What is the difference between Telnet and SSH?
Answers were Sorted based on User's Feedback
ssh is a secured shell, where telnet is not a secured
one.when you ssh to trasnfer data between a system, the data
will be send in the encrypted form, where the hacker cannot
encode or decode it. While you telnet,the data send between
the system is alphabetical format(ASCII), where every one
can understand. More over as per network security, telnet
and ftp are prohibited. Always, trust SSL based data transfer.
| Is This Answer Correct ? | 151 Yes | 5 No |
Answer / neha sharan
Telnet ->
Its just getting (Telenet) a connection to the server.
Its not more secure. Anybody can use it.
It can be easly hacked.It can be easily read by anybody in
that network
SSH -> secured shocket shell
Its more secure than Telnet .
This has an encrption and decrption of the data /usr/pwd
None can hack this. It is the good way to transfer the data
| Is This Answer Correct ? | 47 Yes | 5 No |
Telnet:- Telent is a service, which works on Port 23.
Telnet and FTP both we use to access the Server or
Transferred the between Server to Server and Client to
Server. But Telnet is not secure because at Time Data
Transferred, The data Transferred in ASCII form, any Hacker
can read it and Understand easily. But as per Network
Security its Prohibited.
SSH:- As per Name SSH is Secure Shell. SSH works on port
22. SSH is the new resarch on FTP and Telnet. Purpose of
SSH is same as TELNET & FTP. But in SSH data transferred in
Encrypted mode. Encrypted means no body can ENCODE &
DECODE. If any Hacker try to hack the Data at time data
transferred through SSH, cannot ENCODE and DECODE due to
the Encryption Advantage of SSH Services.
| Is This Answer Correct ? | 34 Yes | 1 No |
Answer / aakash mishra
ssh is a secure way for transfering data where a hacker can
not read your data bcoz of being in incrypted form.
Telnet is not a secure way bcoz it used ASCII format which
is easily to understand.
so be alert while using the TELNET and fell free while ssh.
| Is This Answer Correct ? | 23 Yes | 6 No |
Answer / srinivas
Both are RDP's for remote Log-In's.In Telnet it will be in
Clear text format where as in SSH it will be in Encrypted
format.
| Is This Answer Correct ? | 16 Yes | 5 No |
Answer / kiruba
telnet not secure.But ssh secure.SSH using PORT 22 and
telnet using Port 23.
| Is This Answer Correct ? | 16 Yes | 5 No |
Answer / nishant mendhe
telnet is works on 23 n ssh is works on 22.
telnet is no secure n ssh is secure.
telnet is uses unencrypted connection n ssh is secure b'coz
(passwd).
| Is This Answer Correct ? | 9 Yes | 1 No |
Answer / manoj
ssh is secure shell is providing encryption rule need
authentication. with paired keys to encryp or decrypt the
data. Also we can securely communicate or transfer file
with each other over network by copying private & public
keys with rsa & dsa.
Telnet is not secure it doesnt provide encryption rule
usually not demanding username & password..
| Is This Answer Correct ? | 7 Yes | 3 No |
Answer / mcmarc
both are services to connect two m/c
telnet is unsecure as it uses unencrypted connection
whereas ssh is secure as it uses encrypted connection, so
people cannot sniff ur password, etc
| Is This Answer Correct ? | 8 Yes | 5 No |
Answer / vijay
SSH is a secured shocket shell where telnet is not a
secured one.
SSH using PORT 22 and telnet using Port 23.
when you ssh to trasnfer data between a system, the data
will be send in the encrypted form.
In telnet,the data send between
the system is alphabetical format(ASCII).
| Is This Answer Correct ? | 7 Yes | 5 No |
1. User gaves df -h and the system get hanged. why ? 2. what is the hardlink and softlink mount ? 3. why is portmape should be started ? 4. what is nologin option 5. how to restrict users from accessing nfs ? 6. what is the difference between cpio and tar 7. what are the kernel parameters ? how to find out it ? 8. why we use sysctl.conf ? 9. if we gives init1 from multiuser runlevel, will it affect other users who already logged in to the system ? 10. what will be the available space to use after configuering raid5 with 5 disks each having 5gb spce ?
What is LILO?
How to know what are the packages required for any service? Example: How to know what are the package required for send mail services. using any command it is passable are not?
Why is it suggested to disable journalism in ext4 filesystem?
How can i recover the linux system after it was crashed by step by step process..
This question is belong to linux support. "one of my customer told to me, my application is getting slow response". how to resolve the issue. what are the steps you will follow to resolve the issue.
What is Hard mount and soft Mount?
how to recollect root password
what is the difference between fork and thread ? and parent and child process in fork system call?
what is the difference between semaphore, mutex & spinlock?????
My Linux server in the two lan card one lan card is ok working but second lan card after restart daily lan card deactivate and then manual activate then properly working but after restart repeat this problem.(Fedora O.S.) Pls tell me solved this problem.
Who owns the data dictionary?