Previous | Contents | Index | Next
-4
: Section 3.8.3.17
-6
: Section 3.8.3.17
Abort Output, Telnet special command: Section 3.1.3.2
Abort Process, Telnet special command: Section 3.1.3.2
accented characters: Section 3.3, Section 4.4.7
accessibility: Section 4.9.4
access to files, changing: Section 6.2.14
account name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
account name, for auto-login: Section 4.14.1
account name, for proxy: Section 4.15.4
account name, local, in Rlogin: Section 4.17.1
account name, local, in Windows: Section 4.17.1
account names, different: Section 2.3, Section 4.22.7
ACL, process (Windows): Section 3.8.3.25
-A
command-line option: Section 3.8.3.10
-a
command-line option: Section 3.8.3.10
active Telnet negotiation: Section 4.16.2
address, IP: Section 3.5, Section 4.1.1, Section 4.13.4
ad-hoc proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
adjusting a selection: Section 3.1.1, Section 4.11.2
Advanced Encryption Standard: Section 4.21
AES: Section 4.21
-agent
: Section 3.8.3.9
agent, authentication: Section 8.1, Chapter 9
agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
algorithm, encryption: Section 4.21
algorithm, key exchange: Section 4.19.1
algorithm, public-key: Section 8.1
allocation, of pseudo-terminal: Section 3.8.3.12, Section 4.24.1
alternate screen: Section 4.6.4, Section 4.7.4, Question A.7.19
ALT-F4: Section 4.9.3
‘AltGr’ key: Section 4.4.7, Section 4.4.8
‘Alt’ key: Section 4.9.5
ALT-Space: Section 4.9.4
always on top: Section 4.9.6
ANSI colours: Section 4.12.1, Section 4.12.6
ANSI graphics: Section 3.3, Section 4.10.4
ANSI printing: Section 4.3.10
answerback string: Section 4.3.7
Application Cursor Keys: Section 4.4.4, Section 4.6.1
Application key: Section 4.4.7
Application Keypad: Section 4.4.5, Section 4.6.1
Arabic: Section 4.6.11
Arabic text shaping: Section 4.6.10
Arcfour: Section 4.21, Section 10.4
Are You There, Telnet special command: Section 3.1.3.2
arguments, command-line: Section 3.8, Section 9.3
ASCII: Section 4.10.5, Question A.2.11
assertion failed: Section 10.7
asymmetric key algorithm: Section 8.1
authentication: Section 4.22
authentication agent: Section 8.1, Chapter 9
authentication agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
authentication, challenge/response: Section 4.22.4, Section 4.22.5
authentication, keyboard-interactive: Section 4.22.5
authentication, public key: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
authentication, to proxy: Section 4.15.4
authentication, X11: Section 4.25.1
authorized_keys
file: Section 8.2.10, Section 8.3
AUTOEXEC.BAT
: Section 5.1, Section 7.1
automated operations: Chapter 7
auto wrap mode: Section 4.3.1, Question A.7.9
background colour: Section 4.3.5, Question A.7.8
background colour, bright: Section 4.3.6
background colour, default: Section 4.12.5, Section 4.12.6
backspace, destructive: Section 4.6.8
backspace key: Section 4.4.1
bandwidth: Section 4.13.2, Section 4.14.4, Section 4.18.3
banner: Section 4.22.1
‘basic’ authentication (HTTP): Section 4.15.4
batch files: Section 4.29, Section 5.2.3, Section 7.3
-batch
Plink command-line option: Section 7.2.3.1
-batch
PSCP command-line option: Section 5.2.2.5
-batch
PSFTP command-line option: Section 6.1.4
batch scripts in PSFTP: Section 6.1.1
baud rate, of terminal: Section 4.14.4
-bc
PSFTP command-line option: Section 6.1.2
beep, terminal: Section 4.5
beep, with PC speaker: Section 4.5.1
bell, disabling: Section 4.5.1, Section 4.5.3
bell overload mode: Section 4.5.3
bell, terminal: Section 4.5
bell, visual: Section 4.5.1
-be
PSFTP command-line option: Section 6.1.3
bidirectional text: Section 4.6.11
bind address: Section 3.5, Section 3.8.3.5, Section 4.26
BitchX: Section 4.6.9
8-bit colour: Section 4.12.4
32-bit Windows: Question A.6.10
64-bit Windows: Question A.6.10, Question A.7.25
black, bold: Section 4.12.3
blinking cursor: Section 4.8.1
blinking text: Section 4.3.6
Blowfish: Section 4.21
bold black: Section 4.12.3
bold text: Section 4.12.3, Section 4.12.5, Section 4.12.6
box-drawing characters: Section 3.3, Section 4.10.4
-b
PSFTP command-line option: Section 6.1.1
Break, serial special command: Section 3.1.3.2
Break, SSH special command: Section 3.1.3.2
Break, Telnet special command: Section 3.1.3.2
bright black: Section 4.12.3
BSD: Section 4.16.1
bug reporting: Appendix B
bugs, in SSH servers: Section 4.27
bulletin board system: Section 1.1
cache, of SSH host keys: Section 2.2, Section 3.1.3.2, Section 3.8.3.19, Section 3.8.3.20, Section 4.13.5, Section 4.20, Section 4.20.2
Caps Lock: Section 4.10.3
Carriage Return: Section 4.3.3, Section 4.3.4
cat
: Question A.7.15
-C
command-line option: Section 3.8.3.15
ChaCha20-Poly1305: Section 4.21
challenge/response authentication: Section 4.22.4, Section 4.22.5
‘Change Settings’: Section 3.1.3.4
changing permissions on files: Section 6.2.14
changing user names: Section 2.3, Section 4.22.7
CHAP: Section 4.15.4
character classes: Section 4.11.5
characters, accented: Section 3.3, Section 4.4.7
character set: Section 3.3, Section 4.6.9, Section 4.10
characters, line-drawing: Section 3.3, Section 4.10.4
character width: Section 4.10.2
Chinese: Section 4.10.2
choosing a protocol: Section 1.2, Section 3.8.3.2
cipher algorithm: Section 4.21
Cisco: Section 3.8.3.6
CJK: Section 4.10.2
CJK ambiguous characters: Section 4.10.2
clean up after PuTTY: Question A.8.2
-cleanup
command-line option: Section 3.8.2
clear screen: Section 4.3.5
‘Clear Scrollback’: Section 3.1.3.6
client: Section 1.1
clipboard: Section 3.1.1, Section 3.1.3.1, Section 3.1.3.5
Close button: Section 2.5, Section 4.9.2
closing window: Section 4.1.3, Section 4.9.2, Section 4.9.3
code page: Section 4.10.1
colour: Section 4.11.1, Section 4.12, Question A.7.3
colour, background, default: Section 4.12.5, Section 4.12.6
colour, 8-bit: Section 4.12.4
colour, foreground, default: Section 4.12.5, Section 4.12.6
256-colour mode: Section 4.12.2
colour, of cursor: Section 4.12.5, Section 4.12.6
colours, ANSI: Section 4.12.1, Section 4.12.6
colours, system: Section 4.12.5
columns, in terminal window: Section 4.7.1
COM1
: Section 4.28.1
command-line arguments: Section 3.8, Section 9.3
command-line interface: Section 1.1
command line, loading saved sessions from: Section 3.8.3.1
-1
command-line option: Section 3.8.3.16
-2
command-line option: Section 3.8.3.16
Command Prompt: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
command, proxy: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
commands on the server: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
commands, reading from a file: Section 3.8.3.6
comment: Section 6.2
Compose key: Section 4.4.7
compression: Section 3.8.3.15, Section 4.18.3
confidentiality: Section 4.19.2
configuration: Section 3.8.3.22
configuration options: Chapter 4
connection, network: Section 3.5, Section 4.13, Section 4.26
connections, half-open: Section 4.13.3
connections, idle: Section 4.13.1, Question A.7.10
connections, interactive: Section 4.13.2, Section 4.24.1, Chapter 7
connectivity, breaks in: Section 4.13.1, Question A.7.11
CONNECT
proxy (HTTP): Section 4.15.1
console window: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
context menu: Section 3.1.1, Section 3.1.3, Section 4.11.2
Control-?: Section 4.4.1
Control-H: Section 4.4.1
control sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.5, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 4.14.3, Section 7.2.1, Question A.5.1
cookie, magic: Section 4.25.1
coordinates, cursor: Section 4.3.2
Copy All to Clipboard: Section 3.1.3.5
copy and paste: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
copyright: Appendix C
corruption, of display: Section 4.6.10, Section 4.6.11
CP437: Section 4.10.1
CP866
: Section 4.10.1
-c
Pageant command-line option: Section 9.3.2
CRC: Section 10.12
CR (Carriage Return): Section 4.3.3, Section 4.3.4
creating directories: Section 6.2.16
creating key pairs: Section 8.2
credential delegation, GSSAPI: Section 4.23.1
CryptoCard authentication: Section 4.22.4
Ctrl-Break: Section 3.1.3.2
Ctrl-PgDn: Section 3.1.2
Ctrl-PgUp: Section 3.1.2
Ctrl, with right mouse button: Section 3.1.1
current working directory: Section 6.2.7, Section 6.2.8
cursor: Section 4.8.1
cursor, blinking: Section 4.8.1
cursor colour: Section 4.12.5, Section 4.12.6
cursor coordinates: Section 4.3.2
cursor keys, ‘Application’ mode: Section 4.4.4, Section 4.6.1
cut and paste: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
CVS: Section 7.4
CVS_RSH
environment variable: Section 7.4
Cyrillic: Section 4.10.3
-D
command-line option: Section 3.8.3.5
debugging Internet protocols: Section 3.6
DEC Compose key: Section 4.4.7
DEC Origin Mode: Section 4.3.2
DECterm
: Question A.5.1
Default Beep sound, Windows: Section 4.5
Default Settings: Section 3.8.1, Section 4.1.2
delays, in SSH-2 sessions: Question A.7.23
delegation, of GSSAPI credentials: Section 4.23.1
deleting directories: Section 6.2.17
deleting files: Section 6.2.15
DES: Section 4.21, Section 10.4
destructive backspace: Section 4.6.8
development snapshots: Section B.2
diagnostic, proxy: Section 4.15.6
dialog box: Section 2.1
DiceWare: Section 8.2.7
differences between SSH, Telnet and Rlogin: Section 1.2
different user names: Section 2.3, Section 4.22.7
Diffie-Hellman group exchange: Section 4.19.1
Diffie-Hellman key exchange: Section 4.19.1
digital signature: Section 4.27.8, Section 8.1
Digital Signature Standard: Section 4.20.1, Section 4.20.1, Section 4.20.1, Section 8.1, Section 8.2.2, Question A.8.3
directories, creating: Section 6.2.16
directories, removing: Section 6.2.17
display corruption: Section 4.6.10, Section 4.6.11
DISPLAY
environment variable: Section 3.4
DLL: Section 4.23.2, Question A.6.10
DNS: Section 4.15.3
DNS name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
DNS resolution: Section 4.15.3
DNS, with proxy: Section 4.15.2, Section 4.15.3
Domain Name System: Section 4.15.3
double-click: Section 3.1.1, Section 4.11.5
double-width character: Section 4.10.2
downloading files: Section 5.2.1, Section 6.2.9
Dragon NaturallySpeaking: Section 4.9.4
DSA: Section 4.20.1, Section 4.20.1, Section 4.20.1, Section 8.1, Section 8.2.2, Question A.8.3
DSA authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
‘Duplicate Session’: Section 3.1.3.3, Question A.7.25
dynamic port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
East Asian Ambiguous characters: Section 4.10.2
ECDSA: Section 8.1, Section 8.2.2
echo, local: Section 4.3.8, Section 4.3.9, Question A.2.4
echo, remote: Section 4.3.8
Ed25519: Section 8.2.2
Edwards-curve: Section 4.20.1
elliptic curve: Section 4.19.1, Section 4.20.1, Section 8.2.2
emulation, terminal: Section 3.1.3.6, Section 4.3, Section 4.3.7, Section 4.4, Section 4.6, Section 4.14.3
encryption: Section 4.27.7, Section 8.1, Section 8.2.7
encryption algorithm: Section 4.21
End key: Section 4.4.2
End Of File, Telnet special command: Section 3.1.3.2
End Of Record, Telnet special command: Section 3.1.3.2
enquiry character: Section 4.3.7
environment variables: Section 4.14.5, Section 4.16.1
Erase Character, Telnet special command: Section 3.1.3.2, Section 4.16.3
Erase Line, Telnet special command: Section 3.1.3.2
erase screen: Section 4.3.5
ERASE
, special character: Section 4.24.2
ERRORLEVEL
: Section 5.2.3
error messages: Chapter 10
escape sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 7.2.1
Event Log: Section 3.1.3.1, Section 4.2
execute permission: Section 6.2.14
exit value: Section 5.2.3
expiry, of passwords: Section 4.22.5
exporting private keys: Section 8.2.12
extending a selection: Section 3.1.1, Section 4.11.2
FAQ: Appendix A
features, supported: Section A.2
feedback: Appendix B
feep: Section 4.5
filenames containing spaces: Section 6.2.1, Question A.6.9
files, changing permissions on: Section 6.2.14
files, deleting: Section 6.2.15
files, listing: Section 5.2.2.1, Section 6.2.13
files, receiving: Section 5.2.1, Section 6.2.9
files, renaming and moving: Section 6.2.18
files, resuming transfer of: Section 6.2.12
files, sending: Section 5.2.1, Section 6.2.10
files, transferring: Chapter 5, Chapter 6
finger
: Section 3.5
fingerprint, of PGP key: Section 3.8.3.21
fingerprint, of SSH authentication key: Section 8.2.5, Section 9.2.1
fingerprint, of SSH host key: Section 2.2
firewalls: Section 4.13.1, Section 4.16.2, Section 4.19.2, Section 10.16, Question A.7.10
flashing cursor: Section 4.8.1
flashing text: Section 4.3.6
flow-control window: Section 4.27.11
font: Section 4.8.2, Section 4.10.4, Section 4.11.1, Section 4.12.3
font size: Section 4.7.2, Section 4.8.2
foreground colour, default: Section 4.12.5, Section 4.12.6
forwarding, of X11: Section 3.4, Section 3.8.3.11, Section 4.25
forwarding ports in SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
forwarding ports in SSH, changing mid-session: Section 4.26
forwarding, SSH agent: Section 3.8.3.10, Section 4.22.6, Section 9.4
Frequently Asked Questions: Appendix A
ftp
: Chapter 6
full-screen mode: Section 3.1.3.7, Section 4.7.3, Section 4.9.7
function keys: Section 4.4.3, Question A.7.15
generating key pairs: Section 8.2
glob (wildcard): Section 5.2.1, Section 5.2.1.3, Section 5.2.2.6, Section 6.2.2, Section 6.2.11
Go Ahead, Telnet special command: Section 3.1.3.2
GPG signatures, of PuTTY binaries: Appendix E
graphical applications: Section 3.4, Section 4.25
group exchange, Diffie-Hellman: Section 4.19.1
GSSAPI: Section 4.14.2, Section 4.23
GSSAPI credential delegation: Section 4.23.1
Gtk: Question A.3.2
half-open connections: Section 4.13.3
Hebrew: Section 4.6.11
history: Section 3.1.2
HMAC: Section 4.27.6
home directory: Section 5.2.1.3
Home key: Section 4.4.2
-hostkey
: Section 3.8.3.20
host key fingerprint (SSH): Section 2.2
host key management: Section 2.2, Section 3.1.3.2, Section 3.8.3.19, Section 3.8.3.20, Section 4.13.5, Section 4.20, Section 4.20.2
host keys, manually configuring: Section 3.8.3.20, Section 4.20.2
host keys, trusting: Section 2.2
host keys, upgrading: Section 3.1.3.2
host key type: Section 4.20.1
host key, verifying: Section 2.2, Question A.2.9
host name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
host name, logical: Section 3.8.3.19, Section 4.13.5
host name resolution: Section 4.15.3
host name resolution, with proxy: Section 4.15.2, Section 4.15.3
HTTP: Section 3.6
HTTP ‘basic’ authentication: Section 4.15.4
HTTP proxy: Section 4.15.1
-i
command-line option: Section 3.8.3.18
icon title: Section 4.9.1
idle connections: Section 4.13.1, Question A.7.10
‘ignore’ messages, in SSH: Section 3.1.3.2, Section 4.27.1, Section 4.27.4
IGNORE message, SSH special command: Section 3.1.3.2
importing private keys: Section 8.2.12
inactive window: Section 4.1.3
integrity: Section 4.19.2
interactive connections: Section 4.13.2, Section 4.24.1, Chapter 7
intermittent connectivity: Section 4.13.1, Question A.7.11
internal error: Section 10.7
internal fault: Section 10.7
Internet protocols, debugging: Section 3.6
Internet Protocol version: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
Interrupt Process, Telnet special command: Section 3.1.3.2, Section 4.16.3
IP address: Section 3.5, Section 4.1.1, Section 4.13.4
IP address, loopback: Section 3.5, Section 4.15.2
IP masquerading: Section 10.16, Question A.7.10
IPv4: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
IPv6: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
IPv6 address: Section 4.26
ISO-8859: Section 4.10.1
ISO-10646 (Unicode): Section 4.6.10, Section 4.10.1, Section 4.10.4, Section 4.10.5
IUTF8 terminal mode: Section 4.24.2
Japanese: Section 4.10.2
keepalives, application: Section 4.13.1, Section 4.19.2, Section 4.27.1, Section 4.27.4
keepalives, TCP: Section 4.13.3
Kerberos: Section 4.23
kex: Section 4.19
keyboard: Section 4.4, Section 4.14.3, Question A.7.14, Question A.7.15
keyboard-interactive authentication: Section 4.22.5
key exchange: Section 4.19
key exchange algorithm: Section 4.19.1
key exchange, Diffie-Hellman: Section 4.19.1
key exchange, forcing repeat: Section 3.1.3.2
key exchange, repeat: Section 3.1.3.2, Section 4.19.2, Section 4.27.10, Question A.7.23
keypad, ‘Application’ mode: Section 4.4.5, Section 4.6.1
keypad, NetHack mode: Section 4.4.6
keypad, numeric: Section 4.4.3
key pair: Section 8.1
key pairs, generating: Section 8.2
known_hosts
: Question A.2.9
Korean: Section 4.10.2
-L
command-line option: Section 3.8.3.5
-l
command-line option: Section 3.8.3.4
left mouse button: Section 3.1.1, Section 4.11.2
LF (Line Feed): Section 4.3.3, Section 4.3.4
licence: Appendix C
line-drawing characters: Section 3.3, Section 4.10.4
line editing, local: Section 4.3.9
Line Feed: Section 4.3.3, Section 4.3.4
lines, selecting: Section 3.1.1
line wrapping, automatic: Section 4.3.1, Question A.7.9
links
(web browser): Section 4.6.2
Linux: Section 4.4, Section 4.4.1, Section 4.14.3, Section 4.24.1, Section 4.26.2, Section 6.2.14, Section 10.18, Question A.7.15
Linux, Red Hat: Question A.7.18
Linux version of PuTTY tools: PuTTY User Manual, Question A.3.2
Linux virtual console: Section 4.4.3
listen address: Section 3.5, Section 3.8.3.5, Section 4.26
listing files: Section 5.2.2.1, Section 6.2.13
-load
command-line option: Section 3.8.3.1
loading private keys: Section 8.2.12
loading saved sessions from command line: Section 3.8.3.1
loading settings: Section 4.1.2
loading settings from a file: Section 4.29
local echo: Section 4.3.8, Section 4.3.9, Question A.2.4
localhost
: Section 3.5, Section 4.15.2, Section 4.26.1, Question A.7.20
local line editing: Section 4.3.9
local proxy: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
local-to-remote port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
local user name, in Rlogin: Section 4.17.1
local user name, in Windows: Section 4.17.1
local Windows command: Section 6.2.19
locking up, SSH-2 sessions: Question A.7.23
Log, Event: Section 3.1.3.1, Section 4.2
log file: Section 3.2, Section 3.8.3.23, Section 4.2
log file, flushing: Section 4.2.3
logging in: Section 2.3
logging out: Section 2.5
logging, proxy: Section 4.15.6
-loghost
: Section 3.8.3.19
logical host name: Section 3.8.3.19, Section 4.13.5
logical palettes: Section 4.12.4
login name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
login name, for auto-login: Section 4.14.1
login name, for proxy: Section 4.15.4
login name, local, in Rlogin: Section 4.17.1
login name, local, in Windows: Section 4.17.1
login names, different: Section 2.3, Section 4.22.7
login, passwordless: Section 1.2, Section 4.17.1, Section 4.23, Section 8.2.7, Chapter 9
login scripts: Section 10.6, Question A.7.2, Question A.7.6
loopback IP address: Section 3.5, Section 4.15.2
low-numbered port: Section 3.5, Section 4.17.1, Section 4.26
-ls
PSCP command-line option: Section 5.2.2.1
MAC (message authentication code): Section 4.21, Section 4.27.6, Section 10.12, Question A.7.1
Mac OS: Question A.3.6
magic cookie: Section 4.25.1
mailing list: Section B.1
man pages for PuTTY tools: PuTTY User Manual
manually configuring host keys: Section 3.8.3.20, Section 4.20.2
maximise window: Section 4.7.2, Question A.6.3
maximum packet size: Section 4.27.11
mc
: Section 4.6.2
-m
command-line option: Section 3.8.3.6, Section 3.8.3.6
menu, context: Section 3.1.1, Section 3.1.3, Section 4.11.2
menu, system: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
message authentication code (MAC): Section 4.21, Section 4.27.6, Section 10.12, Question A.7.1
middle mouse button: Section 3.1.1, Section 4.11.2
Midnight Commander: Section 4.6.2
minimise window: Section 4.9.1
mistyping a password: Section 2.3
MIT-MAGIC-COOKIE-1
: Section 4.25.1
modes of files, changing: Section 6.2.14
mouse: Section 3.1.1
mouse pointer: Section 3.1.1, Section 4.8.3
mouse reporting: Section 3.1.1, Section 4.6.2, Section 4.11.3
mouse, three-button: Section 3.1.1, Section 4.11.2
moving files: Section 6.2.18
MS-DOS Prompt: Section 1.1, Section 1.1, Section 3.8, Section 5.1, Section 7.1
MUDs: Section 1.1, Section 2.1, Section 4.3.9
multi-user systems: Section 3.8.2, Question A.8.2
Nagle's algorithm: Section 4.13.2
name resolution: Section 4.15.3
name resolution, with proxy: Section 4.15.2, Section 4.15.3
NAT routers: Section 10.16, Question A.7.10
NaturallySpeaking: Section 4.9.4
-nc: Section 3.8.3.14
-N
command-line option: Section 3.8.3.13
negotiation, of Telnet options: Section 4.16.2
NetHack keypad mode: Section 4.4.6
Network Address Translation: Section 10.16, Question A.7.10
network connection: Section 3.5, Section 4.13, Section 4.26
network protocols: Section 1.1
NEW_ENVIRON
: Section 4.16.1
new line: Section 4.3.3, Section 4.3.4, Section 4.16.4
new line, in Telnet: Section 4.16.4
‘New Session’: Section 3.1.3.3, Question A.7.25
new version, verifying: Section 3.8.3.21, Appendix E
NNTP: Section 3.6
-noagent
: Section 3.8.3.9
non-destructive backspace: Section 4.6.8
No Operation, Telnet special command: Section 3.1.3.2
No-op, in SSH: Section 3.1.3.2
numeric keypad: Section 4.4.3
numeric keypad, ‘Application’ mode: Section 4.4.5, Section 4.6.1
Num Lock: Section 4.4.5, Section 4.4.6
OLD_ENVIRON
: Section 4.16.1
one-time passwords: Section 4.22.4
OpenSSH: Section 3.5, Section 4.22.7, Section 4.26, Section 4.26.1, Section 4.27.8, Section 4.27.9, Section 8.2.10, Section 8.3, Section 9.4, Section 10.5, Section 10.6, Question A.7.16, Question A.7.21, Question A.10.1
OpenSSH private key file format: Section 8.2.12
option negotiation, Telnet: Section 4.16.2
options, command-line: Section 3.8, Section 9.3
out of memory: Section 10.6, Question A.7.5, Question A.7.6
overriding host keys: Section 3.8.3.20, Section 4.20.2
packet log, SSH: Section 4.2, Section 4.2.4
Pageant: Section 3.8.3.9, Section 3.8.3.10, Section 4.22.6, Section 4.22.8, Section 4.27.3, Section 8.1, Chapter 9
palettes, logical: Section 4.12.4
passive Telnet negotiation: Section 4.16.2
passphrase: Section 8.1, Section 8.2.7, Chapter 9
password: Section 2.3, Section 3.8.3.8
password camouflage: Section 4.27.1, Section 4.27.2
password expiry: Section 4.22.5
password, for proxy: Section 4.15.4
passwordless login: Section 1.2, Section 4.17.1, Section 4.23, Section 8.2.7, Chapter 9
password, mistyping: Section 2.3
password, one-time: Section 4.22.4
password, plain text: Section 4.15.4, Section 4.15.4
password prompt: Question A.7.14
password, storing: Question A.2.8
paste, copy and: Section 3.1.1, Section 4.6.2, Section 4.10.5, Section 4.11, Section 4.11.3, Question A.6.6
patch: Section B.2
PATH
environment variable: Section 5.1, Section 6.1, Section 7.1
-P
command-line option: Section 3.8.3.7
PC speaker: Section 4.5.1
permissions on files, changing: Section 6.2.14
-pgpfp
command-line option: Section 3.8.3.21, Appendix E
PGP key fingerprint: Section 3.8.3.21
PGP signatures, of PuTTY binaries: Appendix E
plain text password: Section 4.15.4, Section 4.15.4
Plink: Chapter 7, Chapter 7
PLINK_PROTOCOL
environment variable: Section 7.2.2
POP-3: Section 3.5
port forwarding in SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
port forwarding in SSH, changing mid-session: Section 4.26
port number: Section 3.5, Section 3.8.3.7, Section 4.1.1, Section 4.26
port, privileged: Section 3.5, Section 4.17.1, Section 4.26
POSIX: Section 4.24.2, Section 6.2.2
PPK
file: Section 3.8.3.18, Section 4.22.8, Section 8.2.8, Section 8.2.12, Section 9.1
-p
PSCP command-line option: Section 5.2.2.2
preserve file attributes: Section 5.2.2.2
printing, remote-controlled: Section 4.3.10
private key: Section 3.8.3.18, Section 4.22.8, Section 8.1, Chapter 9
private key file, OpenSSH: Section 8.2.12
private key file, PuTTY: Section 3.8.3.18, Section 4.22.8, Section 8.2.8, Section 8.2.12, Section 9.1
private key file, ssh.com
: Section 8.2.12
private keys, generating: Section 8.2
privileged port: Section 3.5, Section 4.17.1, Section 4.26
process ACL (Windows): Section 3.8.3.25
prompt: Section 2.4
protocol: Section 2.1
protocols, debugging: Section 3.6
protocols, differences between: Section 1.2
protocol selection: Section 3.8.3.2
protocol version, SSH: Section 3.8.3.16, Section 4.18.4
proxy authentication: Section 4.15.4
-proxycmd
: Section 3.8.3.24
proxy command: Section 3.8.3.24, Section 4.15.1, Section 4.15.5
proxy DNS: Section 4.15.2, Section 4.15.3
proxy, HTTP: Section 4.15.1
proxy logging: Section 4.15.6
proxy password: Section 4.15.4
proxy server: Section 4.13.4, Section 4.15
proxy, SOCKS: Section 4.15.1
proxy, Telnet: Section 4.15.1, Section 4.15.5, Section 4.16.2
proxy user name: Section 4.15.4
PSCP: Chapter 5, Chapter 5
pseudo-terminal allocation: Section 3.8.3.12, Section 4.24.1
PSFTP: Chapter 6, Chapter 6
pterm
: PuTTY User Manual, Question A.3.2
pty allocation: Section 3.8.3.12, Section 4.24.1
public key: Section 8.1
public-key algorithm: Section 8.1
public key authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
public key file, SSH-2: Section 8.2.9
public key fingerprint (SSH): Section 8.2.5, Section 9.2.1
public keys, generating: Section 8.2
punctuation: Section 4.11.5
PuTTY Event Log: Section 3.1.3.1, Section 4.2
PuTTYgen: Section 8.2
putty.rnd
(random seed file): Section 3.8.2, Question A.5.2
putty @sessionname
: Section 3.8.3.1
PuTTYtel: Section 4.15.4
PuTTY terminal window: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
-pw
command-line option: Section 3.8.3.8
-q
PSCP command-line option: Section 5.2.2.3
QUIT
, special character: Section 4.24.2
quoting, in PSFTP: Section 6.2.1
random seed file: Section 3.8.2
-raw
command-line option: Section 3.8.1, Section 3.8.3.2
raw protocol: Section 2.1
‘Raw’ protocol: Section 3.6
raw TCP connections: Section 3.6, Section 4.1.1
RC4: Section 4.21, Section 10.4
-R
command-line option: Section 3.8.3.5
reading commands from a file: Section 3.8.3.6
read permission: Section 6.2.14
receiving files: Section 5.2.1, Section 6.2.9
rectangular selection: Section 3.1.1, Section 4.11.4
recursive: Section 5.2.2.4, Section 6.2.9, Section 6.2.10
Red Hat Linux: Question A.7.18
registry entries, removing: Section 3.8.2
Registry (Windows): Section 2.2, Section 4.1.2, Section 4.29, Question A.5.2
remote commands: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
remote-controlled printing: Section 4.3.10
remote echo: Section 4.3.8
remote network connection: Section 3.8.3.14
remote shell: Section 4.18.2
remote shell, suppressing: Section 3.8.3.13
remote-to-local port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
removing directories: Section 6.2.17
removing files: Section 6.2.15
removing registry entries: Section 3.8.2
renaming files: Section 6.2.18
repeat key exchange: Section 3.1.3.2, Section 4.19.2, Section 4.27.10, Question A.7.23
Repeat key exchange, SSH special command: Section 3.1.3.2
‘Reset Terminal’: Section 3.1.3.6
resizing, terminal: Section 4.6.3, Section 4.7.1, Section 4.7.2
‘Restart Session’: Section 3.1.3.3
-restrict-acl
: Section 3.8.3.25
resuming file transfers: Section 6.2.12
return value: Section 5.2.3
RFC: Section 4.16.1
RGB values: Section 4.12.6
.rhosts
file: Section 4.17.1
‘rhosts’ file: Section 4.17.1
Rich Text Format: Section 4.11.1
right mouse button: Section 3.1.1, Section 4.11.2
right mouse button menu: Section 3.1.1, Section 3.1.3, Section 4.11.2
right mouse button, with Ctrl: Section 3.1.1
right-to-left text: Section 4.6.11
Rijndael: Section 4.21
Rlogin: Section 2.1, Section 4.1.1, Section 4.17
-rlogin
command-line option: Section 3.8.1, Section 3.8.3.2
Rlogin, differences from SSH and Telnet: Section 1.2
routers: Section 4.13.1
routers, NAT: Section 10.16, Question A.7.10
rows, in terminal window: Section 4.7.1
-r
PSCP command-line option: Section 5.2.2.4
RSA: Section 4.20.1, Section 4.27.3, Section 4.27.8, Section 8.1, Section 8.2.2
RSA authentication: Section 3.8.3.18, Section 4.22.8, Section 4.27.9, Section 5.2.4, Section 6.3, Section 7.2.2, Section 8.1
RSA key exchange: Section 4.19.1
RTF: Section 4.11.1
Russian: Section 4.10.3
rxvt
: Section 4.4.2
saved sessions, loading from command line: Section 3.8.3.1
‘Saved Sessions’ submenu: Section 3.1.3.3
saving private keys: Section 8.2.12
saving settings: Section 4.1.2
saving settings in a file: Section 4.29
SCO: Section 4.4.3
SCP protocol: Section 5.2.1, Section 5.2.2.6
-scp
PSCP command-line option: Section 5.2.2.6
screen, clearing: Section 4.3.5
scripts: Section 7.3
scrollback: Section 3.1.2, Section 4.7.3
scrollback clearing: Section 4.6.7
scrollback, clearing: Section 3.1.3.6
scrollbar: Section 3.1.2, Section 4.7.3
scrolling region: Section 4.3.2
secret, shared: Section 4.19
secure shell: Section 1.2
security hazard: Section 4.6.6, Section 4.15.4, Section 5.2.1, Section 9.5
security token: Section 4.22.4
selecting a protocol: Section 1.2, Section 3.8.3.2
selecting text: Section 3.1.1, Section 4.11.2
selecting whole lines: Section 3.1.1
selecting whole words: Section 3.1.1, Section 4.11.5
selection, adjusting: Section 3.1.1, Section 4.11.2
selection, rectangular: Section 3.1.1, Section 4.11.4
sending files: Section 5.2.1, Section 6.2.10
-sercfg
command-line option: Section 3.8.3.22
Serial: Section 4.28
-serial
command-line option: Section 3.8.1, Section 3.8.3.2
serial line: Section 4.1.1, Section 4.28
serial port: Section 4.28
server: Section 1.1
server, commands on: Section 2.4, Section 3.8.3.6, Section 4.18.1, Section 4.18.2, Question A.6.2
server, HTTP: Section 4.15.1
server name: Section 2.1, Section 4.1.1, Section 4.9.1, Section 4.13.4, Section 5.2.1.2
server name resolution: Section 4.15.3
server name resolution, with proxy: Section 4.15.2, Section 4.15.3
server, proxy: Section 4.13.4, Section 4.15
server, SOCKS: Section 4.15.1
service names: Section 4.26
session ID: Section 4.27.9
session log: Section 3.2
-sessionlog
: Section 3.8.3.23
@sessionname
command-line argument: Section 3.8.3.1
sessions, loading and storing: Section 4.1.2
session, starting: Section 2.1
set-group-ID bit: Section 6.2.14
settings, changing: Section 3.1.3.4
settings, default: Section 3.8.1, Section 4.1.2
settings, loading and storing: Section 4.1.2
set-user-ID bit: Section 6.2.14
SFTP: Section 5.2.1, Section 5.2.2.6, Chapter 6
-sftp
PSCP command-line option: Section 5.2.2.6
shaping, of Arabic text: Section 4.6.10
shared secret: Section 4.19
-shareexists
Plink command-line option: Section 7.2.3.3
shell account: Section 1.1
shell, remote: Section 4.18.2
shell, remote, suppressing: Section 3.8.3.13
Shift-Backspace: Section 4.4.1
Shift-Ins: Section 3.1.1
Shift-PgDn: Section 3.1.2
Shift-PgUp: Section 3.1.2
shortcut, Windows: Section 3.8, Section 3.8.3.1, Section 9.3, Question A.6.4
Signal, SSH special command: Section 3.1.3.2
signature: Section 4.27.8, Section 8.1
signatures, of PuTTY binaries: Appendix E
single-DES: Section 4.21, Section 10.4
single sign-on: Section 4.14.2, Section 4.23
single-width character: Section 4.10.2
size, of font: Section 4.7.2, Section 4.8.2
size, of window: Section 4.7.1
S/Key: Section 4.22.4, Section 4.22.5
SMB: Question A.7.20
SMTP: Section 3.6
SOCKS port forwarding: Section 3.5, Section 3.8.3.5, Section 4.26
SOCKS proxy: Section 4.15.1
SO_KEEPALIVE
: Section 4.13.3
sound file: Section 4.5.1
spaces in filenames: Section 6.2.1, Question A.6.9
special character: Section 4.24.2
special commands: Section 3.1.3.2
special commands, in SSH: Section 3.1.3.2
special commands, in Telnet: Section 3.1.3.2, Section 4.16.3
speed, terminal: Section 4.14.4
-s
Plink command-line option: Section 7.2.3.2
spoofing: Section 2.2, Section 4.17.1, Section 8.1
SSH: Section 2.1, Section 2.2, Section 4.1.1, Section 4.18
SSH-1: Section 3.8.3.16, Section 4.18.4
SSH-2: Section 3.8.3.16, Section 4.14.5, Section 4.18.2, Section 4.18.4, Section 10.1, Section 10.3
ssh-add
: Section 9.4
SSH agent forwarding: Section 3.8.3.10, Section 4.22.6, Section 9.4
ssh.com
: Section 4.27.7, Section 8.2.9, Section 8.3, Section 9.4
-ssh
command-line option: Section 3.8.1, Section 3.8.3.2
ssh.com
private key file format: Section 8.2.12
SSH, differences from Telnet and Rlogin: Section 1.2
.ssh
directory: Section 8.3
.ssh2
directory: Section 8.3
SSH file transfer protocol: Section 5.2.1, Section 5.2.2.6, Chapter 6
SSH host key fingerprint: Section 2.2
SSH ‘ignore’ messages: Section 3.1.3.2, Section 4.27.1, Section 4.27.4
SSH key exchange, forcing repeat: Section 3.1.3.2
ssh-keygen
: Section 9.2.1
-sshlog
: Section 3.8.3.23
SSH packet log: Section 4.2, Section 4.2.4
SSH port forwarding: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
SSH port forwarding, changing mid-session: Section 4.26
SSH protocol version: Section 3.8.3.16, Section 4.18.4
SSH-2 public key file format: Section 8.2.9
SSH public key fingerprint: Section 8.2.5, Section 9.2.1
-sshrawlog
: Section 3.8.3.23
SSH server bugs: Section 4.27
SSH special commands: Section 3.1.3.2
SSH subsystem: Section 7.2.3.2
SSH tunnelling: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
SSH tunnelling, changing mid-session: Section 4.26
SSH X11 forwarding: Section 3.4, Section 3.8.3.11, Section 4.25
stair-stepping: Section 4.3.3
standard error, proxy: Section 4.15.6
starting a session: Section 2.1
Start Menu: Section 5.1
startup scripts: Section 10.6, Question A.7.2, Question A.7.6
statistics: Section 5.2.2.3
sticky bit: Section 6.2.14
storing passwords: Question A.2.8
storing settings: Section 4.1.2
storing settings in a file: Section 4.29
stty
: Section 4.4.1, Section 4.24.2
subsystem, SSH: Section 7.2.3.2
Sun SSH: Section 10.5
supported features: Section A.2
support requests: Section B.6
Suspend Process, Telnet special command: Section 3.1.3.2, Section 4.16.3
swap file: Section 9.5
switches, command-line: Section 3.8, Section 9.3
symmetric-key algorithm: Section 4.21
Synch, Telnet special command: Section 3.1.3.2
system colours: Section 4.12.5
SYSTEM32
directory, on Windows: Question A.7.25
system menu: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
system tray: Section 9.1
talker systems: Section 1.1, Section 4.3.9
taskbar: Section 4.5.2
-T
command-line option: Section 3.8.3.12
-t
command-line option: Section 3.8.3.12
TCP connections, raw: Section 3.6, Section 4.1.1
TCP keepalives: Section 4.13.3
TCP_NODELAY
: Section 4.13.2
TCP proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
Telnet: Section 2.1, Section 4.1.1, Section 4.16
-telnet
command-line option: Section 3.8.1, Section 3.8.3.2
Telnet, differences from SSH and Rlogin: Section 1.2
Telnet New Line: Section 4.16.4
Telnet option negotiation: Section 4.16.2
Telnet proxy: Section 4.15.1, Section 4.15.5, Section 4.16.2
Telnet special commands: Section 3.1.3.2, Section 4.16.3
Telnet URLs: Section 3.8.1
termcap
: Section 4.4, Section 4.14.3
TERM
environment variable: Section 4.12.2
terminal bell: Section 4.5
terminal bell, disabling: Section 4.5.1, Section 4.5.3
terminal bell overload mode: Section 4.5.3
terminal control sequences: Section 3.2, Section 4.3.1, Section 4.3.2, Section 4.3.6, Section 4.6.2, Section 4.9.1, Section 4.10.4, Section 4.11.3, Section 4.11.5, Section 4.12.1, Section 4.12.3, Section 4.14.3, Section 7.2.1
terminal emulation: Section 3.1.3.6, Section 4.3, Section 4.3.7, Section 4.4, Section 4.6, Section 4.14.3
terminal modes: Section 4.24.2
terminal, resetting: Section 3.1.3.6
terminal resizing: Section 4.6.3, Section 4.7.1, Section 4.7.2
terminal speed: Section 4.14.4
terminal type: Question A.5.1
terminal window: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
terminal window, inactive: Section 4.1.3
terminfo
: Section 4.4, Section 4.14.3
three-button mouse: Section 3.1.1, Section 4.11.2
timeout, of connections: Section 4.13.1, Question A.7.10
timestamp: Section 5.2.2.2
TIS authentication: Section 4.22.4
token, security: Section 4.22.4
transferring files: Chapter 5, Chapter 6
triple-click: Section 3.1.1
triple-DES: Section 4.21
trn
: Section 4.6.2
trusting host keys: Section 2.2
tunnelling using SSH: Section 3.5, Section 3.8.3.5, Section 4.15, Section 4.18.2, Section 4.26
tunnelling using SSH, changing mid-session: Section 4.26
typeface: Section 4.8.2, Section 4.10.4, Section 4.11.1, Section 4.12.3
UDP: Section 4.26
Unicode: Section 4.6.10, Section 4.10.1, Section 4.10.4, Section 4.10.5
uninstalling: Question A.8.2
Unix: Section 4.4, Section 4.4.1, Section 4.14.3, Section 4.24.1, Section 6.2.14, Section 10.18, Question A.7.15
Unix version of PuTTY tools: PuTTY User Manual, Question A.3.2
-unsafe
PSCP command-line option: Section 5.2.1
upgraded version, verifying: Section 3.8.3.21, Appendix E
uploading files: Section 5.2.1, Section 6.2.10
URLs, Telnet: Section 3.8.1
US-ASCII: Section 4.10.5, Question A.2.11
user name: Section 2.3, Section 3.8.3.4, Section 5.2.1.1
user name, for auto-login: Section 4.14.1
user name, for proxy: Section 4.15.4
user name, local, in Rlogin: Section 4.17.1
user name, local, in Windows: Section 4.17.1
user names, different: Section 2.3, Section 4.22.7
UTF-8: Section 4.10.1, Section 4.10.2, Section 4.24.2, Question A.7.18
variables, environment: Section 4.14.5, Section 4.16.1
-v
command-line option: Section 3.8.3.3
VERASE
, special character: Section 4.24.2
verbose mode: Section 3.8.3.3
verifying new versions of PuTTY: Section 3.8.3.21, Appendix E
verifying the host key: Section 2.2, Question A.2.9
version, of Internet Protocol: Section 3.8.3.17, Section 4.13.4, Section 4.26.2
version, of PuTTY: Section B.2
version, of SSH protocol: Section 3.8.3.16, Section 4.18.4
visual bell: Section 4.5.1
VQUIT
, special character: Section 4.24.2
VT100+: Section 4.4.3
VT400: Section 4.4.3
vt220
: Section 4.14.3
WAV
file: Section 4.5.1
web browser: Section 3.5, Section 3.8.1
web server: Section 1.1
web site: Section B.7
white space: Section 4.11.5
wildcards: Section 5.2.1, Section 5.2.1.3, Section 5.2.2.6, Section 6.2.2, Section 6.2.11
WinCVS: Section 7.5
window border: Section 4.8.4
window caption: Section 4.5.2, Section 4.9.1
window, closing: Section 4.1.3, Section 4.9.2, Section 4.9.3
window, inactive: Section 4.1.3
window, maximising: Section 4.7.2, Question A.6.3
window menu: Section 3.1.3, Section 3.1.3.7, Section 4.9.4, Section 4.9.5, Section 4.9.7
window, minimising: Section 4.9.1
window resizing: Section 4.6.3, Section 4.7.1, Section 4.7.2
Windows 3.1: Question A.3.5
Windows 95: Question A.7.4
Windows, 32-bit: Question A.6.10
Windows, 64-bit: Question A.6.10, Question A.7.25
Windows clipboard: Section 3.1.1
Windows command: Section 6.2.19
Windows Default Beep sound: Section 4.5
Windows file sharing: Question A.7.20
window size: Section 4.7.1
Windows process ACL: Section 3.8.3.25
Windows Registry: Section 2.2, Section 4.1.2, Section 4.29, Question A.5.2
Windows shortcut: Section 3.8, Section 3.8.3.1, Section 9.3, Question A.6.4
Windows Terminal Services: Question A.7.20
Windows XP: Question A.7.20, Question A.7.24
window, terminal: Section 3.1.1, Section 3.1.3, Section 4.1.3, Section 4.7, Section 4.8, Section 4.9, Section 4.12.6
window title: Section 4.6.5, Section 4.6.6, Section 4.9.1, Question A.7.13
Win32s: Question A.3.5
WinSock version 2: Question A.7.4
Win125x: Section 4.10.1
words, selecting: Section 3.1.1, Section 4.11.5
working directory: Section 6.2.7, Section 6.2.8
wrapping, automatic: Section 4.3.1, Question A.7.9
wrapping, terminal: Section 4.10.2
write permission: Section 6.2.14
WS2_32.DLL
: Question A.7.4
X11 authentication: Section 4.25.1
x86 (32-bit processor architecture): Question A.6.10
-X
command-line option: Section 3.8.3.11
-x
command-line option: Section 3.8.3.11
‘X display location’: Section 3.4
XDM-AUTHORIZATION-1
: Section 4.25.1
X11 forwarding: Section 3.4, Section 3.8.3.11, Section 4.25
X server: Section 3.4
xterm
: Section 4.4.2, Section 4.4.3, Section 4.14.3
xterm
mouse reporting: Section 3.1.1, Section 4.6.2, Section 4.11.3
If you want to provide feedback on this manual or on the PuTTY tools themselves, see the Feedback page.
[PuTTY release 0.69]