intro.but 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. \C{intro} Introduction to PuTTY
  2. PuTTY is a free SSH, Telnet and Rlogin client for 32-bit Windows
  3. systems.
  4. \H{you-what} What are SSH, Telnet and Rlogin?
  5. If you already know what SSH, Telnet and Rlogin are, you can safely
  6. skip on to the next section.
  7. SSH, Telnet and Rlogin are three ways of doing the same thing:
  8. logging in to a multi-user computer from another computer, over a
  9. network.
  10. Multi-user operating systems, such as Unix and VMS, usually present
  11. a \i{command-line interface} to the user, much like the \q{\i{Command
  12. Prompt}} or \q{\i{MS-DOS Prompt}} in Windows. The system prints a
  13. prompt, and you type commands which the system will obey.
  14. Using this type of interface, there is no need for you to be sitting
  15. at the same machine you are typing commands to. The commands, and
  16. responses, can be sent over a network, so you can sit at one
  17. computer and give commands to another one, or even to more than one.
  18. SSH, Telnet and Rlogin are \i\e{network protocols} that allow you to
  19. do this. On the computer you sit at, you run a \i\e{client}, which
  20. makes a network connection to the other computer (the \i\e{server}).
  21. The network connection carries your keystrokes and commands from the
  22. client to the server, and carries the server's responses back to
  23. you.
  24. These protocols can also be used for other types of keyboard-based
  25. interactive session. In particular, there are a lot of bulletin
  26. boards, \i{talker systems} and \i{MUDs} (Multi-User Dungeons) which support
  27. access using Telnet. There are even a few that support SSH.
  28. You might want to use SSH, Telnet or Rlogin if:
  29. \b you have an account on a Unix or VMS system which you want to be
  30. able to access from somewhere else
  31. \b your Internet Service Provider provides you with a login account
  32. on a \i{web server}. (This might also be known as a \i\e{shell account}.
  33. A \e{shell} is the program that runs on the server and interprets
  34. your commands for you.)
  35. \b you want to use a \i{bulletin board system}, talker or MUD which can
  36. be accessed using Telnet.
  37. You probably do \e{not} want to use SSH, Telnet or Rlogin if:
  38. \b you only use Windows. Windows computers have their own
  39. ways of networking between themselves, and unless you are doing
  40. something fairly unusual, you will not need to use any of these
  41. remote login protocols.
  42. \H{which-one} How do SSH, Telnet and Rlogin differ?
  43. This list summarises some of the \i{differences between SSH, Telnet
  44. and Rlogin}.
  45. \b SSH (which stands for \q{\i{secure shell}}) is a recently designed,
  46. high-security protocol. It uses strong cryptography to protect your
  47. connection against eavesdropping, hijacking and other attacks. Telnet
  48. and Rlogin are both older protocols offering minimal security.
  49. \b SSH and Rlogin both allow you to \I{passwordless login}log in to the
  50. server without having to type a password. (Rlogin's method of doing this is
  51. insecure, and can allow an attacker to access your account on the
  52. server. SSH's method is much more secure, and typically breaking the
  53. security requires the attacker to have gained access to your actual
  54. client machine.)
  55. \b SSH allows you to connect to the server and automatically send a
  56. command, so that the server will run that command and then
  57. disconnect. So you can use it in automated processing.
  58. The Internet is a hostile environment and security is everybody's
  59. responsibility. If you are connecting across the open Internet, then
  60. we recommend you use SSH. If the server you want to connect to
  61. doesn't support SSH, it might be worth trying to persuade the
  62. administrator to install it.
  63. If your client and server are both behind the same (good) firewall,
  64. it is more likely to be safe to use Telnet or Rlogin, but we still
  65. recommend you use SSH.