What is Telnet? Definition from SearchNetworking (2024)

What is Telnet? Definition from SearchNetworking (1)

By

  • Laura Fitzgibbons

What is Telnet?

Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines.

It follows a user command TCP/IP networking protocol that creates remote sessions. On the web, HTTP and File Transfer Protocol (FTP) enable users to request specific files from remote computers. With Telnet, users can log on as a regular user with privileges that allow them to access the specific applications and data on that computer.

An abstract example of the syntax for a Telnet command request is as follows:

telnet the.libraryat.whatis.edu

The result of this request would be an invitation to log on with a user ID, and the program would prompt the user for a password. If the computer accepts the user, it grants them access to the remote host.

Program developers and anyone who needs to use specific applications or data located at a remote machines are more likely to use Telnet.

How Telnet works

Telnet is a type of client-server protocol that opens a command line on a remote computer, typically a server. Users can use this tool to ping a port and find out if it's open.

Telnet works with a virtual terminal connection emulator, which is an abstract instance of a connection to a computer, and uses standard protocols to act like a physical terminal connected to a machine. Telnet also sometimes uses FTP to help users send data files.

Users connect remotely to a machine with Telnet. This is sometimes referred to as Telnetting into the system. Telnet prompts users to enter their usernames and passwords to access the remote computer, which enables command lines to run as if users are logged in to the computers in person. A user's IP address matches the computer they're logged in to rather than the one physically used to connect.

Uses of Telnet

Users employ Telnet for a variety of activities on a server, such as to edit files, run various programs and check email.

Some servers use Telnet to enable remote connections to access public data and play games or look up weather reports. These features exist for nostalgic fun or because they have compatibility with older systems that need access to specific data.

Users are also able to connect to any software that uses text-based, unencrypted protocols via Telnet, from web servers to ports. Users can open a command prompt on the remote machine, type the command telnet and the remote machine's name or IP address, and the Telnet connection pings the port to see if it's open. An open port shows a blank screen, while an error message that says the port is connecting means the port is closed.

Telnet security

Telnet is neither encrypted nor secure. Because Telnet monitors a user's connection, anyone can access a person's username, password and other private information typed over the Telnet session in plaintext. A bad actor can use this information to gain access to a user's device.

SSH and related protocols

Some modern systems enable only command-line connections using Secure Shell (SSH), an encrypted tool similar to Telnet, or through a virtual private network. Because of security concerns, many professional organizations require the use of secure options, like SSH or PuTTy, instead of Telnet. SSH is the most commonly used alternative, largely because it encrypts all the traffic that passes over the communication channel.

Also, unlike newer protocols, Telnet doesn't support graphical user interfaces. This means Telnet isn't compatible with many modern programs, such as spreadsheets, web browsers and word processors. These programs run complex graphical interfaces, so Telnet session connections typically lose large amounts of data -- especially visual data.

History of Telnet

Telnet originally ran over Network Control Program protocols. It was later called Teletype Over Network Protocol. Network professionals informally used Telnet for some time before it was officially established on March 5, 1973, in published papers.

In early forms, Telnet used American Standard Code for Information Interchange delivered over an 8-bit channel to enable remote computers to communicate with basic text. Over time, several Telnet extensions were created. Telnet has been around as a tool for programmers for several decades.

The first version of Telnet was created for the Advanced Research Projects Agency Network, the precursor to the modern internet, in the 1960s. It was one of the first tools created to link computers remotely over large distances. Researchers and professionals developed a Telnet protocol in 1971 followed by the Telnet system in 1983.

Editor's note: This article was reformatted to improve the reader experience.

This was last updated in December 2023

Continue Reading About Telnet

  • SSH best practices to protect networks from attacks
  • The top SSH risks and how regular assessments cut danger
  • Common network protocols and their functions explained
  • Ultimate guide to secure remote access

Related Terms

What is a personal area network (PAN)?
A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few ...Seecompletedefinition
What is a unique identifier (UID)?
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.Seecompletedefinition
What is asynchronous?
In general, asynchronous -- from Greek asyn- ('not with/together') and chronos ('time') -- describes objects or events not ...Seecompletedefinition

Dig Deeper on Network infrastructure

  • What is SSH (Secure Shell) and How Does It Work?By: AlexanderGillis
  • How to use PuTTY for SSH key-based authenticationBy: DamonGarn
  • 5 techniques to debug network issues in Linux and WindowsBy: DamonGarn
  • HyperTerminalBy: BrienPosey
What is Telnet? Definition from SearchNetworking (2024)
Top Articles
DSP Multicap Fund Direct Growth - NAV, Mutual Fund Performance & Portfolio
Patch Windows Graphics Component Vulnerability (CVE-2023-21823)
Truist Bank Near Here
Here are all the MTV VMA winners, even the awards they announced during the ads
25X11X10 Atv Tires Tractor Supply
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Autobell Car Wash Hickory Reviews
Erskine Plus Portal
Mlifeinsider Okta
Craigslist/Phx
Mlb Ballpark Pal
People Portal Loma Linda
The Witcher 3 Wild Hunt: Map of important locations M19
Straight Talk Phones With 7 Inch Screen
Diamond Piers Menards
Osborn-Checkliste: Ideen finden mit System
How To Level Up Roc Rlcraft
Loft Stores Near Me
Homeaccess.stopandshop
Www.patientnotebook/Atic
Bellin Patient Portal
What Is a Yurt Tent?
Effingham Daily News Police Report
3 Ways to Drive Employee Engagement with Recognition Programs | UKG
2004 Honda Odyssey Firing Order
Www.1Tamilmv.con
Lininii
Mercedes W204 Belt Diagram
Prévisions météo Paris à 15 jours - 1er site météo pour l'île-de-France
Why Are The French So Google Feud Answers
Ff14 Laws Order
Slv Fed Routing Number
Jay Gould co*ck
Solve 100000div3= | Microsoft Math Solver
Tributes flow for Soundgarden singer Chris Cornell as cause of death revealed
Giantess Feet Deviantart
R&J Travel And Tours Calendar
The Complete Guide To The Infamous "imskirby Incident"
Mydocbill.com/Mr
Planet Fitness Lebanon Nh
Dadeclerk
Google Flights Orlando
“To be able to” and “to be allowed to” – Ersatzformen von “can” | sofatutor.com
Ezpawn Online Payment
Gotrax Scooter Error Code E2
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
Craigslist Rooms For Rent In San Fernando Valley
Hillsborough County Florida Recorder Of Deeds
York Racecourse | Racecourses.net
Mikayla Campinos Alive Or Dead
Ingersoll Greenwood Funeral Home Obituaries
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6455

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.