ssh protocol
SSH is more secure than Telnet.
ssh
FTP and Telnet are similar in that they are defined as OSI layer 7 (application) protocols. They are different in that they use different ports for sending and receiving messages and are used for different purposes. FTP is used to sending and receiving files across a network. Telnet is used to send commands remotely to another network device.
Use of SSH or VTY ACLs.
If you want better security, use secure shell (ssh) instead of telnet. Actually, don't use telnet at all if possible, as it transmits all information in plain text.
rsh and ssh are similar in that they can execute commands on remote systems. The main difference between the two (besides the actual TCP ports) is that rsh traffic is not encrypted and therefore a security risk; ssh traffic is encrypted. The other main difference is that ssh is a secure replacement for telnet, whereas rsh can log into a remote system using the rlogin protocol, which is similar but not the same as telnet.
putty is an application program; Unix is an operating system (they aren't the same thing). putty is a secure telnet replacement using ssh to encrypt the data transmission flow.
Telnet is non secure, travel data in open form you can easily theft/capture data, ssh is secure transmission of data over network, telnet is little bit faster than SSH, because it is not encrypting data, SSh is little slower than telnet because encrypt data when transmitting over network
One disadvantage of telnet is that it is not secure, meaning people can read your passwords and other sensitive information. It is outdated and has no colors. It is fairly hard to use.
A telnet program is essentialy a remote terminal application, used to connect to a remote computer and interact with it in text mode (command line) only. It operates over a TCP/IP network, and uses TCP port 23. The telnet conversation is completely open, not encrypted in any way, starting from the logon (username/password entry), and therefore should be avoided on untrusted networks, where it can be easily sniffed ("overheard" by anybody that analyzes the network traffic). A secure alternative to telnet is called ssh (secure shell).
Yes, you can, but this is a very dangerous thing to do. Firstly, telnet is an insecure protocol, and anyone with a packet sniffer can find out your root password. Secondly, one should really never log in as the root account; use su or sudo after logging in as an ordinary user using a more secure protocol such as ssh. There are some settings in some versions of telnet that may prevent root logins, but the standard telnet will allow that.