|
Your download link is at the very bottom of the page... always. |
Processed through Paypal No account required. Donate Bitcoin to this wallet: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm Donate Ethereum to this wallet: 0x40E56922F43637224935CDC35e2c96E0392A8505 Donate Litecoin to this wallet: LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL |
File - Download PuTTY v0.81 | ||||||||
Description | ||||||||
A Plea. Deanna and I (Your Older Geeks) have been running OlderGeeks.com since 2008 and lately we are seeing a major increase in usage (and cost) but a big decline in percentage of users who donate. Our ad-free and junkware-free download site only works if everyone chips in to offset the revenue that ads on other sites bring in. Please donate on the website today. Every little bit helps. Thank you so much. -D&R Always scroll to the bottom of the page for the main download link. We don't believe in fake/misleading download buttons and tricks. The link is always in the same place. PuTTY v0.81 A free SSH, Telnet, Rlogin, and SUPDUP client for Windows systems. SSH, Telnet, Rlogin, and SUPDUP are four ways of doing the same thing: logging in to a multi-user computer from another computer, over a network. Using this type of interface, there is no need for you to be sitting at the same machine you are typing commands to. The commands, and responses, can be sent over a network, so you can sit at one computer and give commands to another one, or even to more than one. SSH, Telnet, Rlogin, and SUPDUP are network protocols that allow you to do this. On the computer you sit at, you run a client, which makes a network connection to the other computer (the server). The network connection carries your keystrokes and commands from the client to the server, and carries the server's responses back to you. These protocols can also be used for other types of keyboard-based interactive session. In particular, there are a lot of bulletin boards, talker systems and MUDs (Multi-User Dungeons) which support access using Telnet. There are even a few that support SSH. You might want to use SSH, Telnet, Rlogin, or SUPDUP if: • you have an account on a Unix system (or some other multi-user OS such as VMS or ITS) which you want to be able to access from somewhere else • your Internet Service Provider provides you with a login account on a web server. (This might also be known as a shell account. A shell is the program that runs on the server and interprets your commands for you.) • you want to use a bulletin board system, talker or MUD which can be accessed using Telnet. You probably do not want to use SSH, Telnet, Rlogin, or SUPDUP if: • you only use Windows. Windows computers have their own ways of networking between themselves, and unless you are doing something fairly unusual, you will not need to use any of these remote login protocols. How do SSH, Telnet, Rlogin, and SUPDUP differ? This list summarizes some of the differences between SSH, Telnet, Rlogin, and SUPDUP. • SSH (which stands for ‘secure shell’) is a recently designed, high-security protocol. It uses strong cryptography to protect your connection against eavesdropping, hijacking and other attacks. Telnet, Rlogin, and SUPDUP are all older protocols offering minimal security. • SSH and Rlogin both allow you to log in to the server without having to type a password. (Rlogin's method of doing this is insecure, and can allow an attacker to access your account on the server. SSH's method is much more secure, and typically breaking the security requires the attacker to have gained access to your actual client machine.) • SSH allows you to connect to the server and automatically send a command, so that the server will run that command and then disconnect. So you can use it in automated processing. The Internet is a hostile environment and security is everybody's responsibility. If you are connecting across the open Internet, then we recommend you use SSH. If the server you want to connect to doesn't support SSH, it might be worth trying to persuade the administrator to install it. If your client and server are both behind the same (good) firewall, it is more likely to be safe to use Telnet, Rlogin, or SUPDUP, but we still recommend you use SSH. Changes v0.81 (released 2024-04-15) Security fix for CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no longer generated with biased values of k. The previous bias compromises private keys. This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the Windows ARM 64bit version, download here. Click here to visit the author's website. Continue below for the main download link. |
||||||||
Downloads | Views | Developer | Last Update | Version | Size | Type | Rank | |
549 | 2,199 | Simon Tatham <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PuTTY1_th.png"border="0"> | Apr 26, 2024 - 11:19 | 0.81 | 3.54MB | MSI | , out of 11 Votes. | |
File Tags | ||||||||
v0.81 PuTTY |
Click to Rate File     Share it on Twitter → Tweet
|