-\versionid $Id: gs.but,v 1.7 2004/04/08 12:38:53 simon Exp $
+\define{versionidgs} \versionid $Id$
\C{gs} Getting started with PuTTY
differences between the three protocols, and advice on which one to
use. The fourth protocol, \I{raw protocol}\e{Raw}, is not used for
interactive login sessions; you would usually use this for debugging
-other Internet services.
+other Internet services (see \k{using-rawprot}).
When you change the selected protocol, the number in the \q{Port}
box will change. This is normal: it happens because the various
\c The server's host key is not cached in the registry. You
\c have no guarantee that the server is the computer you
\c think it is.
-\c The server's key fingerprint is:
+\c The server's rsa2 key fingerprint is:
\c ssh-rsa 1024 7b:e5:6f:a7:f4:f9:81:62:5c:e3:1f:bf:8b:57:6c:5a
\c If you trust this host, hit Yes to add the key to
\c PuTTY's cache and carry on connecting.
If you are using SSH, be careful not to type your username wrongly,
because you will not have a chance to correct it after you press
-Return. This is an unfortunate feature of the SSH protocol: it does
-not allow you to make two login attempts using \i{different
-usernames}. If you type your username wrongly, you must close PuTTY
-and start again.
+Return; many SSH servers do not permit you to make two login attempts
+using \i{different usernames}. If you type your username wrongly, you
+must close PuTTY and start again.
If your password is refused but you are sure you have typed it
correctly, check that Caps Lock is not enabled. Many login servers,