Home » Hosting Encyclopedia » Web Terms » Telnet

Telnet

The Telnet protocol is a standard used on local area networks or on the Internet to provide users with access to a remote system via TCP/IP. The connection is via terminal (console) but has several disadvantages such as no encryption of the connection by default meaning that any data send or received via telnet protocol can be intercepted by a malicious user and also there are no authentication methods for most of the implementations used in the Telnet protocol. Telnet was developed back in 1969 so it was mainly used in private academic or government networks. Due to the fact that the Internet did not exist yet, those security holes didn’t matter back then. Today the use of the Telnet protocol is rare because the Secure Shell (SSH protocol) is a more reliable alternative.

Telnet/SSH Clients

If you have a VPS or semi-dedicated server then in order to access and administrate your server as root then you will need an SSH or Telnet client. We recommend PuTTY as it is free open-source SSH and Telnet client with many features and tools to help you customize your web server the way you want. If you are new to web hosting you may want to check our free web hosting plan to get started with creating your first website.

SSH protocol and its Purpose

The SSH protocol is an advanced networking protocol used for the encrypted transmission of data and a replacement of the Telnet protocol when a remote connection over the Internet is required. By using SSH you can remotely administrate any computer or server with SSH client installed on it and just like the Telnet it is done via console in text mode. However, this time all sent or received data, including passwords, are encrypted. The SSH protocol is also used for tunneling or port forwarding which means that it can be used as a VPN alternative. In this case, an unsecured TCP/IP connection is redirected to the SSH client that redirects the connection to the end client. The redirected connection is encrypted. SSH can also be combined with SFTP as an alternative of the regular FTP connection if you need to use an encrypted protocol to transfer FTP data to your web server.

Was this article useful?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Newest Articles:

KVM

What you need to know: KVM (Kernel-based Virtual Machine) is a virtualization technology that is free, open-source, and available in most modern Linux distributions. Thanks to it, you can create and run Linux and Windows-based virtual machines that are independent of...

Second Level Domain (SLD)

The Second Level Domain or SLD is essential to the hierarchical Domain Name System. It is the second part of the full domain name after the Top Level Domain, on its left side. The Second Level Domain is often the same as the website name, the company, or the...

Top-Level Domain (TLD)

The Top Level Domain name (TLD) is the last or right-most fragment of the domain name. The parts of the domain name are separated with dots and form their own hierarchy in the Domain Name System (DNS). There is a Top-Leveл Domain list where you can see all available...

IANA

What is IANA? Although the Internet is not really a centralized system, there are some key infrastructure elements that need to be coordinated. The Internet Assigned Numbers Authority (IANA) is an organization that was founded in 1988 by the government of the U.S.A....

ICANN

What is ICANN? ICANN is an abbreviation from Internet Corporation for Assigned Names and Numbers. It is the non-profit organization that’s responsible for the assignment and coordination of unique Internet addresses and names for all devices connected to the Internet,...

Ready to Create Your Website?