]> asedeno.scripts.mit.edu Git - PuTTY.git/blob - doc/index.but
Key rollover: rewrite the PGP keys manual appendix.
[PuTTY.git] / doc / index.but
1 \IM{Unix version} Unix version of PuTTY tools
2 \IM{Unix version} Linux version of PuTTY tools
3
4 \IM{Unix} Unix
5 \IM{Unix} Linux
6
7 \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} Command Prompt
8 \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} MS-DOS Prompt
9 \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} console window
10
11 \IM{spoof}{spoofed}{spoofing} spoofing
12
13 \IM{verifying the host key} verifying the host key
14 \IM{verifying the host key} host key, verifying
15
16 \IM{trusting host keys} trusting host keys
17 \IM{trusting host keys} host keys, trusting
18
19 \IM{host key fingerprint} fingerprint, of SSH host key
20 \IM{host key fingerprint} host key fingerprint (SSH)
21 \IM{host key fingerprint} SSH host key fingerprint
22
23 \IM{manually configuring host keys} manually configuring host keys
24 \IM{manually configuring host keys} overriding host keys
25 \IM{manually configuring host keys} host keys, manually configuring
26
27 \IM{starting a session} starting a session
28 \IM{starting a session} session, starting
29
30 \IM{commands on the server}{remote command} commands on the server
31 \IM{commands on the server}{remote command} remote commands
32 \IM{commands on the server}{remote command} server, commands on
33
34 \IM{mistyping a password} mistyping a password
35 \IM{mistyping a password} password, mistyping
36
37 \IM{different usernames}{changes of username} different user names
38 \IM{different usernames}{changes of username} changing user names
39 \IM{different usernames}{changes of username} user names, different
40 \IM{different usernames}{changes of username} login names, different
41 \IM{different usernames}{changes of username} account names, different
42
43 \IM{differences between SSH, Telnet and Rlogin} differences between
44 SSH, Telnet and Rlogin
45 \IM{differences between SSH, Telnet and Rlogin} protocols,
46 differences between
47 \IM{differences between SSH, Telnet and Rlogin} SSH, differences
48 from Telnet and Rlogin
49 \IM{differences between SSH, Telnet and Rlogin} Telnet, differences
50 from SSH and Rlogin
51 \IM{differences between SSH, Telnet and Rlogin} Rlogin, differences
52 from SSH and Telnet
53 \IM{differences between SSH, Telnet and Rlogin} selecting a protocol
54 \IM{differences between SSH, Telnet and Rlogin} choosing a protocol
55
56 \IM{MUD}{MUDs} MUDs
57
58 \IM{talker}{talker systems} talker systems
59
60 \IM{security hazard}{security risk} security hazard
61
62 \IM{SSH-1}{SSH protocol version 1} SSH-1
63 \IM{SSH-2}{SSH protocol version 2} SSH-2
64
65 \IM{terminal window}{PuTTY window} terminal window
66 \IM{terminal window}{PuTTY window} PuTTY terminal window
67 \IM{terminal window}{PuTTY window} window, terminal
68
69 \IM{copy and paste} copy and paste
70 \IM{copy and paste} cut and paste
71 \IM{copy and paste} paste, copy and
72
73 \IM{three-button mouse} three-button mouse
74 \IM{three-button mouse} mouse, three-button
75
76 \IM{left mouse button}{left button} left mouse button
77 \IM{middle mouse button}{middle button} middle mouse button
78 \IM{right mouse button}{right button} right mouse button
79
80 \IM{selecting words}{word-by-word selection} selecting whole words
81 \IM{selecting words}{word-by-word selection} words, selecting
82
83 \IM{selecting lines} selecting whole lines
84 \IM{selecting lines} lines, selecting
85
86 \IM{rectangular selection} rectangular selection
87 \IM{rectangular selection} selection, rectangular
88
89 \IM{adjusting a selection} adjusting a selection
90 \IM{adjusting a selection} extending a selection
91 \IM{adjusting a selection} selection, adjusting
92
93 \IM{right mouse button, with Ctrl} right mouse button, with Ctrl
94 \IM{right mouse button, with Ctrl} Ctrl, with right mouse button
95
96 \IM{system menu} system menu
97 \IM{system menu} menu, system
98 \IM{system menu} window menu
99
100 \IM{context menu} context menu
101 \IM{context menu} menu, context
102 \IM{context menu} right mouse button menu
103
104 \IM{Event Log} Event Log
105 \IM{Event Log} PuTTY Event Log
106 \IM{Event Log} Log, Event
107
108 \IM{Telnet special commands} Telnet special commands
109 \IM{Telnet special commands} special commands, in Telnet
110
111 \IM{SSH special commands} SSH special commands
112 \IM{SSH special commands} special commands, in SSH
113
114 \IM{Repeat key exchange, SSH special command} Repeat key exchange, SSH special command
115 \IM{Repeat key exchange, SSH special command} key exchange, forcing repeat
116 \IM{Repeat key exchange, SSH special command} SSH key exchange, forcing repeat
117
118 \IM{accented characters} accented characters
119 \IM{accented characters} characters, accented
120
121 \IM{line-drawing characters} line-drawing characters
122 \IM{line-drawing characters} box-drawing characters
123 \IM{line-drawing characters} characters, line-drawing
124 \IM{line-drawing characters} ANSI graphics
125
126 \IM{port forwarding}{port forwardings} port forwarding in SSH
127 \IM{port forwarding}{port forwardings} SSH port forwarding
128 \IM{port forwarding}{port forwardings} forwarding ports in SSH
129 \IM{port forwarding}{port forwardings} tunnelling using SSH
130 \IM{port forwarding}{port forwardings} SSH tunnelling
131
132 \IM{port forwarding, changing mid-session} port forwarding in SSH, changing mid-session
133 \IM{port forwarding, changing mid-session} SSH port forwarding, changing mid-session
134 \IM{port forwarding, changing mid-session} forwarding ports in SSH, changing mid-session
135 \IM{port forwarding, changing mid-session} tunnelling using SSH, changing mid-session
136 \IM{port forwarding, changing mid-session} SSH tunnelling, changing mid-session
137
138 \IM{local port forwarding} local-to-remote port forwarding
139 \IM{remote port forwarding} remote-to-local port forwarding
140
141 \IM{dynamic port forwarding} dynamic port forwarding
142 \IM{dynamic port forwarding} SOCKS port forwarding
143
144 \IM{debugging Internet protocols} debugging Internet protocols
145 \IM{debugging Internet protocols} Internet protocols, debugging
146 \IM{debugging Internet protocols} protocols, debugging
147
148 \IM{Internet protocol version} Internet Protocol version
149 \IM{Internet protocol version} version, of Internet Protocol
150
151 \IM{raw TCP connections} raw TCP connections
152 \IM{raw TCP connections} TCP connections, raw
153
154 \IM{command-line arguments} command-line arguments
155 \IM{command-line arguments} arguments, command-line
156 \IM{command-line arguments} options, command-line
157 \IM{command-line arguments} switches, command-line
158
159 \IM{Windows shortcut} Windows shortcut
160 \IM{Windows shortcut} shortcut, Windows
161
162 \IM{telnet URLs} Telnet URLs
163 \IM{telnet URLs} URLs, Telnet
164
165 \IM{saved sessions, loading from command line} saved sessions,
166 loading from command line
167 \IM{saved sessions, loading from command line} loading saved
168 sessions from command line
169 \IM{saved sessions, loading from command line} command line, loading
170 saved sessions from
171
172 \IM{putty @sessionname} \c{putty @sessionname}
173 \IM{putty @sessionname} \c{@sessionname} command-line argument
174
175 \IM{protocol selection} protocol selection
176 \IM{protocol selection} selecting a protocol
177 \IM{protocol selection} choosing a protocol
178
179 \IM{login name}{username} login name
180 \IM{login name}{username} user name
181 \IM{login name}{username} account name
182
183 \IM{reading commands from a file} reading commands from a file
184 \IM{reading commands from a file} commands, reading from a file
185
186 \IM{agent forwarding} agent forwarding
187 \IM{agent forwarding} authentication agent forwarding
188 \IM{agent forwarding} SSH agent forwarding
189 \IM{agent forwarding} forwarding, SSH agent
190
191 \IM{X11 forwarding}{forwarding of X11} X11 forwarding
192 \IM{X11 forwarding}{forwarding of X11} SSH X11 forwarding
193 \IM{X11 forwarding}{forwarding of X11} forwarding, of X11
194
195 \IM{X11 authentication} X11 authentication
196 \IM{X11 authentication} authentication, X11
197
198 \IM{pseudo-terminal allocation} pseudo-terminal allocation
199 \IM{pseudo-terminal allocation} pty allocation
200 \IM{pseudo-terminal allocation} allocation, of pseudo-terminal
201
202 \IM{ERASE special character} \cw{ERASE}, special character
203 \IM{ERASE special character} \cw{VERASE}, special character
204 \IM{QUIT special character} \cw{QUIT}, special character
205 \IM{QUIT special character} \cw{VQUIT}, special character
206
207 \IM{-telnet} \c{-telnet} command-line option
208 \IM{-raw} \c{-raw} command-line option
209 \IM{-rlogin} \c{-rlogin} command-line option
210 \IM{-ssh} \c{-ssh} command-line option
211 \IM{-serial} \c{-serial} command-line option
212 \IM{-cleanup} \c{-cleanup} command-line option
213 \IM{-load} \c{-load} command-line option
214 \IM{-v} \c{-v} command-line option
215 \IM{-l} \c{-l} command-line option
216 \IM{-L-upper} \c{-L} command-line option
217 \IM{-R-upper} \c{-R} command-line option
218 \IM{-D-upper} \c{-D} command-line option
219 \IM{-m} \c{-m} command-line option
220 \IM{-P-upper} \c{-P} command-line option
221 \IM{-pw} \c{-pw} command-line option
222 \IM{-A-upper} \c{-A} command-line option
223 \IM{-a} \c{-a} command-line option
224 \IM{-X-upper} \c{-X} command-line option
225 \IM{-x} \c{-x} command-line option
226 \IM{-T-upper} \c{-T} command-line option
227 \IM{-t} \c{-t} command-line option
228 \IM{-C-upper} \c{-C} command-line option
229 \IM{-N-upper} \c{-N} command-line option
230 \IM{-1} \c{-1} command-line option
231 \IM{-2} \c{-2} command-line option
232 \IM{-i} \c{-i} command-line option
233 \IM{-pgpfp} \c{-pgpfp} command-line option
234 \IM{-sercfg} \c{-sercfg} command-line option
235
236 \IM{removing registry entries} removing registry entries
237 \IM{removing registry entries} registry entries, removing
238
239 \IM{random seed file} random seed file
240 \IM{random seed file} \c{putty.rnd} (random seed file)
241
242 \IM{putty.rnd} \c{putty.rnd} (random seed file)
243
244 \IM{suppressing remote shell} remote shell, suppressing
245 \IM{suppressing remote shell} shell, remote, suppressing
246
247 \IM{SSH protocol version} SSH protocol version
248 \IM{SSH protocol version} protocol version, SSH
249 \IM{SSH protocol version} version, of SSH protocol
250
251 \IM{PPK} \cw{PPK} file
252 \IM{PPK} private key file, PuTTY
253
254 \IM{PGP key fingerprint} PGP key fingerprint
255 \IM{PGP key fingerprint} fingerprint, of PGP key
256
257 \IM{verifying new versions} verifying new versions of PuTTY
258 \IM{verifying new versions} new version, verifying
259 \IM{verifying new versions} upgraded version, verifying
260
261 \IM{connection}{network connection} network connection
262 \IM{connection}{network connection} connection, network
263
264 \IM{host name}{hostname} host name
265 \IM{host name}{hostname} DNS name
266 \IM{host name}{hostname} server name
267
268 \IM{IP address}{Internet address} IP address
269 \IM{IP address}{Internet address} address, IP
270
271 \IM{localhost} \c{localhost}
272
273 \IM{loopback IP address}{loopback address} loopback IP address
274 \IM{loopback IP address}{loopback address} IP address, loopback
275
276 \IM{listen address} listen address
277 \IM{listen address} bind address
278
279 \IM{DNS} DNS
280 \IM{DNS} Domain Name System
281
282 \IM{name resolution} name resolution
283 \IM{name resolution} DNS resolution
284 \IM{name resolution} host name resolution
285 \IM{name resolution} server name resolution
286
287 \IM{loading and storing saved sessions} sessions, loading and storing
288 \IM{loading and storing saved sessions} settings, loading and storing
289 \IM{loading and storing saved sessions} saving settings
290 \IM{loading and storing saved sessions} storing settings
291 \IM{loading and storing saved sessions} loading settings
292
293 \IM{Default Settings} Default Settings
294 \IM{Default Settings} settings, default
295
296 \IM{Registry} Registry (Windows)
297 \IM{Registry} Windows Registry
298
299 \IM{inactive window} inactive window
300 \IM{inactive window} window, inactive
301 \IM{inactive window} terminal window, inactive
302
303 \IM{SSH packet log} SSH packet log
304 \IM{SSH packet log} packet log, SSH
305
306 \IM{auto wrap mode}{auto wrap} auto wrap mode
307 \IM{auto wrap mode}{auto wrap} wrapping, automatic
308 \IM{auto wrap mode}{auto wrap} line wrapping, automatic
309
310 \IM{control sequence}{control codes} control sequences
311 \IM{control sequence}{control codes} terminal control sequences
312 \IM{control sequence}{control codes} escape sequences
313
314 \IM{cursor coordinates} cursor coordinates
315 \IM{cursor coordinates} coordinates, cursor
316
317 \IM{CR} CR (Carriage Return)
318 \IM{CR} Carriage Return
319
320 \IM{LF} LF (Line Feed)
321 \IM{LF} Line Feed
322
323 \IM{clear screen} clear screen
324 \IM{clear screen} erase screen
325 \IM{clear screen} screen, clearing
326
327 \IM{blinking text} blinking text
328 \IM{blinking text} flashing text
329
330 \IM{answerback} answerback string
331
332 \IM{local echo} local echo
333 \IM{local echo} echo, local
334
335 \IM{remote echo} remote echo
336 \IM{remote echo} echo, remote
337
338 \IM{local line editing} local line editing
339 \IM{local line editing} line editing, local
340
341 \IM{remote-controlled printing} ANSI printing
342 \IM{remote-controlled printing} remote-controlled printing
343 \IM{remote-controlled printing} printing, remote-controlled
344
345 \IM{Home and End keys} Home key
346 \IM{Home and End keys} End key
347
348 \IM{keypad} keypad, numeric
349 \IM{keypad} numeric keypad
350
351 \IM{Application Cursor Keys} Application Cursor Keys
352 \IM{Application Cursor Keys} cursor keys, \q{Application} mode
353
354 \IM{Application Keypad} Application Keypad
355 \IM{Application Keypad} keypad, \q{Application} mode
356 \IM{Application Keypad} numeric keypad, \q{Application} mode
357
358 \IM{Num Lock}{NumLock} Num Lock
359
360 \IM{NetHack keypad mode} NetHack keypad mode
361 \IM{NetHack keypad mode} keypad, NetHack mode
362
363 \IM{compose key} Compose key
364 \IM{compose key} DEC Compose key
365
366 \IM{terminal bell} terminal bell
367 \IM{terminal bell} bell, terminal
368 \IM{terminal bell} beep, terminal
369 \IM{terminal bell} feep
370
371 \IM{Windows Default Beep} Windows Default Beep sound
372 \IM{Windows Default Beep} Default Beep sound, Windows
373
374 \IM{terminal bell, disabling} terminal bell, disabling
375 \IM{terminal bell, disabling} bell, disabling
376
377 \IM{visual bell} visual bell
378 \IM{visual bell} bell, visual
379
380 \IM{PC speaker} PC speaker
381 \IM{PC speaker} beep, with PC speaker
382
383 \IM{sound file} sound file
384 \IM{sound file} \cw{WAV} file
385
386 \IM{bell overload} bell overload mode
387 \IM{bell overload} terminal bell overload mode
388
389 \IM{mouse reporting} mouse reporting
390 \IM{mouse reporting} \c{xterm} mouse reporting
391
392 \IM{links} \c{links} (web browser)
393
394 \IM{mc} \c{mc}
395 \IM{mc} Midnight Commander
396
397 \IM{terminal resizing}{window resizing} terminal resizing
398 \IM{terminal resizing}{window resizing} window resizing
399 \IM{terminal resizing}{window resizing} resizing, terminal
400
401 \IM{destructive backspace} destructive backspace
402 \IM{destructive backspace} non-destructive backspace
403 \IM{destructive backspace} backspace, destructive
404
405 \IM{Arabic text shaping} Arabic text shaping
406 \IM{Arabic text shaping} shaping, of Arabic text
407
408 \IM{Unicode} Unicode
409 \IM{Unicode} ISO-10646 (Unicode)
410
411 \IM{ASCII} ASCII
412 \IM{ASCII} US-ASCII
413
414 \IM{bidirectional text} bidirectional text
415 \IM{bidirectional text} right-to-left text
416
417 \IM{display becomes corrupted} display corruption
418 \IM{display becomes corrupted} corruption, of display
419
420 \IM{rows} rows, in terminal window
421 \IM{columns} columns, in terminal window
422
423 \IM{window size} window size
424 \IM{window size} size, of window
425
426 \IM{font size} font size
427 \IM{font size} size, of font
428
429 \IM{full screen}{full-screen} full-screen mode
430
431 \IM{cursor blinks} blinking cursor
432 \IM{cursor blinks} flashing cursor
433 \IM{cursor blinks} cursor, blinking
434
435 \IM{font} font
436 \IM{font} typeface
437
438 \IM{minimise} minimise window
439 \IM{minimise} window, minimising
440
441 \IM{maximise} maximise window
442 \IM{maximise} window, maximising
443
444 \IM{closing window}{close window} closing window
445 \IM{closing window}{close window} window, closing
446
447 \IM{Dragon NaturallySpeaking} Dragon NaturallySpeaking
448 \IM{Dragon NaturallySpeaking} NaturallySpeaking
449
450 \IM{AltGr} \q{AltGr} key
451 \IM{Alt} \q{Alt} key
452
453 \IM{CJK} CJK
454 \IM{CJK} Chinese
455 \IM{CJK} Japanese
456 \IM{CJK} Korean
457
458 \IM{East Asian Ambiguous characters} East Asian Ambiguous characters
459 \IM{East Asian Ambiguous characters} CJK ambiguous characters
460
461 \IM{character width} character width
462 \IM{character width} single-width character
463 \IM{character width} double-width character
464
465 \IM{Rich Text Format} Rich Text Format
466 \IM{Rich Text Format} RTF
467
468 \IM{bold}{bold text} bold text
469
470 \IM{colour}{colours} colour
471
472 \IM{8-bit colour} 8-bit colour
473 \IM{8-bit colour} colour, 8-bit
474
475 \IM{system colours} system colours
476 \IM{system colours} colours, system
477
478 \IM{ANSI colours} ANSI colours
479 \IM{ANSI colours} colours, ANSI
480
481 \IM{cursor colour} cursor colour
482 \IM{cursor colour} colour, of cursor
483
484 \IM{default background} background colour, default
485 \IM{default background} colour, background, default
486
487 \IM{default foreground} foreground colour, default
488 \IM{default foreground} colour, foreground, default
489
490 \IM{bold black} bold black
491 \IM{bold black} black, bold
492 \IM{bold black} bright black
493
494 \IM{TERM} \cw{TERM} environment variable
495
496 \IM{logical palettes} logical palettes
497 \IM{logical palettes} palettes, logical
498
499 \IM{breaks in connectivity} connectivity, breaks in
500 \IM{breaks in connectivity} intermittent connectivity
501
502 \IM{idle connections} idle connections
503 \IM{idle connections} timeout, of connections
504 \IM{idle connections} connections, idle
505
506 \IM{interactive connections}{interactive session} interactive connections
507 \IM{interactive connections}{interactive session} connections, interactive
508
509 \IM{keepalives} keepalives, application
510
511 \IM{Nagle's algorithm} Nagle's algorithm
512 \IM{Nagle's algorithm} \cw{TCP_NODELAY}
513
514 \IM{TCP keepalives} TCP keepalives
515 \IM{TCP keepalives} keepalives, TCP
516 \IM{TCP keepalives} \cw{SO_KEEPALIVE}
517
518 \IM{half-open connections} half-open connections
519 \IM{half-open connections} connections, half-open
520
521 \IM{auto-login username} user name, for auto-login
522 \IM{auto-login username} login name, for auto-login
523 \IM{auto-login username} account name, for auto-login
524
525 \IM{terminal emulation}{terminal-type} terminal emulation
526 \IM{terminal emulation}{terminal-type} emulation, terminal
527
528 \IM{terminal speed} terminal speed
529 \IM{terminal speed} speed, terminal
530 \IM{terminal speed} baud rate, of terminal
531
532 \IM{environment variables} environment variables
533 \IM{environment variables} variables, environment
534
535 \IM{proxy} proxy server
536 \IM{proxy} server, proxy
537
538 \IM{HTTP proxy} HTTP proxy
539 \IM{HTTP proxy} proxy, HTTP
540 \IM{HTTP proxy} server, HTTP
541 \IM{HTTP proxy} \cw{CONNECT} proxy (HTTP)
542
543 \IM{SOCKS server} SOCKS proxy
544 \IM{SOCKS server} server, SOCKS
545 \IM{SOCKS server} proxy, SOCKS
546
547 \IM{Telnet proxy} Telnet proxy
548 \IM{Telnet proxy} TCP proxy
549 \IM{Telnet proxy} ad-hoc proxy
550 \IM{Telnet proxy} proxy, Telnet
551
552 \IM{Local proxy} local proxy
553 \IM{Local proxy} proxy command
554 \IM{Local proxy} command, proxy
555
556 \IM{proxy DNS} proxy DNS
557 \IM{proxy DNS} DNS, with proxy
558 \IM{proxy DNS} name resolution, with proxy
559 \IM{proxy DNS} host name resolution, with proxy
560 \IM{proxy DNS} server name resolution, with proxy
561
562 \IM{proxy username} proxy user name
563 \IM{proxy username} user name, for proxy
564 \IM{proxy username} login name, for proxy
565 \IM{proxy username} account name, for proxy
566
567 \IM{proxy password} proxy password
568 \IM{proxy password} password, for proxy
569
570 \IM{proxy authentication} proxy authentication
571 \IM{proxy authentication} authentication, to proxy
572
573 \IM{HTTP basic} HTTP \q{basic} authentication
574 \IM{HTTP basic} \q{basic} authentication (HTTP)
575
576 \IM{plaintext password} plain text password
577 \IM{plaintext password} password, plain text
578
579 \IM{Telnet negotiation} Telnet option negotiation
580 \IM{Telnet negotiation} option negotiation, Telnet
581 \IM{Telnet negotiation} negotiation, of Telnet options
582
583 \IM{firewall}{firewalls} firewalls
584
585 \IM{NAT router}{NAT} NAT routers
586 \IM{NAT router}{NAT} routers, NAT
587 \IM{NAT router}{NAT} Network Address Translation
588 \IM{NAT router}{NAT} IP masquerading
589
590 \IM{Telnet New Line} Telnet New Line
591 \IM{Telnet New Line} new line, in Telnet
592
593 \IM{.rhosts} \c{.rhosts} file
594 \IM{.rhosts} \q{rhosts} file
595
596 \IM{passwordless login} passwordless login
597 \IM{passwordless login} login, passwordless
598
599 \IM{Windows user name} local user name, in Windows
600 \IM{Windows user name} user name, local, in Windows
601 \IM{Windows user name} login name, local, in Windows
602 \IM{Windows user name} account name, local, in Windows
603
604 \IM{local username in Rlogin} local user name, in Rlogin
605 \IM{local username in Rlogin} user name, local, in Rlogin
606 \IM{local username in Rlogin} login name, local, in Rlogin
607 \IM{local username in Rlogin} account name, local, in Rlogin
608
609 \IM{privileged port} privileged port
610 \IM{privileged port} low-numbered port
611 \IM{privileged port} port, privileged
612
613 \IM{remote shell} shell, remote
614 \IM{remote shell} remote shell
615
616 \IM{encryption}{encrypted}{encrypt} encryption
617
618 \IM{encryption algorithm} encryption algorithm
619 \IM{encryption algorithm} cipher algorithm
620 \IM{encryption algorithm} symmetric-key algorithm
621 \IM{encryption algorithm} algorithm, encryption
622
623 \IM{AES} AES
624 \IM{AES} Advanced Encryption Standard
625 \IM{AES} Rijndael
626
627 \IM{Arcfour} Arcfour
628 \IM{Arcfour} RC4
629
630 \IM{triple-DES} triple-DES
631
632 \IM{single-DES} single-DES
633 \IM{single-DES} DES
634
635 \IM{key exchange} key exchange
636 \IM{key exchange} kex
637
638 \IM{shared secret} shared secret
639 \IM{shared secret} secret, shared
640
641 \IM{key exchange algorithm} key exchange algorithm
642 \IM{key exchange algorithm} algorithm, key exchange
643
644 \IM{Diffie-Hellman key exchange} Diffie-Hellman key exchange
645 \IM{Diffie-Hellman key exchange} key exchange, Diffie-Hellman
646
647 \IM{group exchange} Diffie-Hellman group exchange
648 \IM{group exchange} group exchange, Diffie-Hellman
649
650 \IM{repeat key exchange} repeat key exchange
651 \IM{repeat key exchange} key exchange, repeat
652
653 \IM{challenge/response authentication} challenge/response authentication
654 \IM{challenge/response authentication} authentication, challenge/response
655
656 \IM{security token} security token
657 \IM{security token} token, security
658
659 \IM{one-time passwords} one-time passwords
660 \IM{one-time passwords} password, one-time
661
662 \IM{keyboard-interactive authentication} keyboard-interactive authentication
663 \IM{keyboard-interactive authentication} authentication, keyboard-interactive
664
665 \IM{password expiry} password expiry
666 \IM{password expiry} expiry, of passwords
667
668 \IM{public key authentication}{public-key authentication} public key authentication
669 \IM{public key authentication}{public-key authentication} RSA authentication
670 \IM{public key authentication}{public-key authentication} DSA authentication
671 \IM{public key authentication}{public-key authentication} authentication, public key
672
673 \IM{MIT-MAGIC-COOKIE-1} \cw{MIT-MAGIC-COOKIE-1}
674 \IM{MIT-MAGIC-COOKIE-1} magic cookie
675 \IM{MIT-MAGIC-COOKIE-1} cookie, magic
676
677 \IM{SSH server bugs} SSH server bugs
678 \IM{SSH server bugs} bugs, in SSH servers
679
680 \IM{ignore message} SSH \q{ignore} messages
681 \IM{ignore message} \q{ignore} messages, in SSH
682
683 \IM{message authentication code}{MAC} message authentication code (MAC)
684 \IM{message authentication code}{MAC} MAC (message authentication code)
685
686 \IM{signatures} signature
687 \IM{signatures} digital signature
688
689 \IM{storing configuration in a file} storing settings in a file
690 \IM{storing configuration in a file} saving settings in a file
691 \IM{storing configuration in a file} loading settings from a file
692
693 \IM{transferring files} transferring files
694 \IM{transferring files} files, transferring
695
696 \IM{receiving files}{download a file} receiving files
697 \IM{receiving files}{download a file} files, receiving
698 \IM{receiving files}{download a file} downloading files
699
700 \IM{sending files}{upload a file} sending files
701 \IM{sending files}{upload a file} files, sending
702 \IM{sending files}{upload a file} uploading files
703
704 \IM{listing files} listing files
705 \IM{listing files} files, listing
706
707 \IM{wildcard}{wildcards} wildcards
708 \IM{wildcard}{wildcards} glob (wildcard)
709
710 \IM{PATH} \c{PATH} environment variable
711
712 \IM{SFTP} SFTP
713 \IM{SFTP} SSH file transfer protocol
714
715 \IM{-unsafe} \c{-unsafe} PSCP command-line option
716 \IM{-ls-PSCP} \c{-ls} PSCP command-line option
717 \IM{-p-PSCP} \c{-p} PSCP command-line option
718 \IM{-q-PSCP} \c{-q} PSCP command-line option
719 \IM{-r-PSCP} \c{-r} PSCP command-line option
720 \IM{-batch-PSCP} \c{-batch} PSCP command-line option
721 \IM{-sftp} \c{-sftp} PSCP command-line option
722 \IM{-scp} \c{-scp} PSCP command-line option
723
724 \IM{return value} return value
725 \IM{return value} exit value
726
727 \IM{-b-PSFTP} \c{-b} PSFTP command-line option
728 \IM{-bc-PSFTP} \c{-bc} PSFTP command-line option
729 \IM{-be-PSFTP} \c{-be} PSFTP command-line option
730 \IM{-batch-PSFTP} \c{-batch} PSFTP command-line option
731
732 \IM{spaces in filenames} spaces in filenames
733 \IM{spaces in filenames} filenames containing spaces
734
735 \IM{working directory} working directory
736 \IM{working directory} current working directory
737
738 \IM{resuming file transfers} resuming file transfers
739 \IM{resuming file transfers} files, resuming transfer of
740
741 \IM{changing permissions on files} changing permissions on files
742 \IM{changing permissions on files} permissions on files, changing
743 \IM{changing permissions on files} files, changing permissions on
744 \IM{changing permissions on files} modes of files, changing
745 \IM{changing permissions on files} access to files, changing
746
747 \IM{deleting files} deleting files
748 \IM{deleting files} files, deleting
749 \IM{deleting files} removing files
750
751 \IM{create a directory} creating directories
752 \IM{create a directory} directories, creating
753
754 \IM{remove a directory} removing directories
755 \IM{remove a directory} directories, removing
756 \IM{remove a directory} deleting directories
757
758 \IM{rename remote files} renaming files
759 \IM{rename remote files} files, renaming and moving
760 \IM{rename remote files} moving files
761
762 \IM{local Windows command} local Windows command
763 \IM{local Windows command} Windows command
764
765 \IM{PLINK_PROTOCOL} \c{PLINK_PROTOCOL} environment variable
766
767 \IM{-batch-plink} \c{-batch} Plink command-line option
768 \IM{-s-plink} \c{-s} Plink command-line option
769
770 \IM{subsystem} subsystem, SSH
771 \IM{subsystem} SSH subsystem
772
773 \IM{batch file}{batch files} batch files
774
775 \IM{CVS_RSH} \c{CVS_RSH} environment variable
776
777 \IM{DSA} DSA
778 \IM{DSA} Digital Signature Standard
779
780 \IM{public-key algorithm} public-key algorithm
781 \IM{public-key algorithm} asymmetric key algorithm
782 \IM{public-key algorithm} algorithm, public-key
783
784 \IM{generating keys} generating key pairs
785 \IM{generating keys} creating key pairs
786 \IM{generating keys} key pairs, generating
787 \IM{generating keys} public keys, generating
788 \IM{generating keys} private keys, generating
789
790 \IM{authorized_keys file}{authorized_keys} \cw{authorized_keys} file
791
792 \IM{key fingerprint} fingerprint, of SSH authentication key
793 \IM{key fingerprint} public key fingerprint (SSH)
794 \IM{key fingerprint} SSH public key fingerprint
795
796 \IM{SSH-2 public key format} SSH-2 public key file format
797 \IM{SSH-2 public key format} public key file, SSH-2
798
799 \IM{OpenSSH private key format} OpenSSH private key file format
800 \IM{OpenSSH private key format} private key file, OpenSSH
801
802 \IM{ssh.com private key format} \cw{ssh.com} private key file format
803 \IM{ssh.com private key format} private key file, \cw{ssh.com}
804
805 \IM{importing keys} importing private keys
806 \IM{importing keys} loading private keys
807
808 \IM{export private keys} exporting private keys
809 \IM{export private keys} saving private keys
810
811 \IM{.ssh} \c{.ssh} directory
812
813 \IM{.ssh2} \c{.ssh2} directory
814
815 \IM{authentication agent} authentication agent
816 \IM{authentication agent} agent, authentication
817
818 \IM{-c-pageant} \c{-c} Pageant command-line option
819
820 \IM{FAQ} FAQ
821 \IM{FAQ} Frequently Asked Questions
822
823 \IM{supported features} supported features
824 \IM{supported features} features, supported
825
826 \IM{remember my password} storing passwords
827 \IM{remember my password} password, storing
828
829 \IM{login scripts}{startup scripts} login scripts
830 \IM{login scripts}{startup scripts} startup scripts
831
832 \IM{WS2_32.DLL} \cw{WS2_32.DLL}
833 \IM{WS2_32.DLL} WinSock version 2
834
835 \IM{Red Hat Linux} Red Hat Linux
836 \IM{Red Hat Linux} Linux, Red Hat
837
838 \IM{SMB} SMB
839 \IM{SMB} Windows file sharing
840
841 \IM{clean up} clean up after PuTTY
842 \IM{clean up} uninstalling
843
844 \IM{version of PuTTY} version, of PuTTY
845
846 \IM{GPG signatures} PGP signatures, of PuTTY binaries
847 \IM{GPG signatures} GPG signatures, of PuTTY binaries
848 \IM{GPG signatures} signatures, of PuTTY binaries
849
850 \IM{logical host name} logical host name
851 \IM{logical host name} host name, logical
852 \IM{logical host name} host key, caching policy
853
854 \IM{web browsers} web browser
855
856 \IM{GSSAPI credential delegation} GSSAPI credential delegation
857 \IM{GSSAPI credential delegation} credential delegation, GSSAPI
858 \IM{GSSAPI credential delegation} delegation, of GSSAPI credentials
859
860 \IM{SYSTEM32} \cw{SYSTEM32} directory, on Windows
861
862 \IM{64-bit Windows} 64-bit Windows
863 \IM{64-bit Windows} Windows, 64-bit