Remote access SSH Secure Shell with PuTTy

This impressive client Telnet and SSH will allow him to connect himself to any remote machine to use it through his terminal of simple form from Windows. In spite of his simplicity he has many more options than other clients payment. This manual offers in addition an introduction to the use to SSH, explaining the differences between SSL Shell and Telnet. It discovers the main functions PuTTY and it learns to initiate a SSH session using his name of user and password.

Author: Emilio CS
Published the (updated )


What is PuTTy?

PuTTy is a network client that supports the protocols SSH, Telnet and Rlogin and serves mainly to initiate a remote session with another machine or servant. It is of free license and it is designed and it maintained mainly by Simon Tatham from Great Britain. In spite of his simplicity he is very functional and configurable.

PuTTy: To Free Telnet/SSH Client

Differences between SSL Shell and Telnet

Telnet only must be used by advanced users who need to execute shell scripts or to use commandos shell. Unfortunately, by this traditional method, as much login as password (as well as the rest of the session) our local network or through routers and nodes other people's to ours are even transmitted in clear text through. This means that whatever has activated to sniffer can capture our sessions with the potential danger that it entails. If you wish to accede safely remotely to a servant, it uses the SSH protocol (Secure Shell). He is similar to a traditional session telnet, but with the particularitity of which all the communications are based to avoid that third people can discover sensible information as the user, the password or what is written during a session.

To form an access and to connect to a SSH servant with PuTTy

In order to execute PuTTy it is not necessary to install it, unloads it and executes it directly. Also you can create a direct access to your writing-desk for future connections.

  1. It executes PuTTy
  2. In the configuration menu it selects the Session category
  3. It introduces the name of its domain or IP in the Host field Yam and selects the SSH protocol
  4. It introduces a name for this connection in the field You know Sessions
  5. It returns to the configuration menu and selects the SSH category
  6. Make sure that option 2 in Preferred SSH is noticeable protocol version
  7. It selects the Session category again
  8. In order to keep the configuration it beats Knows and Open to connect
Configuration of SSH access

This v2 to the carat-hosting.com domain is an example of configuration of SSH access, to connect with his domain it uses his name of domain or direction IP.

To initiate a SSH session using its name of user and password

When initiating the connection, will open the window of the terminal. It introduces his name of user and it presses Intro, later, it introduces his password and it presses Intro. If the name of user and password is correct will be able to initiate the SSH session.

To initiate a SSH session using its name of user and password

It is possible that the servant to whom tries to connect itself not allows him to identify himself by means of a name of user and password, and is necessary the use of a SSH key. If it is its case to perhaps interests him to read the tutorial To connect to a servant cPanel by means of key SSH being used PuTTy.

When a SSH connection is realised for the first time, the servant gives to the client of SSH the public key of the servant. PuTTy will alert to him of it and it will offer the option to him to accept the key or to reject it. If he accepts the key, he will store himself in the registry and he will be used to resist it with which the servant sends in each connection. If by some reason the key changes, PuTTy will generate a new warning in which the authenticity of the received key will consider, since somebody could be being made happen through the servant to whom we are wanted to connect.

Menu of system of PuTTy

Working with main PuTTy, functions

PuTTy is very simple to use, the major or minor complexity at the time of using will mainly depend it on the knowledge or needs that you have. Next the used main functions are described more or. For a deeper knowledge he is recommendable to read the official documents.

Menu of system

The system menu allows him to accede to quite interesting options while it works. In order to show the system menu it clicks with the right button on the bar of title of the window of the terminal.
  • Duplicate Session opens a new window of terminal based on the present connection.
  • You know Sessions allows to previously initiate a new session based on a kept connection.
  • Copy All to Clipboard copies in the paper holder of Windows all the text printed in the window of the terminal.

To copy and to stick text

PuTTy allows to copy and to stick text easily enters between the window of the terminal and the paper holder of Windows. If it wishes to copy text from the window of the terminal, clicks with the left button of the mouse and drags it to select the text; when it loosen the button of the mouse, the text will be copied automatically to the paper holder. Another interesting possibility to copy a word or she with the left button of the mouse commands is to click double exceeds and next to click with the right button to stick the word selected in the own terminal.

Way complete screen

If it wishes to work to complete screen it clicks with the right button on the bar of title of the window of the terminal to see the system menu and selects Full screen. If it wishes to return to way window, it clicks with the left button on the left corner superior of the screen to open the system menu and selects Full again screen.

Selection of the encryption algorithm

PuTTy supports a great variety of algorithms. The type of algorithm in the Encryption section can determine his preferences selecting options of the SSH category and clicking on the bellboys Up and Down to indicate the preference order. At the moment PuTTy supports the following algorithms:
  • AES (SSH-2 only)
  • Blowfish
  • 3DES
  • -- warn below here --
  • Arcfour (SSH-2 only)
  • DES

Perhaps but it happens that the servant to which wishes to connect to not offers the security him that you need. Below this level of security, it can form PuTTy so that it warns to him of it by means of the option -- warn below here -- below which it would be alerted that the coding system is not sufficiently safe.

To generate a file of registry of a session

Sometimes he is very practitioner to be able to generate a registry to keep in log all the information that appears in the screen of the terminal during a session.

To generate a file of registry of sessions
  1. In order to form the details of the registry and what type of information wishes to keep in the same, it goes to the main menu of configuration of PuTTy and in the Session category it selects the Logging option.
  2. Later output marks to the All options session.
  3. Next it introduces a name for the file in the Log field it cases out yam and it selects to its location doing click in Browse€¦.
  4. Password leaves noticeable to the default Omit known fields.
  5. In order to keep the new configuration it selects the Session category again and it clicks in Knows.

To close a session

In order to close a session it does not close PuTTy as any other application. Exit writes and beats Intro.

Connections of interest