\c Z:\sysosd>plink
\c PuTTY Link: command-line connection utility
-\c Release 0.63
+\c Release 0.XX
\c Usage: plink [options] [user@]host [command]
\c ("host" can also be a PuTTY saved session name)
\c Options:
\c -P port connect to specified port
\c -l user connect with specified username
\c -batch disable all interactive prompts
+\c -sercfg configuration-string (e.g. 19200,8,n,1,X)
+\c Specify the serial configuration (serial only)
\c The following options only apply to SSH connections:
\c -pw passw login with specified password
\c -D [listen-IP:]listen-port
\c -1 -2 force use of particular protocol version
\c -4 -6 force use of IPv4 or IPv6
\c -C enable compression
-\c -i key private key file for authentication
+\c -i key private key file for user authentication
\c -noagent disable use of Pageant
\c -agent enable use of Pageant
+\c -hostkey aa:bb:cc:...
+\c manually specify a host key (may be repeated)
\c -m file read remote command(s) from file
\c -s remote command is an SSH subsystem (SSH-2 only)
\c -N don't start a shell/command (SSH-2 only)
\c -nc host:port
\c open tunnel in place of session (SSH-2 only)
-\c -sercfg configuration-string (e.g. 19200,8,n,1,X)
-\c Specify the serial configuration (serial only)
Once this works, you are ready to use Plink.
\c Z:\owendadmin>pscp
\c PuTTY Secure Copy client
-\c Release 0.63
+\c Release 0.XX
\c Usage: pscp [options] [user@]host:source target
\c pscp [options] source [source...] [user@]host:target
\c pscp [options] -ls [user@]host:filespec
\c -1 -2 force use of particular SSH protocol version
\c -4 -6 force use of IPv4 or IPv6
\c -C enable compression
-\c -i key private key file for authentication
+\c -i key private key file for user authentication
\c -noagent disable use of Pageant
\c -agent enable use of Pageant
+\c -hostkey aa:bb:cc:...
+\c manually specify a host key (may be repeated)
\c -batch disable all interactive prompts
\c -unsafe allow server-side wildcards (DANGEROUS)
\c -sftp force use of SFTP protocol