Why do i need putty
Get our top stories in your inbox every month. Follow us. Recent posts. SmartSales v3. Share this article. Never miss our stories. Related articles. See all blog articles. Very few people need to touch these. Some people may change how the bell character is handled; people using exotic operating systems might change what is sent by the backspace or delete character. The window options influence the appearance and behavior of the terminal window. It can also specify how characters are translated on output and to select fonts and colors for the window.
Of the connection options, the Data options can be useful. The Auto-login user name specifies the user to log in as, so that the name will not have to be entered every time. The Proxy options are rarely useful for home users, but may be needed in enterprises that do not allow outgoing Internet connections without using a SOCKS proxy or other similar mechanisms. The Telnet , Rlogin , and Serial categories only contain options for those protocols, and very few people would ever use them. The SSH options, however, are important and useful for some people.
The ordinary user or student need not worry about them. But if you want to use public key authentication, then they are needed. Otherwise you won't see all the options.
You almost never want to touch the Kex key exchange , Host Keys, or Cipher options. They all have reasonable default values, and most people don't know enough about cryptography to select any better values. Thus just skip these options, unless you know what you are doing. The Auth subtree contains some options that may be useful. To enable public key authentication, you just generate an SSH key and then click the Browse button in the Authentication parameters box in the middle right area of this configuration pane.
For more information, see also configuring public key authentication for PuTTY. Advanced users may also want to check the Allow agent forwarding checkbox to use key-based single sign-on. Most users have no need to generate SSH keys and need not know what public key authentication is.
System administrators, however, should learn it and should also familiarize themselves with SSH key management and ensure their organization implements proper provisioning and termination processes and audits for SSH keys.
Enterprise users using Kerberos authentication e. Other users don't need to care. X11 is a protocol and system for running graphical applications on Unix and Linux. It supports running graphical applications remotely over a network out-of-the-box.
PuTTY does not implement an X11 server the display side , but it can work with some other product that implements X server functionality on Windows. Asked 4 years, 4 months ago. Active 4 years, 4 months ago.
Viewed 23k times. Also, what is the difference between pscp, psftp and scp, sftp? Improve this question. Gilles 'SO- stop being evil' k gold badges silver badges bronze badges. Carol Carol 1 1 gold badge 1 1 silver badge 3 3 bronze badges. Whereas the pscp program in the PuTTY suite implements almost the commandline arguments of scp but can use either protocol, while the psftp program implements the more complicated and flexible interface and protocol of sftp.
Add a comment. Active Oldest Votes. Improve this answer. Cancel Save Changes. Login To Add A Comment. Thanks Stephen. Are you sure you want to delete this comment?
Hey Ben. Not sure what you mean. SSL is used for establishing a secure connection to the server. PuTTY gives you a remote terminal to access the machine. When you use the terminal you only have access to the command prompt style of interaction where you type your commands, and hit enter to run them.
You wont see any windows or anything like that.
0コメント