Security Concerns When Using Telnet and FTP


Users of telnet, rlogin, ftp, and other connectivity programs may not realize that their password and data is transmitted across the network unencrypted and can be intercepted by hackers.

Use of these "clear text" protocols is therefore strongly discouraged. The use of the secure shell protocol ("SSH"), which encrypts transmitted data including user IDs and passwords is recommended.

More information about SSH is available in the Safe Computing for Students and Safe Computing for Faculty and Staff sections.


Request Help Print Article


Article ID: 64
Tue 7/18/23 1:08 PM
Fri 3/29/24 10:04 AM

Related Articles (1)

Portable devices include laptop computers, tablets, smartphones, personal digital assistants, USB (flash) drives, and CDs. These devices are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.

Related Services / Offerings (1)

SECURE COMPUTING The University of Pittsburgh has a robust series of security controls to protect from threats including Enterprise Spam and Virus Filter with Exchange Online Protection and Microsoft Defender for Endpoint.