Your browser does not allow storing cookies. We recommend enabling them.

Previous | Contents | Index | Next

Index

-4: Section 3.8.3.17
-6: Section 3.8.3.17
Abort Output, Telnet special command: Section 3.1.3.2
Abort Process, Telnet special command: Section 3.1.3.2
accented characters: Section 3.3, Section 4.4.7
accessibility: Section 4.9.4
access to files, changing: Section 6.2.14
account name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
account name, for auto-login: Section 4.14.1
account name, for proxy: Section 4.15.4
account name, local, in Rlogin: Section 4.17.1
account name, local, in Windows: Section 4.17.1
account names, different: Section 2.3, Section 4.22.7
ACL, process (Windows): Section 3.8.3.25
-A command-line option: Section 3.8.3.10
-a command-line option: Section 3.8.3.10
active Telnet negotiation: Section 4.16.2
address, IP: Section 3.5, Section 4.1.1, Section 4.13.4
ad-hoc proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
adjusting a selection: Section 3.1.1, Section 4.11.2
Advanced Encryption Standard: Section 4.21
AES: Section 4.21
-agent: Section 3.8.3.9
agent, authentication: Section 8.1, Chapter 9
agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
algorithm, encryption: Section 4.21
algorithm, key exchange: Section 4.19.1
algorithm, public-key: Section 8.1
allocation, of pseudo-terminal: Section 3.8.3.12, Section 4.24.1
alternate screen: Section 4.6.4, Section 4.7.4, Question A.7.19
ALT-F4: Section 4.9.3
‘AltGr’ key: Section 4.4.7, Section 4.4.8
‘Alt’ key: Section 4.9.5
ALT-Space: Section 4.9.4
always on top: Section 4.9.6
ANSI colours: Section 4.12.1, Section 4.12.6
ANSI graphics: Section 3.3, Section 4.10.4
ANSI printing: Section 4.3.10
answerback string: Section 4.3.7
Application Cursor Keys: Section 4.4.4, Section 4.6.1
Application key: Section 4.4.7
Application Keypad: Section 4.4.5, Section 4.6.1
Arabic: Section 4.6.11
Arabic text shaping: Section 4.6.10
Arcfour: Section 4.21, Section 10.4
Are You There, Telnet special command: Section 3.1.3.2
arguments, command-line: Section 3.8, Section 9.3
ASCII: Section 4.10.5, Question A.2.11
assertion failed: Section 10.7
asymmetric key algorithm: Section 8.1
authentication: Section 4.22
authentication agent: Section 8.1, Chapter 9
authentication agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
authentication, challenge/response: Section 4.22.4, Section 4.22.5
authentication, keyboard-interactive: Section 4.22.5
authentication, public key: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
authentication, to proxy: Section 4.15.4
authentication, X11: Section 4.25.1
authorized_keys file: Section 8.2.10, Section 8.3
AUTOEXEC.BAT: Section 5.1, Section 7.1
automated operations: Chapter 7
auto wrap mode: Section 4.3.1, Question A.7.9
background colour: Section 4.3.5, Question A.7.8
background colour, bright: Section 4.3.6
background colour, default: Section 4.12.5, Section 4.12.6
backspace, destructive: Section 4.6.8
backspace key: Section 4.4.1
bandwidth: Section 4.13.2, Section 4.14.4, Section 4.18.3
banner: Section 4.22.1
‘basic’ authentication (HTTP): Section 4.15.4
batch files: Section 4.29, Section 5.2.3, Section 7.3
-batch Plink command-line option: Section 7.2.3.1
-batch PSCP command-line option: Section 5.2.2.5
-batch PSFTP command-line option: Section 6.1.4
batch scripts in PSFTP: Section 6.1.1
baud rate, of terminal: Section 4.14.4
-bc PSFTP command-line option: Section 6.1.2
beep, terminal: Section 4.5
beep, with PC speaker: Section 4.5.1
bell, disabling: Section 4.5.1, Section 4.5.3
bell overload mode: Section 4.5.3
bell, terminal: Section 4.5
bell, visual: Section 4.5.1
-be PSFTP command-line option: Section 6.1.3
bidirectional text: Section 4.6.11
bind address: Section 3.5, Section 3.8.3.5, Section 4.26
BitchX: Section 4.6.9
8-bit colour: Section 4.12.4
64-bit Windows: Question A.7.25
black, bold: Section 4.12.3
blinking cursor: Section 4.8.1
blinking text: Section 4.3.6
Blowfish: Section 4.21
bold black: Section 4.12.3
bold text: Section 4.12.3, Section 4.12.5, Section 4.12.6
box-drawing characters: Section 3.3, Section 4.10.4
-b PSFTP command-line option: Section 6.1.1
Break, serial special command: Section 3.1.3.2
Break, SSH special command: Section 3.1.3.2
Break, Telnet special command: Section 3.1.3.2
bright black: Section 4.12.3
BSD: Section 4.16.1
bug reporting: Appendix B
bugs, in SSH servers: Section 4.27
bulletin board system: Section 1.1
cache, of SSH host keys: Section 2.2, Section 3.1.3.2, Section 3.8.3.19, Section 3.8.3.20, Section 4.13.5, Section 4.20, Section 4.20.2
Caps Lock: Section 4.10.3
Carriage Return: Section 4.3.3, Section 4.3.4
cat: Question A.7.15
-C command-line option: Section 3.8.3.15
ChaCha20-Poly1305: Section 4.21
challenge/response authentication: Section 4.22.4, Section 4.22.5
‘Change Settings’: Section 3.1.3.4
changing permissions on files: Section 6.2.14
changing user names: Section 2.3, Section 4.22.7
CHAP: Section 4.15.4
character classes: Section 4.11.5
characters, accented: Section 3.3, Section 4.4.7
character set: Section 3.3, Section 4.6.9, Section 4.10
characters, line-drawing: Section 3.3, Section 4.10.4
character width: Section 4.10.2
Chinese: Section 4.10.2
choosing a protocol: Section 1.2, Section 3.8.3.2
cipher algorithm: Section 4.21
Cisco: Section 3.8.3.6
CJK: Section 4.10.2
CJK ambiguous characters: Section 4.10.2
clean up after PuTTY: Question A.8.2
-cleanup command-line option: Section 3.8.2
clear screen: Section 4.3.5
‘Clear Scrollback’: Section 3.1.3.6
client: Section 1.1
clipboard: Section 3.1.1, Section 3.1.3.1, Section 3.1.3.5
Close button: Section 2.5, Section 4.9.2
closing window: Section 4.1.3, Section 4.9.2, Section 4.9.3
code page: Section 4.10.1
colour: Section 4.11.1, Section 4.12, Question A.7.3
colour, background, default: Section 4.12.5, Section 4.12.6
colour, 8-bit: Section 4.12.4
colour, foreground, default: Section 4.12.5, Section 4.12.6
256-colour mode: Section 4.12.2
colour, of cursor: Section 4.12.5, Section 4.12.6
colours, ANSI: Section 4.12.1, Section 4.12.6
colours, system: Section 4.12.5
columns, in terminal window: Section 4.7.1
COM1: Section 4.28.1
command-line arguments: Section 3.8, Section 9.3
command-line interface: Section 1.1
command line, loading saved sessions from: Section 3.8.3.1
-1 command-line option: Section 3.8.3.16
-2 command-line option: Section 3.8.3.16
Command Prompt: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
command, proxy: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
commands on the server: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
commands, reading from a file: Section 3.8.3.6
comment: Section 6.2
Compose key: Section 4.4.7
compression: Section 3.8.3.15, Section 4.18.3
confidentiality: Section 4.19.2
configuration: Section 3.8.3.22
configuration options: Chapter 4
connection, network: Section 3.5, Section 4.13, Section 4.26
connections, half-open: Section 4.13.3
connections, idle: Section 4.13.1, Question A.7.10
connections, interactive: Section 4.13.2, Section 4.24.1, Chapter 7
connectivity, breaks in: Section 4.13.1, Question A.7.11
CONNECT proxy (HTTP): Section 4.15.1
console window: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
context menu: Section 3.1.1, Section 3.1.3, Section 4.11.2
Control-?: Section 4.4.1
Control-H: Section 4.4.1
control sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.5, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 4.14.3, Section 7.2.1, Question A.5.1
cookie, magic: Section 4.25.1
coordinates, cursor: Section 4.3.2
Copy All to Clipboard: Section 3.1.3.5
copy and paste: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
copyright: Appendix C
corruption, of display: Section 4.6.10, Section 4.6.11
CP437: Section 4.10.1
CP866: Section 4.10.1
-c Pageant command-line option: Section 9.3.2
CRC: Section 10.12
CR (Carriage Return): Section 4.3.3, Section 4.3.4
creating directories: Section 6.2.16
creating key pairs: Section 8.2
credential delegation, GSSAPI: Section 4.23.1
CryptoCard authentication: Section 4.22.4
Ctrl-Break: Section 3.1.3.2
Ctrl-PgDn: Section 3.1.2
Ctrl-PgUp: Section 3.1.2
Ctrl, with right mouse button: Section 3.1.1
current working directory: Section 6.2.7, Section 6.2.8
cursor: Section 4.8.1
cursor, blinking: Section 4.8.1
cursor colour: Section 4.12.5, Section 4.12.6
cursor coordinates: Section 4.3.2
cursor keys, ‘Application’ mode: Section 4.4.4, Section 4.6.1
cut and paste: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
CVS: Section 7.4
CVS_RSH environment variable: Section 7.4
Cyrillic: Section 4.10.3
-D command-line option: Section 3.8.3.5
debugging Internet protocols: Section 3.6
DEC Compose key: Section 4.4.7
DEC Origin Mode: Section 4.3.2
DECterm: Question A.5.1
Default Beep sound, Windows: Section 4.5
Default Settings: Section 3.8.1, Section 4.1.2
delays, in SSH-2 sessions: Question A.7.23
delegation, of GSSAPI credentials: Section 4.23.1
deleting directories: Section 6.2.17
deleting files: Section 6.2.15
DES: Section 4.21, Section 10.4
destructive backspace: Section 4.6.8
development snapshots: Section B.2
diagnostic, proxy: Section 4.15.6
dialog box: Section 2.1
DiceWare: Section 8.2.7
differences between SSH, Telnet and Rlogin: Section 1.2
different user names: Section 2.3, Section 4.22.7
Diffie-Hellman group exchange: Section 4.19.1
Diffie-Hellman key exchange: Section 4.19.1
digital signature: Section 4.27.8, Section 8.1
Digital Signature Standard: Section 4.20.1, Section 4.20.1, Section 4.20.1, Section 8.1, Section 8.2.2, Question A.8.3
directories, creating: Section 6.2.16
directories, removing: Section 6.2.17
display corruption: Section 4.6.10, Section 4.6.11
DISPLAY environment variable: Section 3.4
DNS: Section 4.15.3
DNS name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
DNS resolution: Section 4.15.3
DNS, with proxy: Section 4.15.2, Section 4.15.3
Domain Name System: Section 4.15.3
double-click: Section 3.1.1, Section 4.11.5
double-width character: Section 4.10.2
downloading files: Section 5.2.1, Section 6.2.9
Dragon NaturallySpeaking: Section 4.9.4
DSA: Section 4.20.1, Section 4.20.1, Section 4.20.1, Section 8.1, Section 8.2.2, Question A.8.3
DSA authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
‘Duplicate Session’: Section 3.1.3.3, Question A.7.25
dynamic port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
East Asian Ambiguous characters: Section 4.10.2
ECDSA: Section 8.1, Section 8.2.2
echo, local: Section 4.3.8, Section 4.3.9, Question A.2.4
echo, remote: Section 4.3.8
Ed25519: Section 8.2.2
Edwards-curve: Section 4.20.1
elliptic curve: Section 4.19.1, Section 4.20.1, Section 8.2.2
emulation, terminal: Section 3.1.3.6, Section 4.3, Section 4.3.7, Section 4.4, Section 4.6, Section 4.14.3
encryption: Section 4.27.7, Section 8.1, Section 8.2.7
encryption algorithm: Section 4.21
End key: Section 4.4.2
End Of File, Telnet special command: Section 3.1.3.2
End Of Record, Telnet special command: Section 3.1.3.2
enquiry character: Section 4.3.7
environment variables: Section 4.14.5, Section 4.16.1
Erase Character, Telnet special command: Section 3.1.3.2, Section 4.16.3
Erase Line, Telnet special command: Section 3.1.3.2
erase screen: Section 4.3.5
ERASE, special character: Section 4.24.2
ERRORLEVEL: Section 5.2.3
error messages: Chapter 10
escape sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 7.2.1
Event Log: Section 3.1.3.1, Section 4.2
execute permission: Section 6.2.14
exit value: Section 5.2.3
expiry, of passwords: Section 4.22.5
exporting private keys: Section 8.2.12
extending a selection: Section 3.1.1, Section 4.11.2
FAQ: Appendix A
features, supported: Section A.2
feedback: Appendix B
feep: Section 4.5
filenames containing spaces: Section 6.2.1, Question A.6.9
files, changing permissions on: Section 6.2.14
files, deleting: Section 6.2.15
files, listing: Section 5.2.2.1, Section 6.2.13
files, receiving: Section 5.2.1, Section 6.2.9
files, renaming and moving: Section 6.2.18
files, resuming transfer of: Section 6.2.12
files, sending: Section 5.2.1, Section 6.2.10
files, transferring: Chapter 5, Chapter 6
finger: Section 3.5
fingerprint, of PGP key: Section 3.8.3.21
fingerprint, of SSH authentication key: Section 8.2.5, Section 9.2.1
fingerprint, of SSH host key: Section 2.2
firewalls: Section 4.13.1, Section 4.16.2, Section 4.19.2, Section 10.16, Question A.7.10
flashing cursor: Section 4.8.1
flashing text: Section 4.3.6
flow-control window: Section 4.27.11
font: Section 4.8.2, Section 4.10.4, Section 4.11.1, Section 4.12.3
font size: Section 4.7.2, Section 4.8.2
foreground colour, default: Section 4.12.5, Section 4.12.6
forwarding, of X11: Section 3.4, Section 3.8.3.11, Section 4.25
forwarding ports in SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
forwarding ports in SSH, changing mid-session: Section 4.26
forwarding, SSH agent: Section 3.8.3.10, Section 4.22.6, Section 9.4
Frequently Asked Questions: Appendix A
ftp: Chapter 6
full-screen mode: Section 3.1.3.7, Section 4.7.3, Section 4.9.7
function keys: Section 4.4.3, Question A.7.15
generating key pairs: Section 8.2
glob (wildcard): Section 5.2.1, Section 5.2.1.3, Section 5.2.2.6, Section 6.2.2, Section 6.2.11
Go Ahead, Telnet special command: Section 3.1.3.2
GPG signatures, of PuTTY binaries: Appendix E
graphical applications: Section 3.4, Section 4.25
group exchange, Diffie-Hellman: Section 4.19.1
GSSAPI: Section 4.14.2, Section 4.23
GSSAPI credential delegation: Section 4.23.1
Gtk: Question A.3.2
half-open connections: Section 4.13.3
Hebrew: Section 4.6.11
history: Section 3.1.2
HMAC: Section 4.27.6
home directory: Section 5.2.1.3
Home key: Section 4.4.2
-hostkey: Section 3.8.3.20
host key fingerprint (SSH): Section 2.2
host key management: Section 2.2, Section 3.1.3.2, Section 3.8.3.19, Section 3.8.3.20, Section 4.13.5, Section 4.20, Section 4.20.2
host keys, manually configuring: Section 3.8.3.20, Section 4.20.2
host keys, trusting: Section 2.2
host keys, upgrading: Section 3.1.3.2
host key type: Section 4.20.1
host key, verifying: Section 2.2, Question A.2.9
host name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
host name, logical: Section 3.8.3.19, Section 4.13.5
host name resolution: Section 4.15.3
host name resolution, with proxy: Section 4.15.2, Section 4.15.3
HTTP: Section 3.6
HTTP ‘basic’ authentication: Section 4.15.4
HTTP proxy: Section 4.15.1
-i command-line option: Section 3.8.3.18
icon title: Section 4.9.1
idle connections: Section 4.13.1, Question A.7.10
‘ignore’ messages, in SSH: Section 3.1.3.2, Section 4.27.1, Section 4.27.4
IGNORE message, SSH special command: Section 3.1.3.2
importing private keys: Section 8.2.12
inactive window: Section 4.1.3
integrity: Section 4.19.2
interactive connections: Section 4.13.2, Section 4.24.1, Chapter 7
intermittent connectivity: Section 4.13.1, Question A.7.11
internal error: Section 10.7
internal fault: Section 10.7
Internet protocols, debugging: Section 3.6
Internet Protocol version: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
Interrupt Process, Telnet special command: Section 3.1.3.2, Section 4.16.3
IP address: Section 3.5, Section 4.1.1, Section 4.13.4
IP address, loopback: Section 3.5, Section 4.15.2
IP masquerading: Section 10.16, Question A.7.10
IPv4: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
IPv6: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
IPv6 address: Section 4.26
ISO-8859: Section 4.10.1
ISO-10646 (Unicode): Section 4.6.10, Section 4.10.1, Section 4.10.4, Section 4.10.5
IUTF8 terminal mode: Section 4.24.2
Japanese: Section 4.10.2
keepalives, application: Section 4.13.1, Section 4.19.2, Section 4.27.1, Section 4.27.4
keepalives, TCP: Section 4.13.3
Kerberos: Section 4.23
kex: Section 4.19
keyboard: Section 4.4, Section 4.14.3, Question A.7.14, Question A.7.15
keyboard-interactive authentication: Section 4.22.5
key exchange: Section 4.19
key exchange algorithm: Section 4.19.1
key exchange, Diffie-Hellman: Section 4.19.1
key exchange, forcing repeat: Section 3.1.3.2
key exchange, repeat: Section 3.1.3.2, Section 4.19.2, Section 4.27.10, Question A.7.23
keypad, ‘Application’ mode: Section 4.4.5, Section 4.6.1
keypad, NetHack mode: Section 4.4.6
keypad, numeric: Section 4.4.3
key pair: Section 8.1
key pairs, generating: Section 8.2
known_hosts: Question A.2.9
Korean: Section 4.10.2
-L command-line option: Section 3.8.3.5
-l command-line option: Section 3.8.3.4
left mouse button: Section 3.1.1, Section 4.11.2
LF (Line Feed): Section 4.3.3, Section 4.3.4
licence: Appendix C
line-drawing characters: Section 3.3, Section 4.10.4
line editing, local: Section 4.3.9
Line Feed: Section 4.3.3, Section 4.3.4
lines, selecting: Section 3.1.1
line wrapping, automatic: Section 4.3.1, Question A.7.9
links (web browser): Section 4.6.2
Linux: Section 4.4, Section 4.4.1, Section 4.14.3, Section 4.24.1, Section 4.26.2, Section 6.2.14, Section 10.18, Question A.7.15
Linux, Red Hat: Question A.7.18
Linux version of PuTTY tools: PuTTY User Manual, Question A.3.2
Linux virtual console: Section 4.4.3
listen address: Section 3.5, Section 3.8.3.5, Section 4.26
listing files: Section 5.2.2.1, Section 6.2.13
-load command-line option: Section 3.8.3.1
loading private keys: Section 8.2.12
loading saved sessions from command line: Section 3.8.3.1
loading settings: Section 4.1.2
loading settings from a file: Section 4.29
local echo: Section 4.3.8, Section 4.3.9, Question A.2.4
localhost: Section 3.5, Section 4.15.2, Section 4.26.1, Question A.7.20
local line editing: Section 4.3.9
local proxy: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
local-to-remote port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
local user name, in Rlogin: Section 4.17.1
local user name, in Windows: Section 4.17.1
local Windows command: Section 6.2.19
locking up, SSH-2 sessions: Question A.7.23
Log, Event: Section 3.1.3.1, Section 4.2
log file: Section 3.2, Section 3.8.3.23, Section 4.2
log file, flushing: Section 4.2.3
logging in: Section 2.3
logging out: Section 2.5
logging, proxy: Section 4.15.6
-loghost: Section 3.8.3.19
logical host name: Section 3.8.3.19, Section 4.13.5
logical palettes: Section 4.12.4
login name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
login name, for auto-login: Section 4.14.1
login name, for proxy: Section 4.15.4
login name, local, in Rlogin: Section 4.17.1
login name, local, in Windows: Section 4.17.1
login names, different: Section 2.3, Section 4.22.7
login, passwordless: Section 1.2, Section 4.17.1, Section 4.23, Section 8.2.7, Chapter 9
login scripts: Section 10.6, Question A.7.2, Question A.7.6
loopback IP address: Section 3.5, Section 4.15.2
low-numbered port: Section 3.5, Section 4.17.1, Section 4.26
-ls PSCP command-line option: Section 5.2.2.1
MAC (message authentication code): Section 4.21, Section 4.27.6, Section 10.12, Question A.7.1
Mac OS: Question A.3.6
magic cookie: Section 4.25.1
mailing list: Section B.1
man pages for PuTTY tools: PuTTY User Manual
manually configuring host keys: Section 3.8.3.20, Section 4.20.2
maximise window: Section 4.7.2, Question A.6.3
maximum packet size: Section 4.27.11
mc: Section 4.6.2
-m command-line option: Section 3.8.3.6, Section 3.8.3.6
menu, context: Section 3.1.1, Section 3.1.3, Section 4.11.2
menu, system: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
message authentication code (MAC): Section 4.21, Section 4.27.6, Section 10.12, Question A.7.1
middle mouse button: Section 3.1.1, Section 4.11.2
Midnight Commander: Section 4.6.2
minimise window: Section 4.9.1
mistyping a password: Section 2.3
MIT-MAGIC-COOKIE-1: Section 4.25.1
modes of files, changing: Section 6.2.14
mouse: Section 3.1.1
mouse pointer: Section 3.1.1, Section 4.8.3
mouse reporting: Section 3.1.1, Section 4.6.2, Section 4.11.3
mouse, three-button: Section 3.1.1, Section 4.11.2
moving files: Section 6.2.18
MS-DOS Prompt: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
MUDs: Section 1.1, Section 2.1, Section 4.3.9
multi-user systems: Section 3.8.2, Question A.8.2
Nagle's algorithm: Section 4.13.2
name resolution: Section 4.15.3
name resolution, with proxy: Section 4.15.2, Section 4.15.3
NAT routers: Section 10.16, Question A.7.10
NaturallySpeaking: Section 4.9.4
-nc: Section 3.8.3.14
-N command-line option: Section 3.8.3.13
negotiation, of Telnet options: Section 4.16.2
NetHack keypad mode: Section 4.4.6
Network Address Translation: Section 10.16, Question A.7.10
network connection: Section 3.5, Section 4.13, Section 4.26
network protocols: Section 1.1
NEW_ENVIRON: Section 4.16.1
new line: Section 4.3.3, Section 4.3.4, Section 4.16.4
new line, in Telnet: Section 4.16.4
‘New Session’: Section 3.1.3.3, Question A.7.25
new version, verifying: Section 3.8.3.21, Appendix E
NNTP: Section 3.6
-noagent: Section 3.8.3.9
non-destructive backspace: Section 4.6.8
No Operation, Telnet special command: Section 3.1.3.2
No-op, in SSH: Section 3.1.3.2
numeric keypad: Section 4.4.3
numeric keypad, ‘Application’ mode: Section 4.4.5, Section 4.6.1
Num Lock: Section 4.4.5, Section 4.4.6
OLD_ENVIRON: Section 4.16.1
one-time passwords: Section 4.22.4
OpenSSH: Section 3.5, Section 4.22.7, Section 4.26, Section 4.26.1, Section 4.27.8, Section 4.27.9, Section 8.2.10, Section 8.3, Section 9.4, Section 10.5, Section 10.6, Question A.7.16, Question A.7.21, Question A.10.1
OpenSSH private key file format: Section 8.2.12
option negotiation, Telnet: Section 4.16.2
options, command-line: Section 3.8, Section 9.3
out of memory: Section 10.6, Question A.7.5, Question A.7.6
overriding host keys: Section 3.8.3.20, Section 4.20.2
packet log, SSH: Section 4.2, Section 4.2.4
Pageant: Section 3.8.3.9, Section 3.8.3.10, Section 4.22.6, Section 4.22.8, Section 4.27.3, Section 8.1, Chapter 9
palettes, logical: Section 4.12.4
passive Telnet negotiation: Section 4.16.2
passphrase: Section 8.1, Section 8.2.7, Chapter 9
password: Section 2.3, Section 3.8.3.8
password camouflage: Section 4.27.1, Section 4.27.2
password expiry: Section 4.22.5
password, for proxy: Section 4.15.4
passwordless login: Section 1.2, Section 4.17.1, Section 4.23, Section 8.2.7, Chapter 9
password, mistyping: Section 2.3
password, one-time: Section 4.22.4
password, plain text: Section 4.15.4, Section 4.15.4
password prompt: Question A.7.14
password, storing: Question A.2.8
paste, copy and: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
patch: Section B.2
PATH environment variable: Section 5.1, Section 6.1, Section 7.1
-P command-line option: Section 3.8.3.7
PC speaker: Section 4.5.1
permissions on files, changing: Section 6.2.14
-pgpfp command-line option: Section 3.8.3.21, Appendix E
PGP key fingerprint: Section 3.8.3.21
PGP signatures, of PuTTY binaries: Appendix E
plain text password: Section 4.15.4, Section 4.15.4
Plink: Chapter 7, Chapter 7
PLINK_PROTOCOL environment variable: Section 7.2.2
POP-3: Section 3.5
port forwarding in SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
port forwarding in SSH, changing mid-session: Section 4.26
port number: Section 3.5, Section 3.8.3.7, Section 4.1.1, Section 4.26
port, privileged: Section 3.5, Section 4.17.1, Section 4.26
POSIX: Section 4.24.2, Section 6.2.2
PPK file: Section 3.8.3.18, Section 4.22.8, Section 8.2.8, Section 8.2.12, Section 9.1
-p PSCP command-line option: Section 5.2.2.2
preserve file attributes: Section 5.2.2.2
printing, remote-controlled: Section 4.3.10
private key: Section 3.8.3.18, Section 4.22.8, Section 8.1, Chapter 9
private key file, OpenSSH: Section 8.2.12
private key file, PuTTY: Section 3.8.3.18, Section 4.22.8, Section 8.2.8, Section 8.2.12, Section 9.1
private key file, ssh.com: Section 8.2.12
private keys, generating: Section 8.2
privileged port: Section 3.5, Section 4.17.1, Section 4.26
process ACL (Windows): Section 3.8.3.25
prompt: Section 2.4
protocol: Section 2.1
protocols, debugging: Section 3.6
protocols, differences between: Section 1.2
protocol selection: Section 3.8.3.2
protocol version, SSH: Section 3.8.3.16, Section 4.18.4
proxy authentication: Section 4.15.4
-proxycmd: Section 3.8.3.24
proxy command: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
proxy DNS: Section 4.15.2, Section 4.15.3
proxy, HTTP: Section 4.15.1
proxy logging: Section 4.15.6
proxy password: Section 4.15.4
proxy server: Section 4.13.4, Section 4.15
proxy, SOCKS: Section 4.15.1
proxy, Telnet: Section 4.15.1, Section 4.15.5, Section 4.16.2
proxy user name: Section 4.15.4
PSCP: Chapter 5, Chapter 5
pseudo-terminal allocation: Section 3.8.3.12, Section 4.24.1
PSFTP: Chapter 6, Chapter 6
pterm: PuTTY User Manual, Question A.3.2
pty allocation: Section 3.8.3.12, Section 4.24.1
public key: Section 8.1
public-key algorithm: Section 8.1
public key authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
public key file, SSH-2: Section 8.2.9
public key fingerprint (SSH): Section 8.2.5, Section 9.2.1
public keys, generating: Section 8.2
punctuation: Section 4.11.5
PuTTY Event Log: Section 3.1.3.1, Section 4.2
PuTTYgen: Section 8.2
putty.rnd (random seed file): Section 3.8.2, Question A.5.2
putty @sessionname: Section 3.8.3.1
PuTTYtel: Section 4.15.4
PuTTY terminal window: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
-pw command-line option: Section 3.8.3.8
-q PSCP command-line option: Section 5.2.2.3
QUIT, special character: Section 4.24.2
quoting, in PSFTP: Section 6.2.1
random seed file: Section 3.8.2
-raw command-line option: Section 3.8.1, Section 3.8.3.2
raw protocol: Section 2.1
‘Raw’ protocol: Section 3.6
raw TCP connections: Section 3.6, Section 4.1.1
RC4: Section 4.21, Section 10.4
-R command-line option: Section 3.8.3.5
reading commands from a file: Section 3.8.3.6
read permission: Section 6.2.14
receiving files: Section 5.2.1, Section 6.2.9
rectangular selection: Section 3.1.1, Section 4.11.4
recursive: Section 5.2.2.4, Section 6.2.9, Section 6.2.10
Red Hat Linux: Question A.7.18
registry entries, removing: Section 3.8.2
Registry (Windows): Section 2.2, Section 4.1.2, Section 4.29, Question A.5.2
remote commands: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
remote-controlled printing: Section 4.3.10
remote echo: Section 4.3.8
remote network connection: Section 3.8.3.14
remote shell: Section 4.18.2
remote shell, suppressing: Section 3.8.3.13
remote-to-local port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
removing directories: Section 6.2.17
removing files: Section 6.2.15
removing registry entries: Section 3.8.2
renaming files: Section 6.2.18
repeat key exchange: Section 3.1.3.2, Section 4.19.2, Section 4.27.10, Question A.7.23
Repeat key exchange, SSH special command: Section 3.1.3.2
‘Reset Terminal’: Section 3.1.3.6
resizing, terminal: Section 4.6.3, Section 4.7.1, Section 4.7.2
‘Restart Session’: Section 3.1.3.3
-restrict-acl: Section 3.8.3.25
resuming file transfers: Section 6.2.12
return value: Section 5.2.3
RFC: Section 4.16.1
RGB values: Section 4.12.6
.rhosts file: Section 4.17.1
‘rhosts’ file: Section 4.17.1
Rich Text Format: Section 4.11.1
right mouse button: Section 3.1.1, Section 4.11.2
right mouse button menu: Section 3.1.1, Section 3.1.3, Section 4.11.2
right mouse button, with Ctrl: Section 3.1.1
right-to-left text: Section 4.6.11
Rijndael: Section 4.21
Rlogin: Section 2.1, Section 4.1.1, Section 4.17
-rlogin command-line option: Section 3.8.1, Section 3.8.3.2
Rlogin, differences from SSH and Telnet: Section 1.2
routers: Section 4.13.1
routers, NAT: Section 10.16, Question A.7.10
rows, in terminal window: Section 4.7.1
-r PSCP command-line option: Section 5.2.2.4
RSA: Section 4.20.1, Section 4.27.3, Section 4.27.8, Section 8.1, Section 8.2.2
RSA authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
RSA key exchange: Section 4.19.1
RTF: Section 4.11.1
Russian: Section 4.10.3
rxvt: Section 4.4.2
saved sessions, loading from command line: Section 3.8.3.1
‘Saved Sessions’ submenu: Section 3.1.3.3
saving private keys: Section 8.2.12
saving settings: Section 4.1.2
saving settings in a file: Section 4.29
SCO: Section 4.4.3
SCP protocol: Section 5.2.1, Section 5.2.2.6
-scp PSCP command-line option: Section 5.2.2.6
screen, clearing: Section 4.3.5
scripts: Section 7.3
scrollback: Section 3.1.2, Section 4.7.3
scrollback clearing: Section 4.6.7
scrollback, clearing: Section 3.1.3.6
scrollbar: Section 3.1.2, Section 4.7.3
scrolling region: Section 4.3.2
secret, shared: Section 4.19
secure shell: Section 1.2
security hazard: Section 4.6.6, Section 4.15.4, Section 5.2.1, Section 9.5
security token: Section 4.22.4
selecting a protocol: Section 1.2, Section 3.8.3.2
selecting text: Section 3.1.1, Section 4.11.2
selecting whole lines: Section 3.1.1
selecting whole words: Section 3.1.1, Section 4.11.5
selection, adjusting: Section 3.1.1, Section 4.11.2
selection, rectangular: Section 3.1.1, Section 4.11.4
sending files: Section 5.2.1, Section 6.2.10
-sercfg command-line option: Section 3.8.3.22
Serial: Section 4.28
-serial command-line option: Section 3.8.1, Section 3.8.3.2
serial line: Section 4.1.1, Section 4.28
serial port: Section 4.28
server: Section 1.1
server, commands on: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
server, HTTP: Section 4.15.1
server name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
server name resolution: Section 4.15.3
server name resolution, with proxy: Section 4.15.2, Section 4.15.3
server, proxy: Section 4.13.4, Section 4.15
server, SOCKS: Section 4.15.1
service names: Section 4.26
session ID: Section 4.27.9
session log: Section 3.2
-sessionlog: Section 3.8.3.23
@sessionname command-line argument: Section 3.8.3.1
sessions, loading and storing: Section 4.1.2
session, starting: Section 2.1
set-group-ID bit: Section 6.2.14
settings, changing: Section 3.1.3.4
settings, default: Section 3.8.1, Section 4.1.2
settings, loading and storing: Section 4.1.2
set-user-ID bit: Section 6.2.14
SFTP: Section 5.2.1, Section 5.2.2.6, Chapter 6
-sftp PSCP command-line option: Section 5.2.2.6
shaping, of Arabic text: Section 4.6.10
shared secret: Section 4.19
-shareexists Plink command-line option: Section 7.2.3.3
shell account: Section 1.1
shell, remote: Section 4.18.2
shell, remote, suppressing: Section 3.8.3.13
Shift-Backspace: Section 4.4.1
Shift-Ins: Section 3.1.1
Shift-PgDn: Section 3.1.2
Shift-PgUp: Section 3.1.2
shortcut, Windows: Section 3.8, Section 3.8.3.1, Section 9.3, Question A.6.4
Signal, SSH special command: Section 3.1.3.2
signature: Section 4.27.8, Section 8.1
signatures, of PuTTY binaries: Appendix E
single-DES: Section 4.21, Section 10.4
single sign-on: Section 4.14.2, Section 4.23
single-width character: Section 4.10.2
size, of font: Section 4.7.2, Section 4.8.2
size, of window: Section 4.7.1
S/Key: Section 4.22.4, Section 4.22.5
SMB: Question A.7.20
SMTP: Section 3.6
SOCKS port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
SOCKS proxy: Section 4.15.1
SO_KEEPALIVE: Section 4.13.3
sound file: Section 4.5.1
spaces in filenames: Section 6.2.1, Question A.6.9
special character: Section 4.24.2
special commands: Section 3.1.3.2
special commands, in SSH: Section 3.1.3.2
special commands, in Telnet: Section 3.1.3.2, Section 4.16.3
speed, terminal: Section 4.14.4
-s Plink command-line option: Section 7.2.3.2
spoofing: Section 2.2, Section 4.17.1, Section 8.1
SSH: Section 2.1, Section 2.2, Section 4.1.1, Section 4.18
SSH-1: Section 3.8.3.16, Section 4.18.4
SSH-2: Section 3.8.3.16, Section 4.14.5, Section 4.18.2, Section 4.18.4, Section 10.1, Section 10.3
ssh-add: Section 9.4
SSH agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
ssh.com: Section 4.27.7, Section 8.2.9, Section 8.3, Section 9.4
-ssh command-line option: Section 3.8.1, Section 3.8.3.2
ssh.com private key file format: Section 8.2.12
SSH, differences from Telnet and Rlogin: Section 1.2
.ssh directory: Section 8.3
.ssh2 directory: Section 8.3
SSH file transfer protocol: Section 5.2.1, Section 5.2.2.6, Chapter 6
SSH host key fingerprint: Section 2.2
SSH ‘ignore’ messages: Section 3.1.3.2, Section 4.27.1, Section 4.27.4
SSH key exchange, forcing repeat: Section 3.1.3.2
ssh-keygen: Section 9.2.1
-sshlog: Section 3.8.3.23
SSH packet log: Section 4.2, Section 4.2.4
SSH port forwarding: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
SSH port forwarding, changing mid-session: Section 4.26
SSH protocol version: Section 3.8.3.16, Section 4.18.4
SSH-2 public key file format: Section 8.2.9
SSH public key fingerprint: Section 8.2.5, Section 9.2.1
-sshrawlog: Section 3.8.3.23
SSH server bugs: Section 4.27
SSH special commands: Section 3.1.3.2
SSH subsystem: Section 7.2.3.2
SSH tunnelling: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
SSH tunnelling, changing mid-session: Section 4.26
SSH X11 forwarding: Section 3.4, Section 3.8.3.11, Section 4.25
stair-stepping: Section 4.3.3
standard error, proxy: Section 4.15.6
starting a session: Section 2.1
Start Menu: Section 5.1
startup scripts: Section 10.6, Question A.7.2, Question A.7.6
statistics: Section 5.2.2.3
sticky bit: Section 6.2.14
storing passwords: Question A.2.8
storing settings: Section 4.1.2
storing settings in a file: Section 4.29
stty: Section 4.4.1, Section 4.24.2
subsystem, SSH: Section 7.2.3.2
Sun SSH: Section 10.5
supported features: Section A.2
support requests: Section B.6
Suspend Process, Telnet special command: Section 3.1.3.2, Section 4.16.3
swap file: Section 9.5
switches, command-line: Section 3.8, Section 9.3
symmetric-key algorithm: Section 4.21
Synch, Telnet special command: Section 3.1.3.2
system colours: Section 4.12.5
SYSTEM32 directory, on Windows: Question A.7.25
system menu: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
system tray: Section 9.1
talker systems: Section 1.1, Section 4.3.9
taskbar: Section 4.5.2
-T command-line option: Section 3.8.3.12
-t command-line option: Section 3.8.3.12
TCP connections, raw: Section 3.6, Section 4.1.1
TCP keepalives: Section 4.13.3
TCP_NODELAY: Section 4.13.2
TCP proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
Telnet: Section 2.1, Section 4.1.1, Section 4.16
-telnet command-line option: Section 3.8.1, Section 3.8.3.2
Telnet, differences from SSH and Rlogin: Section 1.2
Telnet New Line: Section 4.16.4
Telnet option negotiation: Section 4.16.2
Telnet proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
Telnet special commands: Section 3.1.3.2, Section 4.16.3
Telnet URLs: Section 3.8.1
termcap: Section 4.4, Section 4.14.3
TERM environment variable: Section 4.12.2
terminal bell: Section 4.5
terminal bell, disabling: Section 4.5.1, Section 4.5.3
terminal bell overload mode: Section 4.5.3
terminal control sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 7.2.1
terminal emulation: Section 3.1.3.6, Section 4.3, Section 4.3.7, Section 4.4, Section 4.6, Section 4.14.3
terminal modes: Section 4.24.2
terminal, resetting: Section 3.1.3.6
terminal resizing: Section 4.6.3, Section 4.7.1, Section 4.7.2
terminal speed: Section 4.14.4
terminal type: Question A.5.1
terminal window: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
terminal window, inactive: Section 4.1.3
terminfo: Section 4.4, Section 4.14.3
three-button mouse: Section 3.1.1, Section 4.11.2
timeout, of connections: Section 4.13.1, Question A.7.10
timestamp: Section 5.2.2.2
TIS authentication: Section 4.22.4
token, security: Section 4.22.4
transferring files: Chapter 5, Chapter 6
triple-click: Section 3.1.1
triple-DES: Section 4.21
trn: Section 4.6.2
trusting host keys: Section 2.2
tunnelling using SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
tunnelling using SSH, changing mid-session: Section 4.26
typeface: Section 4.8.2, Section 4.10.4, Section 4.11.1, Section 4.12.3
UDP: Section 4.26
Unicode: Section 4.6.10, Section 4.10.1, Section 4.10.4, Section 4.10.5
uninstalling: Question A.8.2
Unix: Section 4.4, Section 4.4.1, Section 4.14.3, Section 4.24.1, Section 6.2.14, Section 10.18, Question A.7.15
Unix version of PuTTY tools: PuTTY User Manual, Question A.3.2
-unsafe PSCP command-line option: Section 5.2.1
upgraded version, verifying: Section 3.8.3.21, Appendix E
uploading files: Section 5.2.1, Section 6.2.10
URLs, Telnet: Section 3.8.1
US-ASCII: Section 4.10.5, Question A.2.11
user name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
user name, for auto-login: Section 4.14.1
user name, for proxy: Section 4.15.4
user name, local, in Rlogin: Section 4.17.1
user name, local, in Windows: Section 4.17.1
user names, different: Section 2.3, Section 4.22.7
UTF-8: Section 4.10.1, Section 4.10.2, Section 4.24.2, Question A.7.18
variables, environment: Section 4.14.5, Section 4.16.1
-v command-line option: Section 3.8.3.3
VERASE, special character: Section 4.24.2
verbose mode: Section 3.8.3.3
verifying new versions of PuTTY: Section 3.8.3.21, Appendix E
verifying the host key: Section 2.2, Question A.2.9
version, of Internet Protocol: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
version, of PuTTY: Section B.2
version, of SSH protocol: Section 3.8.3.16, Section 4.18.4
visual bell: Section 4.5.1
VQUIT, special character: Section 4.24.2
VT100+: Section 4.4.3
VT400: Section 4.4.3
vt220: Section 4.14.3
WAV file: Section 4.5.1
web browser: Section 3.5, Section 3.8.1
web server: Section 1.1
web site: Section B.7
white space: Section 4.11.5
wildcards: Section 5.2.1, Section 5.2.1.3, Section 5.2.2.6, Section 6.2.2, Section 6.2.11
WinCVS: Section 7.5
window border: Section 4.8.4
window caption: Section 4.5.2, Section 4.9.1
window, closing: Section 4.1.3, Section 4.9.2, Section 4.9.3
window, inactive: Section 4.1.3
window, maximising: Section 4.7.2, Question A.6.3
window menu: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
window, minimising: Section 4.9.1
window resizing: Section 4.6.3, Section 4.7.1, Section 4.7.2
Windows 3.1: Question A.3.5
Windows 95: Question A.7.4
Windows, 64-bit: Question A.7.25
Windows clipboard: Section 3.1.1
Windows command: Section 6.2.19
Windows Default Beep sound: Section 4.5
Windows file sharing: Question A.7.20
window size: Section 4.7.1
Windows process ACL: Section 3.8.3.25
Windows Registry: Section 2.2, Section 4.1.2, Section 4.29, Question A.5.2
Windows shortcut: Section 3.8, Section 3.8.3.1, Section 9.3, Question A.6.4
Windows Terminal Services: Question A.7.20
Windows XP: Question A.7.20, Question A.7.24
window, terminal: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
window title: Section 4.6.5, Section 4.6.6, Section 4.9.1, Question A.7.13
Win32s: Question A.3.5
WinSock version 2: Question A.7.4
Win125x: Section 4.10.1
words, selecting: Section 3.1.1, Section 4.11.5
working directory: Section 6.2.7, Section 6.2.8
wrapping, automatic: Section 4.3.1, Question A.7.9
wrapping, terminal: Section 4.10.2
write permission: Section 6.2.14
WS2_32.DLL: Question A.7.4
x86: Question A.3.1
X11 authentication: Section 4.25.1
-X command-line option: Section 3.8.3.11
-x command-line option: Section 3.8.3.11
‘X display location’: Section 3.4
XDM-AUTHORIZATION-1: Section 4.25.1
X11 forwarding: Section 3.4, Section 3.8.3.11, Section 4.25
X server: Section 3.4
xterm: Section 4.4.2, Section 4.4.3, Section 4.14.3
xterm mouse reporting: Section 3.1.1, Section 4.6.2, Section 4.11.3


If you want to provide feedback on this manual or on the PuTTY tools themselves, see the Feedback page.

[PuTTY release 0.68]


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now