putty/doc/index.but

830 строки
26 KiB
Plaintext

\define{versionidindex} \versionid $Id$
\IM{Unix version} Unix version of PuTTY tools
\IM{Unix version} Linux version of PuTTY tools
\IM{Unix} Unix
\IM{Unix} Linux
\IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} Command Prompt
\IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} MS-DOS Prompt
\IM{Command Prompt}{command prompt window}{MS-DOS Prompt}{console window} console window
\IM{spoof}{spoofed}{spoofing} spoofing
\IM{verifying the host key} verifying the host key
\IM{verifying the host key} host key, verifying
\IM{trusting host keys} trusting host keys
\IM{trusting host keys} host keys, trusting
\IM{host key fingerprint} fingerprint, of SSH host key
\IM{host key fingerprint} host key fingerprint (SSH)
\IM{host key fingerprint} SSH host key fingerprint
\IM{starting a session} starting a session
\IM{starting a session} session, starting
\IM{commands on the server}{remote command} commands on the server
\IM{commands on the server}{remote command} remote commands
\IM{commands on the server}{remote command} server, commands on
\IM{mistyping a password} mistyping a password
\IM{mistyping a password} password, mistyping
\IM{different usernames}{changes of username} different user names
\IM{different usernames}{changes of username} changing user names
\IM{different usernames}{changes of username} user names, different
\IM{different usernames}{changes of username} login names, different
\IM{different usernames}{changes of username} account names, different
\IM{differences between SSH, Telnet and Rlogin} differences between
SSH, Telnet and Rlogin
\IM{differences between SSH, Telnet and Rlogin} protocols,
differences between
\IM{differences between SSH, Telnet and Rlogin} SSH, differences
from Telnet and Rlogin
\IM{differences between SSH, Telnet and Rlogin} Telnet, differences
from SSH and Rlogin
\IM{differences between SSH, Telnet and Rlogin} Rlogin, differences
from SSH and Telnet
\IM{differences between SSH, Telnet and Rlogin} selecting a protocol
\IM{differences between SSH, Telnet and Rlogin} choosing a protocol
\IM{MUD}{MUDs} MUDs
\IM{talker}{talker systems} talker systems
\IM{security hazard}{security risk} security hazard
\IM{SSH-1}{SSH protocol version 1} SSH-1
\IM{SSH-2}{SSH protocol version 2} SSH-2
\IM{terminal window}{PuTTY window} terminal window
\IM{terminal window}{PuTTY window} PuTTY terminal window
\IM{terminal window}{PuTTY window} window, terminal
\IM{copy and paste} copy and paste
\IM{copy and paste} cut and paste
\IM{copy and paste} paste, copy and
\IM{three-button mouse} three-button mouse
\IM{three-button mouse} mouse, three-button
\IM{left mouse button}{left button} left mouse button
\IM{middle mouse button}{middle button} middle mouse button
\IM{right mouse button}{right button} right mouse button
\IM{selecting words}{word-by-word selection} selecting whole words
\IM{selecting words}{word-by-word selection} words, selecting
\IM{selecting lines} selecting whole lines
\IM{selecting lines} lines, selecting
\IM{rectangular selection} rectangular selection
\IM{rectangular selection} selection, rectangular
\IM{adjusting a selection} adjusting a selection
\IM{adjusting a selection} extending a selection
\IM{adjusting a selection} selection, adjusting
\IM{right mouse button, with Ctrl} right mouse button, with Ctrl
\IM{right mouse button, with Ctrl} Ctrl, with right mouse button
\IM{system menu} system menu
\IM{system menu} menu, system
\IM{system menu} window menu
\IM{context menu} context menu
\IM{context menu} menu, context
\IM{context menu} right mouse button menu
\IM{Event Log} Event Log
\IM{Event Log} PuTTY Event Log
\IM{Event Log} Log, Event
\IM{Telnet special commands} Telnet special commands
\IM{Telnet special commands} special commands, in Telnet
\IM{SSH special commands} SSH special commands
\IM{SSH special commands} special commands, in SSH
\IM{Repeat key exchange, SSH special command} Repeat key exchange, SSH special command
\IM{Repeat key exchange, SSH special command} key exchange, forcing repeat
\IM{Repeat key exchange, SSH special command} SSH key exchange, forcing repeat
\IM{accented characters} accented characters
\IM{accented characters} characters, accented
\IM{line-drawing characters} line-drawing characters
\IM{line-drawing characters} box-drawing characters
\IM{line-drawing characters} characters, line-drawing
\IM{line-drawing characters} ANSI graphics
\IM{port forwarding}{port forwardings} port forwarding in SSH
\IM{port forwarding}{port forwardings} SSH port forwarding
\IM{port forwarding}{port forwardings} forwarding ports in SSH
\IM{port forwarding}{port forwardings} tunnelling using SSH
\IM{port forwarding}{port forwardings} SSH tunnelling
\IM{local port forwarding} local-to-remote port forwarding
\IM{remote port forwarding} remote-to-local port forwarding
\IM{dynamic port forwarding} dynamic port forwarding
\IM{dynamic port forwarding} SOCKS port forwarding
\IM{debugging Internet protocols} debugging Internet protocols
\IM{debugging Internet protocols} Internet protocols, debugging
\IM{debugging Internet protocols} protocols, debugging
\IM{Internet protocol version} Internet Protocol version
\IM{Internet protocol version} version, of Internet Protocol
\IM{raw TCP connections} raw TCP connections
\IM{raw TCP connections} TCP connections, raw
\IM{command-line arguments} command-line arguments
\IM{command-line arguments} arguments, command-line
\IM{command-line arguments} options, command-line
\IM{command-line arguments} switches, command-line
\IM{Windows shortcut} Windows shortcut
\IM{Windows shortcut} shortcut, Windows
\IM{telnet URLs} Telnet URLs
\IM{telnet URLs} URLs, Telnet
\IM{saved sessions, loading from command line} saved sessions,
loading from command line
\IM{saved sessions, loading from command line} loading saved
sessions from command line
\IM{saved sessions, loading from command line} command line, loading
saved sessions from
\IM{putty @sessionname} \c{putty @sessionname}
\IM{putty @sessionname} \c{@sessionname} command-line argument
\IM{protocol selection} protocol selection
\IM{protocol selection} selecting a protocol
\IM{protocol selection} choosing a protocol
\IM{login name}{username} login name
\IM{login name}{username} user name
\IM{login name}{username} account name
\IM{reading commands from a file} reading commands from a file
\IM{reading commands from a file} commands, reading from a file
\IM{agent forwarding} agent forwarding
\IM{agent forwarding} authentication agent forwarding
\IM{agent forwarding} SSH agent forwarding
\IM{agent forwarding} forwarding, SSH agent
\IM{X11 forwarding}{forwarding of X11} X11 forwarding
\IM{X11 forwarding}{forwarding of X11} SSH X11 forwarding
\IM{X11 forwarding}{forwarding of X11} forwarding, of X11
\IM{X11 authentication} X11 authentication
\IM{X11 authentication} authentication, X11
\IM{pseudo-terminal allocation} pseudo-terminal allocation
\IM{pseudo-terminal allocation} pty allocation
\IM{pseudo-terminal allocation} allocation, of pseudo-terminal
\IM{ERASE special character} \cw{ERASE}, special character
\IM{ERASE special character} \cw{VERASE}, special character
\IM{QUIT special character} \cw{QUIT}, special character
\IM{QUIT special character} \cw{VQUIT}, special character
\IM{-telnet} \c{-telnet} command-line option
\IM{-raw} \c{-raw} command-line option
\IM{-rlogin} \c{-rlogin} command-line option
\IM{-ssh} \c{-ssh} command-line option
\IM{-cleanup} \c{-cleanup} command-line option
\IM{-load} \c{-load} command-line option
\IM{-v} \c{-v} command-line option
\IM{-l} \c{-l} command-line option
\IM{-L-upper} \c{-L} command-line option
\IM{-R-upper} \c{-R} command-line option
\IM{-D-upper} \c{-D} command-line option
\IM{-m} \c{-m} command-line option
\IM{-P-upper} \c{-P} command-line option
\IM{-pw} \c{-pw} command-line option
\IM{-A-upper} \c{-A} command-line option
\IM{-a} \c{-a} command-line option
\IM{-X-upper} \c{-X} command-line option
\IM{-x} \c{-x} command-line option
\IM{-T-upper} \c{-T} command-line option
\IM{-t} \c{-t} command-line option
\IM{-C-upper} \c{-C} command-line option
\IM{-N-upper} \c{-N} command-line option
\IM{-1} \c{-1} command-line option
\IM{-2} \c{-2} command-line option
\IM{-i} \c{-i} command-line option
\IM{-pgpfp} \c{-pgpfp} command-line option
\IM{removing registry entries} removing registry entries
\IM{removing registry entries} registry entries, removing
\IM{random seed file} random seed file
\IM{random seed file} \c{putty.rnd} (random seed file)
\IM{putty.rnd} \c{putty.rnd} (random seed file)
\IM{suppressing remote shell} remote shell, suppressing
\IM{suppressing remote shell} shell, remote, suppressing
\IM{SSH protocol version} SSH protocol version
\IM{SSH protocol version} protocol version, SSH
\IM{SSH protocol version} version, of SSH protocol
\IM{PPK} \cw{PPK} file
\IM{PPK} private key file, PuTTY
\IM{PGP key fingerprint} PGP key fingerprint
\IM{PGP key fingerprint} fingerprint, of PGP key
\IM{verifying new versions} verifying new versions of PuTTY
\IM{verifying new versions} new version, verifying
\IM{verifying new versions} upgraded version, verifying
\IM{connection}{network connection} network connection
\IM{connection}{network connection} connection, network
\IM{host name}{hostname} host name
\IM{host name}{hostname} DNS name
\IM{host name}{hostname} server name
\IM{IP address}{Internet address} IP address
\IM{IP address}{Internet address} address, IP
\IM{localhost} \c{localhost}
\IM{loopback IP address}{loopback address} loopback IP address
\IM{loopback IP address}{loopback address} IP address, loopback
\IM{listen address} listen address
\IM{listen address} bind address
\IM{DNS} DNS
\IM{DNS} Domain Name System
\IM{name resolution} name resolution
\IM{name resolution} DNS resolution
\IM{name resolution} host name resolution
\IM{name resolution} server name resolution
\IM{loading and storing saved sessions} sessions, loading and storing
\IM{loading and storing saved sessions} settings, loading and storing
\IM{loading and storing saved sessions} saving settings
\IM{loading and storing saved sessions} storing settings
\IM{loading and storing saved sessions} loading settings
\IM{Default Settings} Default Settings
\IM{Default Settings} settings, default
\IM{Registry} Registry (Windows)
\IM{Registry} Windows Registry
\IM{inactive window} inactive window
\IM{inactive window} window, inactive
\IM{inactive window} terminal window, inactive
\IM{Log SSH packet data} SSH packet log
\IM{Log SSH packet data} packet log, SSH
\IM{auto wrap mode}{auto wrap} auto wrap mode
\IM{auto wrap mode}{auto wrap} wrapping, automatic
\IM{auto wrap mode}{auto wrap} line wrapping, automatic
\IM{control sequence}{control codes} control sequences
\IM{control sequence}{control codes} terminal control sequences
\IM{control sequence}{control codes} escape sequences
\IM{cursor coordinates} cursor coordinates
\IM{cursor coordinates} coordinates, cursor
\IM{CR} CR (Carriage Return)
\IM{CR} Carriage Return
\IM{LF} LF (Line Feed)
\IM{LF} Line Feed
\IM{clear screen} clear screen
\IM{clear screen} erase screen
\IM{clear screen} screen, clearing
\IM{blinking text} blinking text
\IM{blinking text} flashing text
\IM{answerback} answerback string
\IM{local echo} local echo
\IM{local echo} echo, local
\IM{remote echo} remote echo
\IM{remote echo} echo, remote
\IM{local line editing} local line editing
\IM{local line editing} line editing, local
\IM{remote-controlled printing} ANSI printing
\IM{remote-controlled printing} remote-controlled printing
\IM{remote-controlled printing} printing, remote-controlled
\IM{Home and End keys} Home key
\IM{Home and End keys} End key
\IM{keypad} keypad, numeric
\IM{keypad} numeric keypad
\IM{Application Cursor Keys} Application Cursor Keys
\IM{Application Cursor Keys} cursor keys, \q{Application} mode
\IM{Application Keypad} Application Keypad
\IM{Application Keypad} keypad, \q{Application} mode
\IM{Application Keypad} numeric keypad, \q{Application} mode
\IM{Num Lock}{NumLock} Num Lock
\IM{NetHack keypad mode} NetHack keypad mode
\IM{NetHack keypad mode} keypad, NetHack mode
\IM{compose key} Compose key
\IM{compose key} DEC Compose key
\IM{terminal bell} terminal bell
\IM{terminal bell} bell, terminal
\IM{terminal bell} beep, terminal
\IM{terminal bell} feep
\IM{Windows Default Beep} Windows Default Beep sound
\IM{Windows Default Beep} Default Beep sound, Windows
\IM{terminal bell, disabling} terminal bell, disabling
\IM{terminal bell, disabling} bell, disabling
\IM{visual bell} visual bell
\IM{visual bell} bell, visual
\IM{PC speaker} PC speaker
\IM{PC speaker} beep, with PC speaker
\IM{sound file} sound file
\IM{sound file} \cw{WAV} file
\IM{bell overload} bell overload mode
\IM{bell overload} terminal bell overload mode
\IM{mouse reporting} mouse reporting
\IM{mouse reporting} \c{xterm} mouse reporting
\IM{links} \c{links} (web browser)
\IM{mc} \c{mc}
\IM{mc} Midnight Commander
\IM{terminal resizing}{window resizing} terminal resizing
\IM{terminal resizing}{window resizing} window resizing
\IM{terminal resizing}{window resizing} resizing, terminal
\IM{destructive backspace} destructive backspace
\IM{destructive backspace} non-destructive backspace
\IM{destructive backspace} backspace, destructive
\IM{Arabic text shaping} Arabic text shaping
\IM{Arabic text shaping} shaping, of Arabic text
\IM{Unicode} Unicode
\IM{Unicode} ISO-10646 (Unicode)
\IM{ASCII} ASCII
\IM{ASCII} US-ASCII
\IM{bidirectional text} bidirectional text
\IM{bidirectional text} right-to-left text
\IM{display becomes corrupted} display corruption
\IM{display becomes corrupted} corruption, of display
\IM{rows} rows, in terminal window
\IM{columns} columns, in terminal window
\IM{window size} window size
\IM{window size} size, of window
\IM{font size} font size
\IM{font size} size, of font
\IM{full screen}{full-screen} full-screen mode
\IM{cursor blinks} blinking cursor
\IM{cursor blinks} flashing cursor
\IM{cursor blinks} cursor, blinking
\IM{font} font
\IM{font} typeface
\IM{minimise} minimise window
\IM{minimise} window, minimising
\IM{maximise} maximise window
\IM{maximise} window, maximising
\IM{closing window}{close window} closing window
\IM{closing window}{close window} window, closing
\IM{Dragon NaturallySpeaking} Dragon NaturallySpeaking
\IM{Dragon NaturallySpeaking} NaturallySpeaking
\IM{AltGr} \q{AltGr} key
\IM{Alt} \q{Alt} key
\IM{CJK} CJK
\IM{CJK} Chinese
\IM{CJK} Japanese
\IM{CJK} Korean
\IM{East Asian Ambiguous characters} East Asian Ambiguous characters
\IM{East Asian Ambiguous characters} CJK ambiguous characters
\IM{character width} character width
\IM{character width} single-width character
\IM{character width} double-width character
\IM{Rich Text Format} Rich Text Format
\IM{Rich Text Format} RTF
\IM{bold}{bold text} bold text
\IM{colour}{colours} colour
\IM{8-bit colour} 8-bit colour
\IM{8-bit colour} colour, 8-bit
\IM{system colours} system colours
\IM{system colours} colours, system
\IM{ANSI colours} ANSI colours
\IM{ANSI colours} colours, ANSI
\IM{cursor colour} cursor colour
\IM{cursor colour} colour, of cursor
\IM{default background} background colour, default
\IM{default background} colour, background, default
\IM{default foreground} foreground colour, default
\IM{default foreground} colour, foreground, default
\IM{TERM} \cw{TERM} environment variable
\IM{logical palettes} logical palettes
\IM{logical palettes} palettes, logical
\IM{breaks in connectivity} connectivity, breaks in
\IM{breaks in connectivity} intermittent connectivity
\IM{idle connections} idle connections
\IM{idle connections} timeout, of connections
\IM{idle connections} connections, idle
\IM{interactive connections}{interactive session} interactive connections
\IM{interactive connections}{interactive session} connections, interactive
\IM{keepalives} keepalives, application
\IM{Nagle's algorithm} Nagle's algorithm
\IM{Nagle's algorithm} \cw{TCP_NODELAY}
\IM{TCP keepalives} TCP keepalives
\IM{TCP keepalives} keepalives, TCP
\IM{TCP keepalives} \cw{SO_KEEPALIVE}
\IM{half-open connections} half-open connections
\IM{half-open connections} connections, half-open
\IM{auto-login username} user name, for auto-login
\IM{auto-login username} login name, for auto-login
\IM{auto-login username} account name, for auto-login
\IM{terminal emulation}{terminal-type} terminal emulation
\IM{terminal emulation}{terminal-type} emulation, terminal
\IM{terminal speed} terminal speed
\IM{terminal speed} speed, terminal
\IM{terminal speed} baud rate, of terminal
\IM{environment variables} environment variables
\IM{environment variables} variables, environment
\IM{proxy} proxy server
\IM{proxy} server, proxy
\IM{HTTP proxy} HTTP proxy
\IM{HTTP proxy} proxy, HTTP
\IM{HTTP proxy} server, HTTP
\IM{HTTP proxy} \cw{CONNECT} proxy (HTTP)
\IM{SOCKS server} SOCKS proxy
\IM{SOCKS server} server, SOCKS
\IM{SOCKS server} proxy, SOCKS
\IM{Telnet proxy} Telnet proxy
\IM{Telnet proxy} TCP proxy
\IM{Telnet proxy} ad-hoc proxy
\IM{Telnet proxy} proxy, Telnet
\IM{proxy DNS} proxy DNS
\IM{proxy DNS} DNS, with proxy
\IM{proxy DNS} name resolution, with proxy
\IM{proxy DNS} host name resolution, with proxy
\IM{proxy DNS} server name resolution, with proxy
\IM{proxy username} proxy user name
\IM{proxy username} user name, for proxy
\IM{proxy username} login name, for proxy
\IM{proxy username} account name, for proxy
\IM{proxy password} proxy password
\IM{proxy password} password, for proxy
\IM{proxy authentication} proxy authentication
\IM{proxy authentication} authentication, to proxy
\IM{HTTP basic} HTTP \q{basic} authentication
\IM{HTTP basic} \q{basic} authentication (HTTP)
\IM{plaintext password} plain text password
\IM{plaintext password} password, plain text
\IM{Telnet negotiation} Telnet option negotiation
\IM{Telnet negotiation} option negotiation, Telnet
\IM{Telnet negotiation} negotiation, of Telnet options
\IM{firewall}{firewalls} firewalls
\IM{NAT router}{NAT} NAT routers
\IM{NAT router}{NAT} routers, NAT
\IM{NAT router}{NAT} Network Address Translation
\IM{NAT router}{NAT} IP masquerading
\IM{Telnet New Line} Telnet New Line
\IM{Telnet New Line} new line, in Telnet
\IM{.rhosts} \c{.rhosts} file
\IM{.rhosts} \q{rhosts} file
\IM{passwordless login} passwordless login
\IM{passwordless login} login, passwordless
\IM{Windows user name} local user name, in Windows
\IM{Windows user name} user name, local, in Windows
\IM{Windows user name} login name, local, in Windows
\IM{Windows user name} account name, local, in Windows
\IM{local username in Rlogin} local user name, in Rlogin
\IM{local username in Rlogin} user name, local, in Rlogin
\IM{local username in Rlogin} login name, local, in Rlogin
\IM{local username in Rlogin} account name, local, in Rlogin
\IM{privileged port} privileged port
\IM{privileged port} low-numbered port
\IM{privileged port} port, privileged
\IM{remote shell} shell, remote
\IM{remote shell} remote shell
\IM{encryption}{encrypted}{encrypt} encryption
\IM{encryption algorithm} encryption algorithm
\IM{encryption algorithm} cipher algorithm
\IM{encryption algorithm} symmetric-key algorithm
\IM{encryption algorithm} algorithm, encryption
\IM{AES} AES
\IM{AES} Advanced Encryption Standard
\IM{AES} Rijndael
\IM{Arcfour} Arcfour
\IM{Arcfour} RC4
\IM{triple-DES} triple-DES
\IM{single-DES} single-DES
\IM{single-DES} DES
\IM{key exchange} key exchange
\IM{key exchange} kex
\IM{shared secret} shared secret
\IM{shared secret} secret, shared
\IM{key exchange algorithm} key exchange algorithm
\IM{key exchange algorithm} algorithm, key exchange
\IM{Diffie-Hellman key exchange} Diffie-Hellman key exchange
\IM{Diffie-Hellman key exchange} key exchange, Diffie-Hellman
\IM{group exchange} Diffie-Hellman group exchange
\IM{group exchange} group exchange, Diffie-Hellman
\IM{repeat key exchange} repeat key exchange
\IM{repeat key exchange} key exchange, repeat
\IM{challenge/response authentication} challenge/response authentication
\IM{challenge/response authentication} authentication, challenge/response
\IM{security token} security token
\IM{security token} token, security
\IM{one-time passwords} one-time passwords
\IM{one-time passwords} password, one-time
\IM{keyboard-interactive authentication} keyboard-interactive authentication
\IM{keyboard-interactive authentication} authentication, keyboard-interactive
\IM{password expiry} password expiry
\IM{password expiry} expiry, of passwords
\IM{public key authentication}{public-key authentication} public key authentication
\IM{public key authentication}{public-key authentication} RSA authentication
\IM{public key authentication}{public-key authentication} DSA authentication
\IM{public key authentication}{public-key authentication} authentication, public key
\IM{MIT-MAGIC-COOKIE-1} \cw{MIT-MAGIC-COOKIE-1}
\IM{MIT-MAGIC-COOKIE-1} magic cookie
\IM{MIT-MAGIC-COOKIE-1} cookie, magic
\IM{SSH server bugs} SSH server bugs
\IM{SSH server bugs} bugs, in SSH servers
\IM{ignore message} SSH \q{ignore} messages
\IM{ignore message} \q{ignore} messages, in SSH
\IM{message authentication code} message authentication code
\IM{message authentication code} MAC (message authentication code)
\IM{signatures} signature
\IM{signatures} digital signature
\IM{storing configuration in a file} storing settings in a file
\IM{storing configuration in a file} saving settings in a file
\IM{storing configuration in a file} loading settings from a file
\IM{transferring files} transferring files
\IM{transferring files} files, transferring
\IM{receiving files}{download a file} receiving files
\IM{receiving files}{download a file} files, receiving
\IM{receiving files}{download a file} downloading files
\IM{sending files}{upload a file} sending files
\IM{sending files}{upload a file} files, sending
\IM{sending files}{upload a file} uploading files
\IM{listing files} listing files
\IM{listing files} files, listing
\IM{wildcard}{wildcards} wildcards
\IM{wildcard}{wildcards} glob (wildcard)
\IM{PATH} \c{PATH} environment variable
\IM{SFTP} SFTP
\IM{SFTP} SSH file transfer protocol
\IM{-unsafe} \c{-unsafe} PSCP command-line option
\IM{-ls-PSCP} \c{-ls} PSCP command-line option
\IM{-p-PSCP} \c{-p} PSCP command-line option
\IM{-q-PSCP} \c{-q} PSCP command-line option
\IM{-r-PSCP} \c{-r} PSCP command-line option
\IM{-batch-PSCP} \c{-batch} PSCP command-line option
\IM{-sftp} \c{-sftp} PSCP command-line option
\IM{-scp} \c{-scp} PSCP command-line option
\IM{return value} return value
\IM{return value} exit value
\IM{-b-PSFTP} \c{-b} PSFTP command-line option
\IM{-bc-PSFTP} \c{-bc} PSFTP command-line option
\IM{-be-PSFTP} \c{-be} PSFTP command-line option
\IM{-batch-PSFTP} \c{-batch} PSFTP command-line option
\IM{spaces in filenames} spaces in filenames
\IM{spaces in filenames} filenames containing spaces
\IM{working directory} working directory
\IM{working directory} current working directory
\IM{resuming file transfers} resuming file transfers
\IM{resuming file transfers} files, resuming transfer of
\IM{changing permissions on files} changing permissions on files
\IM{changing permissions on files} permissions on files, changing
\IM{changing permissions on files} files, changing permissions on
\IM{changing permissions on files} modes of files, changing
\IM{changing permissions on files} access to files, changing
\IM{deleting files} deleting files
\IM{deleting files} files, deleting
\IM{deleting files} removing files
\IM{create a directory} creating directories
\IM{create a directory} directories, creating
\IM{remove a directory} removing directories
\IM{remove a directory} directories, removing
\IM{remove a directory} deleting directories
\IM{rename remote files} renaming files
\IM{rename remote files} files, renaming and moving
\IM{rename remote files} moving files
\IM{local Windows command} local Windows command
\IM{local Windows command} Windows command
\IM{PLINK_PROTOCOL} \c{PLINK_PROTOCOL} environment variable
\IM{-batch-plink} \c{-batch} Plink command-line option
\IM{-s-plink} \c{-s} Plink command-line option
\IM{subsystem} subsystem, SSH
\IM{subsystem} SSH subsystem
\IM{batch file}{batch files} batch files
\IM{CVS_RSH} \c{CVS_RSH} environment variable
\IM{DSA} DSA
\IM{DSA} Digital Signature Standard
\IM{public-key algorithm} public-key algorithm
\IM{public-key algorithm} asymmetric key algorithm
\IM{public-key algorithm} algorithm, public-key
\IM{generating keys} generating key pairs
\IM{generating keys} creating key pairs
\IM{generating keys} key pairs, generating
\IM{generating keys} public keys, generating
\IM{generating keys} private keys, generating
\IM{authorized_keys file}{authorized_keys} \cw{authorized_keys} file
\IM{key fingerprint} fingerprint, of SSH authentication key
\IM{key fingerprint} public key fingerprint (SSH)
\IM{key fingerprint} SSH public key fingerprint
\IM{SSH-2 public key format} SSH-2 public key file format
\IM{SSH-2 public key format} public key file, SSH-2
\IM{OpenSSH private key format} OpenSSH private key file format
\IM{OpenSSH private key format} private key file, OpenSSH
\IM{ssh.com private key format} \cw{ssh.com} private key file format
\IM{ssh.com private key format} private key file, \cw{ssh.com}
\IM{importing keys} importing private keys
\IM{importing keys} loading private keys
\IM{export private keys} exporting private keys
\IM{export private keys} saving private keys
\IM{.ssh} \c{.ssh} directory
\IM{.ssh2} \c{.ssh2} directory
\IM{authentication agent} authentication agent
\IM{authentication agent} agent, authentication
\IM{-c-pageant} \c{-c} Pageant command-line option
\IM{FAQ} FAQ
\IM{FAQ} Frequently Asked Questions
\IM{supported features} supported features
\IM{supported features} features, supported
\IM{remember my password} storing passwords
\IM{remember my password} password, storing
\IM{login scripts}{startup scripts} login scripts
\IM{login scripts}{startup scripts} startup scripts
\IM{WS2_32.DLL} \cw{WS2_32.DLL}
\IM{WS2_32.DLL} WinSock version 2
\IM{Red Hat Linux} Red Hat Linux
\IM{Red Hat Linux} Linux, Red Hat
\IM{SMB} SMB
\IM{SMB} Windows file sharing
\IM{clean up} clean up after PuTTY
\IM{clean up} uninstalling
\IM{version of PuTTY} version, of PuTTY
\IM{PGP signatures} PGP signatures, of PuTTY binaries
\IM{PGP signatures} signatures, of PuTTY binaries