10.3 ‘SSH protocol version 2 required by our configuration but remote only provides (old, insecure) SSH-1’.
10.2 ‘WARNING - POTENTIAL SECURITY BREACH!’.
10.1 ‘The server's host key is not cached in the registry’.
Chapter 9: Using Pageant for authentication.
8.3 Getting ready for public key authentication.
#Putty generator#
8.2 Using PuTTYgen, the PuTTY key generator.
8.1 Public key authentication - an introduction.
Chapter 8: Using public keys for SSH authentication.
7.3 Using Plink in batch files and scripts.
Chapter 7: Using the command-line connection tool Plink.
6.3 Using public key authentication with PSFTP.
Chapter 6: Using PSFTP to transfer files securely.
Chapter 5: Using PSCP to transfer files securely.
3.3 Altering your character set configuration.
3.2 Creating a log file of your session.
1.2 How do SSH, Telnet and Rlogin differ?.
See appendix C for the licence text in full. You may distribute this documentation under the MIT licence. This manual is copyright 1997-2020 Simon Tatham. The only Unix-specific documentation that currently exists is the man pages. Some options are therefore mentioned that are absent from the Unix version the Unix version has features not described here and the pterm and command-line puttygen and pageant utilities are not described at all. Note to Unix users: this manual currently primarily documents the Windows versions of the PuTTY utilities. This manual documents PuTTY, and its companion utilities PSCP, PSFTP, Plink, Pageant and PuTTYgen. PuTTY is a free (MIT-licensed) Windows Telnet and SSH client. Previous | Contents | Index | Next PuTTY User Manual