
[ad_1]
PuTTY 0.74 was server management software Remote over the Internet for free. PuTTY Supports Telnet and SSH protocols on Windows, Unix platforms, comes with the Terminal xterm command emulator.
PuTTY software interface
PuTTY is one of the big names in the field of SSH and Telnet clients with many additional features connecting via rlogin as well as TCP protocols on other computers. It also includes Terminal xterm command emulator providing an efficient environment for advanced users.
One thing you need to make sure you can use it PuTTY within national regulations because it has the ability to affect domestic and international encryption laws such as China, Singapore, Vietnam, Mongolia, Kazakhstan, Pakistan, Tunisia or Belarus.
PuTTY welcomes you with an easy-to-understand configuration panel that assists you in customizing, managing sessions, and connecting the terminal and the window containing it. You can easily choose the connection type (Raw, Telnet, Rlogin, SSH and Serial), set logging options for the currently selected session.
The Terminal section covers other general settings as well as line and remote printing rules. You can also set up keyboard actions, alarms, and advanced terminal features while refining the look, behavior, translation or window color. The Connection area allows customization of low-level TCP connections, Internet protocol versions, Login and Terminal details, Enviroment variations, Proxy types, and other protocol-specific adjustments.
Once the connection is established, you can control and use the linked computer resources in seconds. PuTTY contains hosts and their respective settings to facilitate fast switching between machines, even supporting most encryption algorithms such as AES, DES, Blowfish, 3DES, Arcfour.
PuTTY grants you access to the SSH encryption key and protocol version, and provides SCP and SFTP clients accessible via the command line. It also supports X11 forwarding, in addition to local, remote or dynamic port forwarding, the IPv6 protocol and authentication using public keys.
The main feature of PuTTY
- Kerberos / GSSAPI functional authentication in SSH-2.
- Enables Local X11 support on Windows.
- Support for non-fixed width fonts on Windows.
- Support GTK 2 on Unix.
- Clearly identifying the Host logical name depends on the hardware system and the specific address to connect to.
- Support zlib@openssh.com SSH-2 compression method.
- Support some new features in Windows 7: resize windows while in Aero mode.
- Supports AES-compliant private key encryption mechanism in OpenSSH.
- Fix: handle private keys in OpenSSH with ordinal and integer numbers.
- Error correction: fix errors in port forwarding.
- Error correction: Many errors occurred during application shutdown.
- Fix: the system crashes when sending a series of signals through the back end port in Windows.

Latest PuTTY update
PuTTY 0.74
- Security error: when an SSH server receives a public key and then rejects the signature, PuTTY has access to free memory if the key belongs to the SSH agent.
- Security feature: new configuration option to disable PuTTY’s dynamic key host priority policy, if you want to avoid eavesdropping from the key administrator.
- Fix unreadable UI settings in Windows high contrast mode.
- Fix failed password entry on Windows 7.
- Error correction in terminal: 1 belongs to the error box “line == NULL” and 1 belongs to the other case.
- Fixed a memory-consuming loop in the RSA signature compatibility buffer from an agent.
- Fix incorrectly handling PSFTP buffers on some servers.
- Fixed cursor in wrong position when restoring a replacement terminal screen.
- Fixed a bug where the pixel column height was too small when running GTK PuTTY on Ubuntu 20.04 or any system with an updated version similar to Pango.
- Fix old style scroll not working on GTK 3 PuTTY. This will prevent scrolling from working on all VNCs.
PuTTY 0.73
- Security fixes: On Windows, other applications can bind to the same TCP port when forwarding a local PuTTY port.
- Fixed a bug in bracketed paste mode, terminal exit strings that delimit the pasted data appearing at the same time to one side caused the software to incorrectly identify them as a keyboard input manually.
- Fixed an issue where SSH-1 server sent out connection loss messages that could cause memory leak.
- Fix Windows Plink crashes at startup if it acts as a “downstream” connection share.
- Windows PuTTY now updates the correct terminal window size if the screen resolution changes while being maximized.
- Tweak the terminal to prevent loss of trailing characters in gcc’s colored error messages.
- Fixed a bug where removing a bad interaction between the ‘clear scrollback’ operation and selecting a mouse could generate a dreaded “line == NULL” dialog.

PuTTY 0.72
- Security bug fixes include:
- Two vulnerabilities affect the outdated SSH-1 protocol, both of which are available before testing the server key.
- Fix the vulnerability in all SSH client tools (PuTTY, Plink, PSFTP and PSCP) if the program contains malicious code that can impersonate Pageant.
- Fixed crash error when changing GSSAPI / Kerberos key affected a third-party GSSAPI provider on Windows (eg MIT Kerberos for Windows).
- Fixed crash error when enabling GSSAPI / Kerberos key change if the server provided a regular SSH key as part of the change process.
- Fixed sigils never shutting down in SSH-1 or Rlogin.
- Fixed an issue where sigils could not be re-enabled if a Restart Session was used.
- Fixed PSCP in download mode that could create files with pseudo lines at the end of their names.
- Fixed the issue where the original tutorial message was never printed during keyboard-interactive validation.
- Fixed a bug where parsing long lines over a shared connection causing a PuTTY window error.
- Other bug fixes.
PuTTY 0.70
- Security bug fixes: PuTTY binaries are no longer vulnerable to attacks by specially named DLLs in the same directory.
- Windows PuTTY may be able to reprint, after the publisher’s DLL protection system broke this functionality.
- Windows PuTTY accepts a keyboard in addition to the current code page.
[ad_2]
Source link