what is the diffrence betwwen telnet and ssh.this question
is asked by nikhil and i am plasing the answer here insteed
of his personal mail.
Answers were Sorted based on User's Feedback
Answer / jitu
SSH stands for secure shell. It looks like telnet.
The main difference between SSH and Telnet is that SSH
transparently encrypts the data between the client and the
server.
When you telnet to a router/switch/firewall/etc then it
say, type your password, every keypress of your password is
transfred across the Internet to our server in cleartext.
This means that if some person on one of the routers
through which the information passes sniffed the packets
then they'had suddenly know your password, letter for
letter!
With SSH, the information is encrypted. So when you type
your password, each letter is "scrambled" before it's sent
over the Internet, and decoded at the other end. The
encryption method is such that, if someone in between the
servers stumbled upon the information, they'd just see a
jumbled noise.
As you might imagine, this increases your security
significantly.
By default, SSH uses port 22 and telnet uses port 23
Is This Answer Correct ? | 9 Yes | 0 No |
Answer / sweta singh
ton of thanks to you for that brilliant answer because i was searching for that answer i read it from tenon bom and frozen but didn't get what they want to say.
sweta Singh
b.tech 3rd yr
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / nikhil maggu
Jeetu u missed 1 thing which u told me that day..
SSH uses 3-way handshaking, whereas telnet uses simple snmp
for communicating
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jm
telnet is a remote management protocol
ssh is the same but secure
SSH sends your login and password (and everything else)
converted into secret code that gets unencoded at the other
end. That way anyone that is sniffing one of the systems
involved cannot see and steal your password.
However, because SSH is encrypted it is not appropriate for
some uses. Where speed is needed, or over really bad slow
connections, or when a raw connection is needed. For
example, system administrators often use telnet to
troubleshoot other services such as webserver or email
because they can see exactly what is and is not getting sent
and received.
Also telnet is easier to include into other programs so in
cases where security is not a big deal, telnet will often be
used. Such as online games.
Is This Answer Correct ? | 0 Yes | 0 No |
What is the difference between switch and hub?
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classfull address, no subnets C.) Enable CDP so neighbors can be detected D.) Same autonomous network
What are the generic parts of a network layer address? A. an intenetworks number and a URL B. a vendor code and a serial number C. a network number and a host number D. a broadcast number and a unicast number E. a domain identifier and a device identifier
What is ping utility?
HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?
What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network
What’s the default CDP holdtime in seconds for Cisco routers?
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology
7 Answers Tech Mahindra, Wipro,
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Identify the command that displays traffic statistics on serial0/1? A.) display interface serial0/1 B.) show interface serial0/1 C.) show seria0/1 stats D.) show interface serial0/1 stats
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface