index.but 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974
  1. \IM{Unix version} Unix version of PuTTY tools
  2. \IM{Unix version} Linux version of PuTTY tools
  3. \IM{Unix} Unix
  4. \IM{Unix} Linux
  5. \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} Command Prompt
  6. \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} MS-DOS Prompt
  7. \IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} console window
  8. \IM{spoof}{spoofed}{spoofing} spoofing
  9. \IM{verifying the host key} verifying the host key
  10. \IM{verifying the host key} host key, verifying
  11. \IM{trusting host keys} trusting host keys
  12. \IM{trusting host keys} host keys, trusting
  13. \IM{host key fingerprint} fingerprint, of SSH host key
  14. \IM{host key fingerprint} host key fingerprint (SSH)
  15. \IM{host key fingerprint} SSH host key fingerprint
  16. \IM{MD5 fingerprint} MD5 fingerprint, of SSH host key
  17. \IM{MD5 fingerprint} fingerprint, MD5, of SSH host key
  18. \IM{SHA256 fingerprint} SHA-256 fingerprint, of SSH host key
  19. \IM{SHA256 fingerprint} fingerprint, SHA-256, of SSH host key
  20. \IM{manually configuring host keys} manually configuring host keys
  21. \IM{manually configuring host keys} overriding host keys
  22. \IM{manually configuring host keys} host keys, manually configuring
  23. \IM{starting a session} starting a session
  24. \IM{starting a session} session, starting
  25. \IM{commands on the server}{remote command} commands on the server
  26. \IM{commands on the server}{remote command} remote commands
  27. \IM{commands on the server}{remote command} server, commands on
  28. \IM{mistyping a password} mistyping a password
  29. \IM{mistyping a password} password, mistyping
  30. \IM{different usernames}{changes of username} different user names
  31. \IM{different usernames}{changes of username} changing user names
  32. \IM{different usernames}{changes of username} user names, different
  33. \IM{different usernames}{changes of username} login names, different
  34. \IM{different usernames}{changes of username} account names, different
  35. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} differences between
  36. SSH, Telnet, Rlogin, and SUPDUP
  37. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} protocols,
  38. differences between
  39. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} SSH, differences
  40. from other protocols
  41. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} Telnet, differences
  42. from other protocols
  43. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} Rlogin, differences
  44. from other protocols
  45. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} SUPDUP, differences
  46. from other protocols
  47. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} selecting a protocol
  48. \IM{differences between SSH, Telnet, Rlogin, and SUPDUP} choosing a protocol
  49. \IM{MUD}{MUDs} MUDs
  50. \IM{talker}{talker systems} talker systems
  51. \IM{security hazard}{security risk} security hazard
  52. \IM{SSH-2}{SSH protocol version 2} SSH-2
  53. \IM{terminal window}{PuTTY window} terminal window
  54. \IM{terminal window}{PuTTY window} PuTTY terminal window
  55. \IM{terminal window}{PuTTY window} window, terminal
  56. \IM{copy and paste} copy and paste
  57. \IM{copy and paste} cut and paste
  58. \IM{copy and paste} paste, copy and
  59. \IM{bracketed paste} paste, bracketed
  60. \IM{three-button mouse} three-button mouse
  61. \IM{three-button mouse} mouse, three-button
  62. \IM{left mouse button}{left button} left mouse button
  63. \IM{middle mouse button}{middle button}{middle-clicking} middle mouse button
  64. \IM{right mouse button}{right button} right mouse button
  65. \IM{selecting words}{word-by-word selection} selecting whole words
  66. \IM{selecting words}{word-by-word selection} words, selecting
  67. \IM{selecting lines} selecting whole lines
  68. \IM{selecting lines} lines, selecting
  69. \IM{rectangular selection} rectangular selection
  70. \IM{rectangular selection} selection, rectangular
  71. \IM{adjusting a selection} adjusting a selection
  72. \IM{adjusting a selection} extending a selection
  73. \IM{adjusting a selection} selection, adjusting
  74. \IM{right mouse button, with Ctrl} right mouse button, with Ctrl
  75. \IM{right mouse button, with Ctrl} Ctrl, with right mouse button
  76. \IM{selections} selections, multiple
  77. \IM{selections} clipboards, multiple
  78. \IM{PRIMARY} \c{PRIMARY} selection
  79. \IM{PRIMARY} selection, \c{PRIMARY}
  80. \IM{CLIPBOARD selection} \c{CLIPBOARD} selection
  81. \IM{CLIPBOARD selection} selection, \c{CLIPBOARD}
  82. \IM{SECONDARY} \c{SECONDARY} selection
  83. \IM{SECONDARY} selection, \c{SECONDARY}
  84. \IM{system menu} system menu
  85. \IM{system menu} menu, system
  86. \IM{system menu} window menu
  87. \IM{context menu} context menu
  88. \IM{context menu} menu, context
  89. \IM{context menu} right mouse button menu
  90. \IM{Event Log} Event Log
  91. \IM{Event Log} PuTTY Event Log
  92. \IM{Event Log} Log, Event
  93. \IM{Telnet special commands} Telnet special commands
  94. \IM{Telnet special commands} special commands, in Telnet
  95. \IM{SSH special commands} SSH special commands
  96. \IM{SSH special commands} special commands, in SSH
  97. \IM{Repeat key exchange, SSH special command} Repeat key exchange, SSH special command
  98. \IM{Repeat key exchange, SSH special command} key exchange, forcing repeat
  99. \IM{Repeat key exchange, SSH special command} SSH key exchange, forcing repeat
  100. \IM{accented characters} accented characters
  101. \IM{accented characters} characters, accented
  102. \IM{line-drawing characters} line-drawing characters
  103. \IM{line-drawing characters} box-drawing characters
  104. \IM{line-drawing characters} characters, line-drawing
  105. \IM{line-drawing characters} ANSI graphics
  106. \IM{port forwarding}{port forwardings} port forwarding in SSH
  107. \IM{port forwarding}{port forwardings} SSH port forwarding
  108. \IM{port forwarding}{port forwardings} forwarding ports in SSH
  109. \IM{port forwarding}{port forwardings} tunnelling using SSH
  110. \IM{port forwarding}{port forwardings} SSH tunnelling
  111. \IM{port forwarding, changing mid-session} port forwarding in SSH, changing mid-session
  112. \IM{port forwarding, changing mid-session} SSH port forwarding, changing mid-session
  113. \IM{port forwarding, changing mid-session} forwarding ports in SSH, changing mid-session
  114. \IM{port forwarding, changing mid-session} tunnelling using SSH, changing mid-session
  115. \IM{port forwarding, changing mid-session} SSH tunnelling, changing mid-session
  116. \IM{local port forwarding} local-to-remote port forwarding
  117. \IM{remote port forwarding} remote-to-local port forwarding
  118. \IM{dynamic port forwarding} dynamic port forwarding
  119. \IM{dynamic port forwarding} SOCKS port forwarding
  120. \IM{debugging Internet protocols} debugging Internet protocols
  121. \IM{debugging Internet protocols} Internet protocols, debugging
  122. \IM{debugging Internet protocols} protocols, debugging
  123. \IM{Internet protocol version} Internet Protocol version
  124. \IM{Internet protocol version} version, of Internet Protocol
  125. \IM{raw TCP connections} raw TCP connections
  126. \IM{raw TCP connections} TCP connections, raw
  127. \IM{command-line arguments} command-line arguments
  128. \IM{command-line arguments} arguments, command-line
  129. \IM{command-line arguments} options, command-line
  130. \IM{command-line arguments} switches, command-line
  131. \IM{Windows shortcut} Windows shortcut
  132. \IM{Windows shortcut} shortcut, Windows
  133. \IM{telnet URLs} Telnet URLs
  134. \IM{telnet URLs} URLs, Telnet
  135. \IM{saved sessions, loading from command line} saved sessions,
  136. loading from command line
  137. \IM{saved sessions, loading from command line} loading saved
  138. sessions from command line
  139. \IM{saved sessions, loading from command line} command line, loading
  140. saved sessions from
  141. \IM{putty @sessionname} \c{putty @sessionname}
  142. \IM{putty @sessionname} \c{@sessionname} command-line argument
  143. \IM{protocol selection} protocol selection
  144. \IM{protocol selection} selecting a protocol
  145. \IM{protocol selection} choosing a protocol
  146. \IM{ssh-connection} bare \cw{ssh-connection} protocol
  147. \IM{ssh-connection} \cw{ssh-connection} protocol, bare
  148. \IM{psusan} \cq{psusan} program
  149. \IM{login name}{username} login name
  150. \IM{login name}{username} user name
  151. \IM{login name}{username} account name
  152. \IM{reading commands from a file} reading commands from a file
  153. \IM{reading commands from a file} commands, reading from a file
  154. \IM{agent forwarding} agent forwarding
  155. \IM{agent forwarding} authentication agent forwarding
  156. \IM{agent forwarding} SSH agent forwarding
  157. \IM{agent forwarding} forwarding, SSH agent
  158. \IM{X11 forwarding}{forwarding of X11} X11 forwarding
  159. \IM{X11 forwarding}{forwarding of X11} SSH X11 forwarding
  160. \IM{X11 forwarding}{forwarding of X11} forwarding, of X11
  161. \IM{X11 authentication} X11 authentication
  162. \IM{X11 authentication} authentication, X11
  163. \IM{pseudo-terminal allocation} pseudo-terminal allocation
  164. \IM{pseudo-terminal allocation} pty allocation
  165. \IM{pseudo-terminal allocation} allocation, of pseudo-terminal
  166. \IM{ERASE special character} \cw{ERASE}, special character
  167. \IM{ERASE special character} \cw{VERASE}, special character
  168. \IM{QUIT special character} \cw{QUIT}, special character
  169. \IM{QUIT special character} \cw{VQUIT}, special character
  170. \IM{-telnet} \c{-telnet} command-line option
  171. \IM{-raw} \c{-raw} command-line option
  172. \IM{-rlogin} \c{-rlogin} command-line option
  173. \IM{-supdup} \c{-supdup} command-line option
  174. \IM{-ssh} \c{-ssh} command-line option
  175. \IM{-ssh-connection} \c{-ssh-connection} command-line option
  176. \IM{-serial} \c{-serial} command-line option
  177. \IM{-cleanup} \c{-cleanup} command-line option
  178. \IM{-load} \c{-load} command-line option
  179. \IM{-v} \c{-v} command-line option
  180. \IM{-l} \c{-l} command-line option
  181. \IM{-L-upper} \c{-L} command-line option
  182. \IM{-R-upper} \c{-R} command-line option
  183. \IM{-D-upper} \c{-D} command-line option
  184. \IM{-m} \c{-m} command-line option
  185. \IM{-P-upper} \c{-P} command-line option
  186. \IM{-pw} \c{-pw} command-line option
  187. \IM{-pwfile} \c{-pwfile} command-line option
  188. \IM{-A-upper} \c{-A} command-line option
  189. \IM{-a} \c{-a} command-line option
  190. \IM{-X-upper} \c{-X} command-line option
  191. \IM{-x} \c{-x} command-line option
  192. \IM{-T-upper} \c{-T} command-line option
  193. \IM{-t} \c{-t} command-line option
  194. \IM{-C-upper} \c{-C} command-line option
  195. \IM{-N-upper} \c{-N} command-line option
  196. \IM{-1} \c{-1} command-line option
  197. \IM{-2} \c{-2} command-line option
  198. \IM{-i} \c{-i} command-line option
  199. \IM{-pgpfp} \c{-pgpfp} command-line option
  200. \IM{-sercfg} \c{-sercfg} command-line option
  201. \IM{removing registry entries} removing registry entries
  202. \IM{removing registry entries} registry entries, removing
  203. \IM{random seed file} random seed file
  204. \IM{random seed file} \c{putty.rnd} (random seed file)
  205. \IM{putty.rnd} \c{putty.rnd} (random seed file)
  206. \IM{suppressing remote shell} remote shell, suppressing
  207. \IM{suppressing remote shell} shell, remote, suppressing
  208. \IM{SSH protocol version} SSH protocol version
  209. \IM{SSH protocol version} protocol version, SSH
  210. \IM{SSH protocol version} version, of SSH protocol
  211. \IM{PPK} \cw{PPK} file
  212. \IM{PPK} private key file, PuTTY
  213. \IM{Argon2} Argon2 passphrase hashing function
  214. \IM{passphrase hashing} passphrase hashing, for private key files
  215. \IM{passphrase hashing} password hashing, for private key files
  216. \IM{PGP key fingerprint} PGP key fingerprint
  217. \IM{PGP key fingerprint} fingerprint, of PGP key
  218. \IM{verifying new versions} verifying new versions of PuTTY
  219. \IM{verifying new versions} new version, verifying
  220. \IM{verifying new versions} upgraded version, verifying
  221. \IM{connection}{network connection} network connection
  222. \IM{connection}{network connection} connection, network
  223. \IM{host name}{hostname} host name
  224. \IM{host name}{hostname} DNS name
  225. \IM{host name}{hostname} server name
  226. \IM{IP address}{Internet address} IP address
  227. \IM{IP address}{Internet address} address, IP
  228. \IM{localhost} \c{localhost}
  229. \IM{loopback IP address}{loopback address} loopback IP address
  230. \IM{loopback IP address}{loopback address} IP address, loopback
  231. \IM{listen address} listen address
  232. \IM{listen address} bind address
  233. \IM{DNS} DNS
  234. \IM{DNS} Domain Name System
  235. \IM{name resolution} name resolution
  236. \IM{name resolution} DNS resolution
  237. \IM{name resolution} host name resolution
  238. \IM{name resolution} server name resolution
  239. \IM{loading and storing saved sessions} sessions, loading and storing
  240. \IM{loading and storing saved sessions} settings, loading and storing
  241. \IM{loading and storing saved sessions} saving settings
  242. \IM{loading and storing saved sessions} storing settings
  243. \IM{loading and storing saved sessions} loading settings
  244. \IM{Default Settings} Default Settings
  245. \IM{Default Settings} settings, default
  246. \IM{Registry} Registry (Windows)
  247. \IM{Registry} Windows Registry
  248. \IM{inactive window} inactive window
  249. \IM{inactive window} window, inactive
  250. \IM{inactive window} terminal window, inactive
  251. \IM{SSH packet log} SSH packet log
  252. \IM{SSH packet log} packet log, SSH
  253. \IM{auto wrap mode}{auto wrap} auto wrap mode
  254. \IM{auto wrap mode}{auto wrap} wrapping, automatic
  255. \IM{auto wrap mode}{auto wrap} line wrapping, automatic
  256. \IM{control sequence}{control codes} control sequences
  257. \IM{control sequence}{control codes} terminal control sequences
  258. \IM{control sequence}{control codes} escape sequences
  259. \IM{cursor coordinates} cursor coordinates
  260. \IM{cursor coordinates} coordinates, cursor
  261. \IM{CR} CR (Carriage Return)
  262. \IM{CR} Carriage Return
  263. \IM{LF} LF (Line Feed)
  264. \IM{LF} Line Feed
  265. \IM{clear screen} clear screen
  266. \IM{clear screen} erase screen
  267. \IM{clear screen} screen, clearing
  268. \IM{blinking text} blinking text
  269. \IM{blinking text} flashing text
  270. \IM{answerback} answerback string
  271. \IM{local echo} local echo
  272. \IM{local echo} echo, local
  273. \IM{remote echo} remote echo
  274. \IM{remote echo} echo, remote
  275. \IM{local line editing} local line editing
  276. \IM{local line editing} line editing, local
  277. \IM{remote-controlled printing} ANSI printing
  278. \IM{remote-controlled printing} remote-controlled printing
  279. \IM{remote-controlled printing} printing, remote-controlled
  280. \IM{remote-controlled printing} passthrough printing
  281. \IM{Control-H} Control-H
  282. \IM{Control-H} Ctrl-H
  283. \IM{Control-?} Control-?
  284. \IM{Control-?} Ctrl-?
  285. \IM{Home and End keys} Home key
  286. \IM{Home and End keys} End key
  287. \IM{keypad} keypad, numeric
  288. \IM{keypad} numeric keypad
  289. \IM{Application Cursor Keys} Application Cursor Keys
  290. \IM{Application Cursor Keys} cursor keys, \q{Application} mode
  291. \IM{Application Keypad} Application Keypad
  292. \IM{Application Keypad} keypad, \q{Application} mode
  293. \IM{Application Keypad} numeric keypad, \q{Application} mode
  294. \IM{Num Lock}{NumLock} Num Lock
  295. \IM{NetHack keypad mode} NetHack keypad mode
  296. \IM{NetHack keypad mode} keypad, NetHack mode
  297. \IM{compose key} Compose key
  298. \IM{compose key} DEC Compose key
  299. \IM{terminal bell} terminal bell
  300. \IM{terminal bell} bell, terminal
  301. \IM{terminal bell} beep, terminal
  302. \IM{terminal bell} feep
  303. \IM{Windows Default Beep} Windows Default Beep sound
  304. \IM{Windows Default Beep} Default Beep sound, Windows
  305. \IM{terminal bell, disabling} terminal bell, disabling
  306. \IM{terminal bell, disabling} bell, disabling
  307. \IM{visual bell} visual bell
  308. \IM{visual bell} bell, visual
  309. \IM{PC speaker} PC speaker
  310. \IM{PC speaker} beep, with PC speaker
  311. \IM{sound file} sound file
  312. \IM{sound file} \cw{WAV} file
  313. \IM{bell overload} bell overload mode
  314. \IM{bell overload} terminal bell overload mode
  315. \IM{mouse reporting} mouse reporting
  316. \IM{mouse reporting} \c{xterm} mouse reporting
  317. \IM{links} \c{links} (web browser)
  318. \IM{mc} \c{mc}
  319. \IM{mc} Midnight Commander
  320. \IM{terminal resizing}{window resizing} terminal resizing
  321. \IM{terminal resizing}{window resizing} window resizing
  322. \IM{terminal resizing}{window resizing} resizing, terminal
  323. \IM{destructive backspace} destructive backspace
  324. \IM{destructive backspace} non-destructive backspace
  325. \IM{destructive backspace} backspace, destructive
  326. \IM{Arabic text shaping} Arabic text shaping
  327. \IM{Arabic text shaping} shaping, of Arabic text
  328. \IM{Unicode} Unicode
  329. \IM{Unicode} ISO-10646 (Unicode)
  330. \IM{ASCII} ASCII
  331. \IM{ASCII} US-ASCII
  332. \IM{bidirectional text} bidirectional text
  333. \IM{bidirectional text} right-to-left text
  334. \IM{display becomes corrupted} display corruption
  335. \IM{display becomes corrupted} corruption, of display
  336. \IM{rows} rows, in terminal window
  337. \IM{columns} columns, in terminal window
  338. \IM{window size} window size
  339. \IM{window size} size, of window
  340. \IM{font size} font size
  341. \IM{font size} size, of font
  342. \IM{full screen}{full-screen} full-screen mode
  343. \IM{cursor blinks} blinking cursor
  344. \IM{cursor blinks} flashing cursor
  345. \IM{cursor blinks} cursor, blinking
  346. \IM{font} font
  347. \IM{font} typeface
  348. \IM{minimise} minimise window
  349. \IM{minimise} window, minimising
  350. \IM{maximise} maximise window
  351. \IM{maximise} window, maximising
  352. \IM{closing window}{close window} closing window
  353. \IM{closing window}{close window} window, closing
  354. \IM{Dragon NaturallySpeaking} Dragon NaturallySpeaking
  355. \IM{Dragon NaturallySpeaking} NaturallySpeaking
  356. \IM{AltGr} \q{AltGr} key
  357. \IM{Alt} \q{Alt} key
  358. \IM{CJK} CJK
  359. \IM{CJK} Chinese
  360. \IM{CJK} Japanese
  361. \IM{CJK} Korean
  362. \IM{East Asian Ambiguous characters} East Asian Ambiguous characters
  363. \IM{East Asian Ambiguous characters} CJK ambiguous characters
  364. \IM{character width} character width
  365. \IM{character width} single-width character
  366. \IM{character width} double-width character
  367. \IM{Rich Text Format} Rich Text Format
  368. \IM{Rich Text Format} RTF
  369. \IM{bold}{bold text} bold text
  370. \IM{colour}{colours} colour
  371. \IM{8-bit colour} 8-bit colour
  372. \IM{8-bit colour} colour, 8-bit
  373. \IM{system colours} system colours
  374. \IM{system colours} colours, system
  375. \IM{ANSI colours} ANSI colours
  376. \IM{ANSI colours} colours, ANSI
  377. \IM{cursor colour} cursor colour
  378. \IM{cursor colour} colour, of cursor
  379. \IM{default background} background colour, default
  380. \IM{default background} colour, background, default
  381. \IM{default foreground} foreground colour, default
  382. \IM{default foreground} colour, foreground, default
  383. \IM{bold black} bold black
  384. \IM{bold black} black, bold
  385. \IM{bold black} bright black
  386. \IM{TERM} \cw{TERM} environment variable
  387. \IM{logical palettes} logical palettes
  388. \IM{logical palettes} palettes, logical
  389. \IM{breaks in connectivity} connectivity, breaks in
  390. \IM{breaks in connectivity} intermittent connectivity
  391. \IM{idle connections} idle connections
  392. \IM{idle connections} timeout, of connections
  393. \IM{idle connections} connections, idle
  394. \IM{interactive connections}{interactive session} interactive connections
  395. \IM{interactive connections}{interactive session} connections, interactive
  396. \IM{keepalives} keepalives, application
  397. \IM{Nagle's algorithm} Nagle's algorithm
  398. \IM{Nagle's algorithm} \cw{TCP_NODELAY}
  399. \IM{TCP keepalives} TCP keepalives
  400. \IM{TCP keepalives} keepalives, TCP
  401. \IM{TCP keepalives} \cw{SO_KEEPALIVE}
  402. \IM{half-open connections} half-open connections
  403. \IM{half-open connections} connections, half-open
  404. \IM{auto-login username} user name, for auto-login
  405. \IM{auto-login username} login name, for auto-login
  406. \IM{auto-login username} account name, for auto-login
  407. \IM{terminal emulation}{terminal-type} terminal emulation
  408. \IM{terminal emulation}{terminal-type} emulation, terminal
  409. \IM{terminal speed} terminal speed
  410. \IM{terminal speed} speed, terminal
  411. \IM{terminal speed} baud rate, of terminal
  412. \IM{environment variables} environment variables
  413. \IM{environment variables} variables, environment
  414. \IM{proxy} proxy server
  415. \IM{proxy} server, proxy
  416. \IM{HTTP proxy} HTTP proxy
  417. \IM{HTTP proxy} proxy, HTTP
  418. \IM{HTTP proxy} server, HTTP
  419. \IM{HTTP proxy} \cw{CONNECT} proxy (HTTP)
  420. \IM{SOCKS server} SOCKS proxy
  421. \IM{SOCKS server} server, SOCKS
  422. \IM{SOCKS server} proxy, SOCKS
  423. \IM{Telnet proxy} Telnet proxy
  424. \IM{Telnet proxy} TCP proxy
  425. \IM{Telnet proxy} ad-hoc proxy
  426. \IM{Telnet proxy} proxy, Telnet
  427. \IM{Local proxy} local proxy
  428. \IM{Local proxy} proxy command
  429. \IM{Local proxy} command, proxy
  430. \IM{proxy DNS} proxy DNS
  431. \IM{proxy DNS} DNS, with proxy
  432. \IM{proxy DNS} name resolution, with proxy
  433. \IM{proxy DNS} host name resolution, with proxy
  434. \IM{proxy DNS} server name resolution, with proxy
  435. \IM{proxy username} proxy user name
  436. \IM{proxy username} user name, for proxy
  437. \IM{proxy username} login name, for proxy
  438. \IM{proxy username} account name, for proxy
  439. \IM{proxy password} proxy password
  440. \IM{proxy password} password, for proxy
  441. \IM{proxy authentication} proxy authentication
  442. \IM{proxy authentication} authentication, to proxy
  443. \IM{HTTP Basic} HTTP Basic authentication
  444. \IM{HTTP Basic} \q{basic} authentication (HTTP)
  445. \IM{HTTP Digest} HTTP Digest authentication
  446. \IM{HTTP Digest} \q{digest} authentication (HTTP)
  447. \IM{plaintext password} plain text password
  448. \IM{plaintext password} password, plain text
  449. \IM{Telnet negotiation} Telnet option negotiation
  450. \IM{Telnet negotiation} option negotiation, Telnet
  451. \IM{Telnet negotiation} negotiation, of Telnet options
  452. \IM{firewall}{firewalls} firewalls
  453. \IM{NAT router}{NAT} NAT routers
  454. \IM{NAT router}{NAT} routers, NAT
  455. \IM{NAT router}{NAT} Network Address Translation
  456. \IM{NAT router}{NAT} IP masquerading
  457. \IM{Telnet New Line} Telnet New Line
  458. \IM{Telnet New Line} new line, in Telnet
  459. \IM{.rhosts} \c{.rhosts} file
  460. \IM{.rhosts} \q{rhosts} file
  461. \IM{passwordless login} passwordless login
  462. \IM{passwordless login} login, passwordless
  463. \IM{Windows user name} local user name, in Windows
  464. \IM{Windows user name} user name, local, in Windows
  465. \IM{Windows user name} login name, local, in Windows
  466. \IM{Windows user name} account name, local, in Windows
  467. \IM{local username in Rlogin} local user name, in Rlogin
  468. \IM{local username in Rlogin} user name, local, in Rlogin
  469. \IM{local username in Rlogin} login name, local, in Rlogin
  470. \IM{local username in Rlogin} account name, local, in Rlogin
  471. \IM{privileged port} privileged port
  472. \IM{privileged port} low-numbered port
  473. \IM{privileged port} port, privileged
  474. \IM{remote shell} shell, remote
  475. \IM{remote shell} remote shell
  476. \IM{encryption}{encrypted}{encrypt} encryption
  477. \IM{encryption algorithm} encryption algorithm
  478. \IM{encryption algorithm} cipher algorithm
  479. \IM{encryption algorithm} symmetric-key algorithm
  480. \IM{encryption algorithm} algorithm, encryption
  481. \IM{AES} AES
  482. \IM{AES} Advanced Encryption Standard
  483. \IM{AES} Rijndael
  484. \IM{Arcfour} Arcfour
  485. \IM{Arcfour} RC4
  486. \IM{triple-DES} triple-DES
  487. \IM{single-DES} single-DES
  488. \IM{single-DES} DES
  489. \IM{key exchange} key exchange
  490. \IM{key exchange} kex
  491. \IM{shared secret} shared secret
  492. \IM{shared secret} secret, shared
  493. \IM{key exchange algorithm} key exchange algorithm
  494. \IM{key exchange algorithm} algorithm, key exchange
  495. \IM{Diffie-Hellman key exchange} Diffie-Hellman key exchange
  496. \IM{Diffie-Hellman key exchange} key exchange, Diffie-Hellman
  497. \IM{group exchange} Diffie-Hellman group exchange
  498. \IM{group exchange} group exchange, Diffie-Hellman
  499. \IM{ECDH} \q{ECDH} (elliptic-curve Diffie-Hellman)
  500. \IM{ECDH} elliptic-curve Diffie-Hellman key exchange
  501. \IM{ECDH} key exchange, elliptic-curve Diffie-Hellman
  502. \IM{ECDH} Diffie-Hellman key exchange, with elliptic curves
  503. \IM{Streamlined NTRU Prime} Streamlined NTRU Prime
  504. \IM{Streamlined NTRU Prime} NTRU Prime
  505. \IM{quantum attacks} quantum attacks, resistance to
  506. \IM{repeat key exchange} repeat key exchange
  507. \IM{repeat key exchange} key exchange, repeat
  508. \IM{challenge/response authentication} challenge/response authentication
  509. \IM{challenge/response authentication} authentication, challenge/response
  510. \IM{security token} security token
  511. \IM{security token} token, security
  512. \IM{one-time passwords} one-time passwords
  513. \IM{one-time passwords} password, one-time
  514. \IM{keyboard-interactive authentication} keyboard-interactive authentication
  515. \IM{keyboard-interactive authentication} authentication, keyboard-interactive
  516. \IM{password expiry} password expiry
  517. \IM{password expiry} expiry, of passwords
  518. \IM{public key authentication}{public-key authentication} public key authentication
  519. \IM{public key authentication}{public-key authentication} RSA authentication
  520. \IM{public key authentication}{public-key authentication} DSA authentication
  521. \IM{public key authentication}{public-key authentication} authentication, public key
  522. \IM{MIT-MAGIC-COOKIE-1} \cw{MIT-MAGIC-COOKIE-1}
  523. \IM{MIT-MAGIC-COOKIE-1} magic cookie
  524. \IM{MIT-MAGIC-COOKIE-1} cookie, magic
  525. \IM{SSH server bugs} SSH server bugs
  526. \IM{SSH server bugs} bugs, in SSH servers
  527. \IM{ignore message} SSH \q{ignore} messages
  528. \IM{ignore message} \q{ignore} messages, in SSH
  529. \IM{message authentication code}{MAC} message authentication code (MAC)
  530. \IM{message authentication code}{MAC} MAC (message authentication code)
  531. \IM{signatures} signature
  532. \IM{signatures} digital signature
  533. \IM{storing configuration in a file} storing settings in a file
  534. \IM{storing configuration in a file} saving settings in a file
  535. \IM{storing configuration in a file} loading settings from a file
  536. \IM{transferring files} transferring files
  537. \IM{transferring files} files, transferring
  538. \IM{receiving files}{download a file} receiving files
  539. \IM{receiving files}{download a file} files, receiving
  540. \IM{receiving files}{download a file} downloading files
  541. \IM{sending files}{upload a file} sending files
  542. \IM{sending files}{upload a file} files, sending
  543. \IM{sending files}{upload a file} uploading files
  544. \IM{listing files} listing files
  545. \IM{listing files} files, listing
  546. \IM{wildcard}{wildcards} wildcards
  547. \IM{wildcard}{wildcards} glob (wildcard)
  548. \IM{PATH} \c{PATH} environment variable
  549. \IM{SFTP} SFTP
  550. \IM{SFTP} SSH file transfer protocol
  551. \IM{-unsafe} \c{-unsafe} PSCP command-line option
  552. \IM{-ls-PSCP} \c{-ls} PSCP command-line option
  553. \IM{-p-PSCP} \c{-p} PSCP command-line option
  554. \IM{-q-PSCP} \c{-q} PSCP command-line option
  555. \IM{-r-PSCP} \c{-r} PSCP command-line option
  556. \IM{-batch-PSCP} \c{-batch} PSCP command-line option
  557. \IM{-sftp} \c{-sftp} PSCP command-line option
  558. \IM{-scp} \c{-scp} PSCP command-line option
  559. \IM{return value} return value
  560. \IM{return value} exit value
  561. \IM{-b-PSFTP} \c{-b} PSFTP command-line option
  562. \IM{-bc-PSFTP} \c{-bc} PSFTP command-line option
  563. \IM{-be-PSFTP} \c{-be} PSFTP command-line option
  564. \IM{-batch-PSFTP} \c{-batch} PSFTP command-line option
  565. \IM{spaces in filenames} spaces in filenames
  566. \IM{spaces in filenames} filenames containing spaces
  567. \IM{working directory} working directory
  568. \IM{working directory} current working directory
  569. \IM{resuming file transfers} resuming file transfers
  570. \IM{resuming file transfers} files, resuming transfer of
  571. \IM{changing permissions on files} changing permissions on files
  572. \IM{changing permissions on files} permissions on files, changing
  573. \IM{changing permissions on files} files, changing permissions on
  574. \IM{changing permissions on files} modes of files, changing
  575. \IM{changing permissions on files} access to files, changing
  576. \IM{deleting files} deleting files
  577. \IM{deleting files} files, deleting
  578. \IM{deleting files} removing files
  579. \IM{create a directory} creating directories
  580. \IM{create a directory} directories, creating
  581. \IM{remove a directory} removing directories
  582. \IM{remove a directory} directories, removing
  583. \IM{remove a directory} deleting directories
  584. \IM{rename remote files} renaming files
  585. \IM{rename remote files} files, renaming and moving
  586. \IM{rename remote files} moving files
  587. \IM{local Windows command} local Windows command
  588. \IM{local Windows command} Windows command
  589. \IM{PLINK_PROTOCOL} \c{PLINK_PROTOCOL} environment variable
  590. \IM{-batch-plink} \c{-batch} Plink command-line option
  591. \IM{-s-plink} \c{-s} Plink command-line option
  592. \IM{-shareexists-plink} \c{-shareexists} Plink command-line option
  593. \IM{subsystem} subsystem, SSH
  594. \IM{subsystem} SSH subsystem
  595. \IM{batch file}{batch files} batch files
  596. \IM{CVS_RSH} \c{CVS_RSH} environment variable
  597. \IM{DSA} DSA
  598. \IM{DSA} Digital Signature Standard
  599. \IM{ECDSA} ECDSA
  600. \IM{ECDSA} elliptic-curve DSA
  601. \IM{NIST} NIST-standardised elliptic curves
  602. \IM{NIST} elliptic curves, NIST-standardised
  603. \IM{EdDSA} EdDSA
  604. \IM{EdDSA} Edwards-curve DSA
  605. \IM{public-key algorithm} public-key algorithm
  606. \IM{public-key algorithm} asymmetric key algorithm
  607. \IM{public-key algorithm} algorithm, public-key
  608. \IM{generating keys} generating key pairs
  609. \IM{generating keys} creating key pairs
  610. \IM{generating keys} key pairs, generating
  611. \IM{generating keys} public keys, generating
  612. \IM{generating keys} private keys, generating
  613. \IM{probable primes} probable primes
  614. \IM{probable primes} primes, probable
  615. \IM{proven primes} proven primes
  616. \IM{proven primes} primes, proven
  617. \IM{authorized_keys file}{authorized_keys} \cw{authorized_keys} file
  618. \IM{key fingerprint} fingerprint, of SSH authentication key
  619. \IM{key fingerprint} public key fingerprint (SSH)
  620. \IM{key fingerprint} SSH public key fingerprint
  621. \IM{SSH-2 public key format} SSH-2 public key file format
  622. \IM{SSH-2 public key format} public key file, SSH-2
  623. \IM{OpenSSH private key format} OpenSSH private key file format
  624. \IM{OpenSSH private key format} private key file, OpenSSH
  625. \IM{ssh.com private key format} \cw{ssh.com} private key file format
  626. \IM{ssh.com private key format} private key file, \cw{ssh.com}
  627. \IM{PEM-style} PEM-style OpenSSH private key format
  628. \IM{PEM-style} OpenSSH private key format, PEM-style
  629. \IM{importing keys} importing private keys
  630. \IM{importing keys} loading private keys
  631. \IM{export private keys} exporting private keys
  632. \IM{export private keys} saving private keys
  633. \IM{.ssh} \c{.ssh} directory
  634. \IM{.ssh2} \c{.ssh2} directory
  635. \IM{authentication agent} authentication agent
  636. \IM{authentication agent} agent, authentication
  637. \IM{-c-pageant} \c{-c} Pageant command-line option
  638. \IM{--keylist} \c{--keylist} Pageant command-line option
  639. \IM{--openssh-config} \c{--openssh-config} Pageant command-line option
  640. \IM{Windows OpenSSH} Windows OpenSSH
  641. \IM{Windows OpenSSH} OpenSSH, on Windows
  642. \IM{FAQ} FAQ
  643. \IM{FAQ} Frequently Asked Questions
  644. \IM{supported features} supported features
  645. \IM{supported features} features, supported
  646. \IM{remember my password} storing passwords
  647. \IM{remember my password} password, storing
  648. \IM{login scripts}{startup scripts} login scripts
  649. \IM{login scripts}{startup scripts} startup scripts
  650. \IM{Red Hat Linux} Red Hat Linux
  651. \IM{Red Hat Linux} Linux, Red Hat
  652. \IM{SMB} SMB
  653. \IM{SMB} Windows file sharing
  654. \IM{clean up} clean up after PuTTY
  655. \IM{clean up} uninstalling
  656. \IM{version of PuTTY} version, of PuTTY
  657. \IM{GPG signatures} PGP signatures, of PuTTY binaries
  658. \IM{GPG signatures} GPG signatures, of PuTTY binaries
  659. \IM{GPG signatures} signatures, of PuTTY binaries
  660. \IM{logical host name} logical host name
  661. \IM{logical host name} host name, logical
  662. \IM{host key cache}{host key management} host key management
  663. \IM{host key cache}{host key management} cache, of SSH host keys
  664. \IM{web browsers} web browser
  665. \IM{GSSAPI credential delegation} GSSAPI credential delegation
  666. \IM{GSSAPI credential delegation} credential delegation, GSSAPI
  667. \IM{GSSAPI credential delegation} delegation, of GSSAPI credentials
  668. \IM{cascading credentials} cascading credentials
  669. \IM{cascading credentials} credentials, cascading
  670. \IM{SYSTEM32} \cw{SYSTEM32} directory, on Windows
  671. \IM{32-bit Windows} 32-bit Windows
  672. \IM{32-bit Windows} Windows, 32-bit
  673. \IM{32-bit Windows} x86 (32-bit processor architecture)
  674. \IM{64-bit Windows} 64-bit Windows
  675. \IM{64-bit Windows} Windows, 64-bit
  676. \IM{Windows process ACL} Windows process ACL
  677. \IM{Windows process ACL} process ACL (Windows)
  678. \IM{Windows process ACL} ACL, process (Windows)
  679. \IM{proxy logging} proxy logging
  680. \IM{proxy logging} logging, proxy
  681. \IM{proxy logging} diagnostic, proxy
  682. \IM{proxy logging} standard error, proxy
  683. \IM{PuTTY icon} PuTTY icon
  684. \IM{PuTTY icon} icon, PuTTY's
  685. \IM{PuTTY icon} logo, PuTTY's
  686. \IM{system tray} system tray, Windows
  687. \IM{system tray} notification area, Windows (aka system tray)
  688. \IM{system tray} taskbar notification area, Windows (aka system tray)
  689. \IM{shifted arrow keys} arrow keys, shifted
  690. \IM{shifted arrow keys} shifted arrow keys
  691. \IM{certificate}{certificates} certificates, SSH
  692. \IM{certificate}{certificates} SSH certificates
  693. \IM{certificate}{certificates} OpenSSH certificates
  694. \IM{certificate}{certificates} CA (certification authority)
  695. \IM{Microsoft Store} Microsoft Store
  696. \IM{Microsoft Store} Windows Store