE management? please given to me with examples
what is the difference betweenh the NFS and FTP?
What is the difference between Telnet and SSH?
My root password has been changed, how can i enter into the system without root password?
How do i check which nfs version I am using ????????