From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
WikiProject Computing / Networking (Rated C-class, High-importance)
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as High-importance).


Telnet DOES support encryption. But it has to be negotiated for, and is not on by default (and not all clients and servers support it). But see, for example, and

OMG TEH HAZ0RZ!!!11[edit]

Isn't telnet a common hacking tool now-a-days? I know there a lot of hacking techniques that require it.

Royaljared 13:16, 19 August 2007 (UTC)

Well, it is in the same sense that a keyboard is a "common hacking tool"--telnet is such a basic network tool that anyone who does anything slightly complicated with computer networking needs it, whether they're "hacking" or not. There's nothing particularly malicious about it.—Chowbok 17:00, 10 October 2007 (UTC)

00000000000000000000000000000000000000000000000000000000000000 — Preceding unsigned comment added by (talk) 16:11, 15 July 2011 (UTC)


try it (talk) 23:38, 8 November 2011 (UTC)

I know this is Grave-digging this post but maybe we want to consider adding a few interesting (but also useful Telnet Ip's such as the one above into the article to show what telnet is used for these days.) **note!** I am happy to add/do this myself but wanted to ask if this would be relevant! Thanks Jthekid15 (talk) 11:38, 16 January 2015 (UTC)


I'm perfectly comfortable with the RFC's at the bottom of the article. Telnet was defined by RFC's and revised through RFC's. I think the two warning should be removed. — Preceding unsigned comment added by Gggustafson (talkcontribs) 21:34, 12 May 2015 (UTC)


There's an incomplete sentence in the introduction. I'd fix it but I don't know what it's supposed to say.

"Most network equipment and operating systems with a configuration (including systems based on Windows NT)."

FalsePockets (talk) 01:20, 26 November 2015 (UTC)