what is the diffrence betwwen telnet and ssh.this question
is asked by nikhil and i am plasing the answer here insteed
of his personal mail.
Answers were Sorted based on User's Feedback
Answer / jitu
SSH stands for secure shell. It looks like telnet.
The main difference between SSH and Telnet is that SSH
transparently encrypts the data between the client and the
server.
When you telnet to a router/switch/firewall/etc then it
say, type your password, every keypress of your password is
transfred across the Internet to our server in cleartext.
This means that if some person on one of the routers
through which the information passes sniffed the packets
then they'had suddenly know your password, letter for
letter!
With SSH, the information is encrypted. So when you type
your password, each letter is "scrambled" before it's sent
over the Internet, and decoded at the other end. The
encryption method is such that, if someone in between the
servers stumbled upon the information, they'd just see a
jumbled noise.
As you might imagine, this increases your security
significantly.
By default, SSH uses port 22 and telnet uses port 23
| Is This Answer Correct ? | 9 Yes | 0 No |
Answer / sweta singh
ton of thanks to you for that brilliant answer because i was searching for that answer i read it from tenon bom and frozen but didn't get what they want to say.
sweta Singh
b.tech 3rd yr
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / nikhil maggu
Jeetu u missed 1 thing which u told me that day..
SSH uses 3-way handshaking, whereas telnet uses simple snmp
for communicating
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jm
telnet is a remote management protocol
ssh is the same but secure
SSH sends your login and password (and everything else)
converted into secret code that gets unencoded at the other
end. That way anyone that is sniffing one of the systems
involved cannot see and steal your password.
However, because SSH is encrypted it is not appropriate for
some uses. Where speed is needed, or over really bad slow
connections, or when a raw connection is needed. For
example, system administrators often use telnet to
troubleshoot other services such as webserver or email
because they can see exactly what is and is not getting sent
and received.
Also telnet is easier to include into other programs so in
cases where security is not a big deal, telnet will often be
used. Such as online games.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
How can you measure out exactly 4 litres of water from a tap using a 3 litre and a 5 litre bucket?
Which statement about the data link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in a Frame Relay network B. It is a signaling standard between the CIDE device and the Frame Relay switch C. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay Cloud D. It is the Maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the Committed Information Rate (CIP)
How much internal and external ad of eigrp protocol?
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
What is 10baset ethernet lans?
What is difference between rip and ripv2?
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
What is the function of application layer in networking?
I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem