Instructions for using PuTTY on Windows

This article will give you a detailed guide on how to use PuTTY on Windows, including how to use a terminal window, configure, create & save profiles, change options and more.

Download and install

You can download PuTTY for Windows on Download.com.vn and follow the installation instructions like any other software.

Run PuTTY and connect to a server

If you chose to create the PuTTY icon on the desktop during the installation, simply double-click it to open the program. If not, access PuTTY from the Start menu .

When the software starts, the PuTTY Configuration window will appear. This window has a configuration panel on the left, a Host Name field (or IP address) and other options in the middle, and an active session configuration table at the bottom right.

For simple use, all you need to do is enter the server's domain name or IP address if you want to connect to the Host Name field and click Open (or press Enter ). For example, the domain names students.example.edu, the IP address is of the form 78.99.129.32.

What to do if you do not have a server?

If you don't have a server to connect to, you can use Tectia SSH on Windows or OpenSSH on Linux.

Security alert dialog

When you connect to the server for the first time, you may see the PuTTY Security Alert dialog box prompting the host server key not to be stored in the registry. This is normal when you first connect to the server. If you've ever received this message on a particular server, it means someone is trying to break the connection and steal your password with an interstitial attack.

As mentioned, this message on the first connection is normal and you just need to click Yes . More carefully, you can check the fingerprint of the displayed key, making sure it is the same server used. In fact, almost no one does that. Instead, they choose the more secure way to use the appropriate SSH Key management solution.

Instructions for using PuTTY on Windows
PuTTY security warning dialog

Terminal window and login authentication

After the security warning, you are taken to a terminal window. By default, it is bland black. First, it asks you to enter your username & password. You will then receive a command line on the server.

Next, you can enter this command into the terminal window. Now that you have connected to the server, everything you type in that window will be sent to this server. All responses from the server are displayed in the terminal window. You can run any text application on the server through that window. The session ends when you exit the command line shell on the server (usually via the exit command or press Control-D ). Alternatively, you can force the session to end by closing the terminal window.

Instructions for using PuTTY on Windows
Customize localhost

Configuration options and saved Profile

The initial configuration window contains a lot of options. Most of them are not necessary for normal use.

Instructions for using PuTTY on Windows
PuTTY startup configuration window

Port

The port field specifies the connected TCP / IP port. For SSH, this is the port the SSH server runs. It usually has a value of 22. If for some reason you need to connect to some other port, just change this value. It is often only the programmer changes it to another value, but this action is also useful for some businesses running SSH servers on non-standard ports or running multiple SSH servers on the same server at different ports. .

Connection type

You almost never need to change the connection type. Leaving SSH alone is enough because this is a secure encryption protocol designed to ensure passwords & data are protected as much as possible.

Raw connections can be used by a developer to connect a TCP / IP socket to test (for example, when developing a music network application on a TCP / IP port).

Telnet is an old protocol that has almost never been used, unless you manage the device more than 10 years old. Telnet is not secure. The password is sent clearly on the network. Therefore, an attacker can easily eavesdrop on information, stealing username and password. The old Rlogin protocol has similar shortcomings.

Serial or serial ports is another traditional communication mechanism for connecting computers to peripherals. Most computers today no longer use this port, but sometimes they are still used to control physical equipment, musical instruments, machines or communication devices. Serial ports can also be used to debug embedded operating systems or software.

Download, save or delete a saved session

This section allows you to save the settings as a named profile. Just write the new profile name in the Saved Sessions box and click Save to create a new profile. PuTTY stores the server name and other settings in this profile.

The saved profile is now in the larger box below it. Initially, it only contained Default Settings . Your saved profile will be here. Select a profile and click Load to use the previously saved profile. Select a profile and click Delete to delete the profile that is no longer needed.

Close the window on exit

Finally, the Close window on exit setting specifies how to close the window automatically when the connection is terminated. However, you rarely need to change its default value Only on clean exit  .

Configuration options panel on the left

You can find more options in the Category panel on the left. Select a category here and the right panel will change to display the configuration options for that category. The first options belong to the Session list .

Only relevant options are described here. PuTTY has a lot of other options, but most of them never need to be used.

Terminal options

The options in this catalog affect terminal emulation and keyboard mapping. They are extremely easy to understand so the article is not mentioned here. Very few people need them. Some people may change the way they handle bell characters; Less common operating system users can change the content sent by the spacebar or the Delete character.

Windows Options

These options affect the appearance and behavior of the terminal window. It also specifies how to translate the output characters and selects the font and color for that window.

Connection options

Data option may be useful when using PuTTY. The auto-login user name will determine the username so you don't have to enter it manually as before. The Proxy option is rarely useful for home users but is essential for businesses that don't allow an Internet connection outside without using a SOCKS proxy or other similar mechanism. Don't worry if you don't know what SOCKS is, just leave this section.

The Telnet , Rlogin and Serial categories only contain options for these protocols. Very few people need to use them.

However, SSH options are important and useful for some people. Ordinary users or students need not worry about them. But if you want to use public key authentication, they are needed. Note that you need to open the SSH option by clicking the [+] icon . If not, you may not see all the available options.

Key Exchange, Host Key and Cipher options

It is almost never necessary to edit these options because all of their defaults are reasonable and most people don't understand coding to make a better choice. So, if you're not sure what to do, skip these options.

Authentication options - Public Key authentication

The Auth sub branch contains a number of options that may be helpful. When clicking Auth , it shows the Options controlling SSH authentication panel . To enable public key authentication, simply create the SSH key, then click the Browse button in the Authentication parameters box located in the middle right of the configuration panel. Advanced users can check the Allow agent forwarding box to log in using a one-time key.

Most users do not need to create an SSH Key and understand the meaning of public key authentication. However, system administrators need to know and be familiar with managing SSH Key and at the same time, ensure that the organization implements the provisioning & termination processes and verifies the appropriate SSH Key.

Instructions for using PuTTY on Windows
Optional public key authentication PuTTY

Verify active directory (GSSAPI / KERBEROS)

One of the interesting features of PuTTY is the one-time login to Active Directory. In theory, it uses the Kerberos protocol via the GSSAPI programming interface. In the SSH protocol, this mechanism is called GSSAPI authentication. Business users who use Kerberos authentication (for example, through Centrify or Quest Authentication Services or Vintela) may want to take advantage of this one-time login feature. Other users don't care about it. GSSAPI authentication settings can be found in the SSH / Auth section. Note, you must expand the Auth section again by clicking the [+] icon to see the GSSAPI options.

Transition option X11

X11 is a protocol and system that runs graphical applications on Unix and Linux. It supports running graphical applications remotely via external networks.

PuTTY does not deploy the X11 server (display side), but it may work with some products running the X server feature on Windows. XMing is a popular free alternative.

To use the X11 server, you need to check the Enable X11 forwarding box and enter localhost: 0.0 in the X display location box . No need to adjust other settings.

Instructions for using PuTTY on Windows
Select the X11 forwarding you want

Tunneling options

These options are used to configure SSH tunneling, also known as SSH port forwarding. This table can be used to determine connection forwarding. Forwarding operations are saved in profiles.

To add local forwarding (for example, forwarding the TCP / IP port on the local machine to the port on the remote device or to a remote connected machine), write the source port into the Source port field , the destination server. and port (e.g. www.dest.com:80) in the Destination field and select Local . Click Add .

To add remote forwarding (for example, forwarding the TCP / IP port on the remote computer to the port on the local computer or device that the local machine can access), select Source port on the destination computer and Destination as the device. accessible from local machine.

Normally, you do not need to check local ports accept connection from server or similar for remote ports. However, if the connection to the port is forwarded from the network instead of localhost, you need to check them. Although there is a small security risk, it is not a problem in the case of SSH tunneling . However, you need to understand that anyone who can connect to the corresponding computer is able to connect to that forwarded port. In some cases, you can use port forwarding to bypass firewalls.

Above is how to use PuTTY basic on Windows . Hope the article is helpful to you.

Sign up and earn $1000 a day ⋙

How To Access An Android Phone With A Broken Screen

How To Access An Android Phone With A Broken Screen

Dealing with a broken screen on your Android phone is a hassle. Although phone screens are pretty tough, one nasty drop can shatter them completely. Given that most people have a lot of irreplaceable content on their phones, it is

Find out how to find friends and family using online services

Find out how to find friends and family using online services

In today's world, where information is more accessible than ever before, finding long-lost friends or relatives has become much easier. Online services for finding people provide convenient and effective tools that allow you to restore lost connections.

IObit Uninstaller 13 - One Click to Uninstall All Unwanted Programs

IObit Uninstaller 13 - One Click to Uninstall  All Unwanted Programs

In the busy software utilities industry, the available uninstallation tools are often overshadowed by more glamorous alternatives. Nonetheless, an excellent way of removing programs on a PC is vital for optimal system performance and the elimination of unwanted applications.

Instructions for creating Moon phase trend

Instructions for creating Moon phase trend

Instructions for creating a Moon phase trend. The Moon trend is extremely popular on TikTok, creating an unprecedented fever. Through Moon phase will help you know the date

How to edit videos posted on YouTube without losing views

How to edit videos posted on YouTube without losing views

How to edit videos posted on YouTube without losing views, You forgot to blur sensitive content in videos posted on YouTube. Don't worry, here's how to adjust it

How to enable dark mode on TikTok

How to enable dark mode on TikTok

How to turn on dark mode on TikTok, How to turn on dark mode on TikTok is not difficult. The article will guide you in detail how to change the TikTok interface to black on Samsung

Shirt size chart - How to choose the most accurate shirt size

Shirt size chart - How to choose the most accurate shirt size

Shirt size chart - How to choose the most accurate shirt size, What is the shirt size chart? Shirt size means only the size and size of the shirt or pants. Shirt size varies according to direction

Instructions for drawing prizes to receive Lucky Money on ZaloPay

Instructions for drawing prizes to receive Lucky Money on ZaloPay

Instructions for drawing prizes to receive Lucky Money on ZaloPay. Recently, Zalo has launched the program "Amazing lucky money, Happy Spring Luck" taking place from January 29, 2021 to

How to view and recover Microsoft Outlook password

How to view and recover Microsoft Outlook password

How to view and recover Microsoft Outlook password, How to view Outlook password on computer is not difficult. This article will guide you how to view and recover Outlook password

Instructions for creating and searching for draft posts on Facebook

Instructions for creating and searching for draft posts on Facebook

Instructions for creating and searching for draft articles on Facebook. Currently, we can save articles that we have created but have not yet posted on Facebook. Here, WebTech360 invites

How to set up LibreOffice Writer to work like Microsoft Word

How to set up LibreOffice Writer to work like Microsoft Word

How to set up LibreOffice Writer to work like Microsoft Word, If you're planning to switch from Microsoft Word to LibreOffice Writer but want a similar experience

Instructions for turning off saving videos on TikTok are extremely simple

Instructions for turning off saving videos on TikTok are extremely simple

Instructions for turning off saving videos on TikTok are extremely simple, to help people block others from downloading and saving their videos simply and easily. So today, WebTech360

Instructions for creating genealogical and organizational charts on Google Sheets

Instructions for creating genealogical and organizational charts on Google Sheets

Instructions for creating genealogical charts and organizing them on Google Sheets. Google Sheets is an online office application that helps us easily edit online spreadsheets,

How to import and manage multiple email accounts in Gmail

How to import and manage multiple email accounts in Gmail

How to import and manage multiple email accounts in Gmail, Want to manage all emails in Gmail? Let's learn how to manage and add multiple accounts with WebTech360

Instructions for using Photoshop filters for beginners

Instructions for using Photoshop filters for beginners

Instructions for using Photoshop filters for beginners, Each filter in Photoshop has its own algorithm and uses. Below are instructions for using the internal filter

How to create automatic clicks on Macrorify

How to create automatic clicks on Macrorify

How to create automatic clicks on Macrorify, Macrorify helps you create automatic click tasks and detect images. In this article, let's find out how with WebTech360

Instructions for logging out of Instagram account remotely

Instructions for logging out of Instagram account remotely

Instructions for remotely logging out of your Instagram account. If you don't know how to remotely log out of your Instagram account, today WebTech360 would like to introduce

Instructions for remotely logging out of Tik Tok account

Instructions for remotely logging out of Tik Tok account

Instructions for remotely logging out of Tik Tok account. To help people quickly log out of Tik Tok accounts from other devices, today WebTech360

Instructions for blurring photos on B612

Instructions for blurring photos on B612

Instructions for blurring photos on B612. Recently, the B612 application has updated the image blur effect. Next, WebTech360 will introduce the article Instructions for blurring photos

How to fix the error of printing blank pages in Microsoft Excel

How to fix the error of printing blank pages in Microsoft Excel

How to fix the error of printing blank pages in Microsoft Excel. Why do some Excel documents not display data or contain blank pages when printed? Below are the reasons