• Home
  • Courses
  • About Us
  • Contact
  • Mores
    • Tech Services
    • Store
    • Tech Blog
    • FAQs
    Have any question?
    +91-9460053140
    [email protected]
    RegisterLogin
    THCBin Learning
    • Home
    • Courses
    • About Us
    • Contact
    • Mores
      • Tech Services
      • Store
      • Tech Blog
      • FAQs

      IT & Security

      • Home
      • All courses
      • IT & Security
      • The ultimate Putty guide: Using Putty for SSH

      The ultimate Putty guide: Using Putty for SSH

      User Avatar
      THCBin
      IT & Security, Technology
      (0 review)
      $5.49 Free
      Putty for SSH
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      PuTTY is a free and open-source terminal emulator, serial console, and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name “PuTTY” has no definitive meaning.
      Master advanced Putty settings that help you to quickly access your Linux servers
      • Download and Install putty on a windows machine
      • Create and edit profiles in putty
      • Launch Linux GUI interface using Xming with Putty
      • Log your putty session into text files for future reference
      • Change putty terminal font size, color and disable bell sound
      • Putty best practices in real-time – Author advise
      Quick reference course for one of the highly used SSH tool Putty
      PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and macOS, and unofficial ports have been contributed to platforms such as Symbian, Windows Mobile, and Windows Phone.
      PuTTY supports many variations on the secure remote terminal and provides user control over the SSH encryption key and protocol version, alternate ciphers such as 3DES, Arcfour, Blowfish, DES, and Public-key authentication. It also can emulate control sequences from xterm, VT102 or ECMA-48 terminal emulation, and allows local, remote, or dynamic port forwarding with SSH (including X11 forwarding). The network communication layer supports IPv6, and the SSH protocol supports the [email protected] delayed compression scheme. It can also be used with local serial port connections.
      PuTTY comes bundled with command-line SCP and SFTP clients, called “pscp” and “psftp” respectively, and plink, a command-line connection tool, used for non-interactive sessions.
      PuTTY consists of several components:
      • PuTTY: the Telnet, rlogin, and SSH client itself, which can also connect to a serial port
      • PSCP: an SCP client, i.e. command-line secure file copyPSFTP: an SFTP client, i.e. general file transfer sessions much like FTPPuTTYtel: a Telnet-only clientPlink: a command-line interface to the PuTTY back ends
      • Pageant: an SSH authentication agent for PuTTY, PSCP, and Plink
      • PuTTYgen: an RSA, DSA, ECDSA, and EdDSA key generation utility
      • pterm: a standalone terminal emulator

      Course Features

      • Lectures 20
      • Quizzes 0
      • Duration 1 hours
      • Language English
      • Students 2
      • Certificate Yes
      • Assessments Yes
      CoursesTechnologyIT & SecurityThe ultimate Putty guide: Using Putty for SSH
      • Introduction to Putty
        3
        • Lecture1.1
          How to download putty 01 min
        • Lecture1.2
          How to Install putty 01 min
        • Lecture1.3
          How to Start putty 03 min
      • Getting Started with putty
        3
        • Lecture2.1
          Starting multiple sessions in putty 02 min
        • Lecture2.2
          Login to putty ssh terminal 02 min
        • Lecture2.3
          Log out from putty ssh terminal 01 min
      • Crate and save profiles in putty
        4
        • Lecture3.1
          Create your first profile in putty 03 min
        • Lecture3.2
          Create multiple server profiles in putty 02 min
        • Lecture3.3
          Create multiple user profiles in putty 02 min
        • Lecture3.4
          How to edit a profile 01 min
      • Invoke Linux GUI in putty using Xming
        3
        • Lecture4.1
          Download and install Xming software 04 min
        • Lecture4.2
          Putty X11 forward setting 03 min
        • Lecture4.3
          Create default GUI profile in putty 03 min
      • Advanced Putty options
        6
        • Lecture5.1
          How to log your putty session into text files 07 min
        • Lecture5.2
          How to disable Linux bell sound 02 min
        • Lecture5.3
          How to keep all scroll lines in putty 04 min
        • Lecture5.4
          Change the font of putty terminal 03 min
        • Lecture5.5
          Change text color in putty 03 min
        • Lecture5.6
          Putty keepalive intervals 03 min
      • Putty Best Practices
        1
        • Lecture6.1
          Author best practices 03 min
      author avatar
      THCBin

      Founder

      Learning is the process of acquiring new or modifying existing, knowledge, behaviors, skills, values, or preferences. The ability to learn is possessed by humans, animals, and some machines; there is also evidence for some kind of learning in some plants.

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      $5.49 Free
      • Share:

      You May Like

      Web hacking and Security: Basic to advance level course Read More
      THCBin

      Web hacking and Security: Basic to advance level course

      5
      0
      Free
      Wireless hacking and security Read More
      THCBin

      Wireless hacking and security

      3
      0
      Free
      The Complete Cyber Security Course! Volume 2 : Network Security! Read More
      THCBin

      The Complete Cyber Security Course! Volume 2 : Network Security!

      3
      0
      Free
      The Complete Cyber Security Course! Volume 1 : Hackers Exposed Read More
      THCBin

      The Complete Cyber Security Course! Volume 1 : Hackers Exposed

      3
      0
      Free
      Protect your WordPress Blog from Brute Force Attacks Read More
      THCBin

      Protect your WordPress Blog from Brute Force Attacks

      2
      0
      Free

      Popular Courses

      Learn Man In The Middle Attacks From Scratch

      Learn Man In The Middle Attacks From Scratch

      $8.99 Free
      Facebook Page Masterclass: Use It to Grow Your Business

      Facebook Page Masterclass: Use It to Grow Your Business

      $5.99 Free
      Typographic Logos: Typography and Lettering for Logo Design

      Typographic Logos: Typography and Lettering for Logo Design

      $4.99 Free

      Follow Us

      Advertisement

      logo-eduma-the-best-lms-wordpress-theme

      +91-9460053140

      [email protected]

      Company

      • Tech Services
      • Tech Blog
      • Store
      • Become a Teacher

      Links

      • About Us
      • Profile
      • Courses

      Support

      • Become a Teacher
      • Contact
      • DMCA
      • FAQs

      Recommend

      • QR Code Generator
      • URL Shortener
      • Resume Builder
      • Android SVG to Vector Drawable

      © THCBin Learning 2018 - 20. Powered By THCBin

      • Privacy Policy
      • Terms And Conditions
      • Sitemap

      Become An Instructor?

      Join with us as an instructors and earn money hassle free!

      Get Started Now

      Connect with

      Login with Google Login with Facebook Login with LinkedIn

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Modal title

      Message modal