Previous | Contents | Next

Chapter 1: Introduction to PuTTY

PuTTY is a free SSH, Telnet and Rlogin client for 32-bit Windows systems.

1.1 What are SSH, Telnet and Rlogin?

If you already know what SSH, Telnet and Rlogin are, you can safely skip on to the next section.

SSH, Telnet and Rlogin are three ways of doing the same thing: logging in to a multi-user computer from another computer, over a network.

Multi-user operating systems, such as Unix and VMS, usually present a command-line interface to the user, much like the "Command Prompt" or "MS-DOS Prompt" in Windows. The system prints a prompt, and you type commands which the system will obey.

Using this type of interface, there is no need for you to be sitting at the same machine you are typing commands to. The commands, and responses, can be sent over a network, so you can sit at one computer and give commands to another one, or even to more than one.

SSH, Telnet and Rlogin are network protocols that allow you to do this. On the computer you sit at, you run a client, which makes a network connection to the other computer (the server). The network connection carries your keystrokes and commands from the client to the server, and carries the server's responses back to you.

These protocols can also be used for other types of keyboard-based interactive session. In particular, there are a lot of bulletin boards, talker systems and MUDs (Multi-User Dungeons) which support access using Telnet. There are even a few that support SSH.

You might want to use SSH, Telnet or Rlogin if:

You probably do not want to use SSH, Telnet or Rlogin if:

1.2 How do SSH, Telnet and Rlogin differ?

This list summarises some of the differences between SSH, Telnet and Rlogin.

The Internet is a hostile environment and security is everybody's responsibility. If you are connecting across the open Internet, then we recommend you use SSH. If the server you want to connect to doesn't support SSH, it might be worth trying to persuade the administrator to install it.

If you are behind a good firewall, it is more likely to be safe to use Telnet or Rlogin, but we still recommend you use SSH.

Previous | Contents | Next


Comments to [email protected]
[$Id: blurb.but,v 1.6 2002/02/24 15:17:10 simon Exp $]
[$Id: intro.but,v 1.4 2001/11/25 16:57:45 simon Exp $]
[$Id: gs.but,v 1.6 2001/12/06 20:05:39 simon Exp $]
[$Id: using.but,v 1.8 2002/09/11 17:30:36 jacob Exp $]
[$Id: config.but,v 1.42 2002/09/26 18:37:33 simon Exp $]
[$Id: pscp.but,v 1.22 2002/09/11 17:30:36 jacob Exp $]
[$Id: psftp.but,v 1.5 2002/08/07 19:20:06 simon Exp $]
[$Id: plink.but,v 1.17 2002/09/11 17:30:36 jacob Exp $]
[$Id: pubkey.but,v 1.18 2002/09/11 17:30:36 jacob Exp $]
[$Id: pageant.but,v 1.8 2002/09/11 17:30:36 jacob Exp $]
[$Id: errors.but,v 1.1 2002/10/01 16:27:36 simon Exp $]
[$Id: faq.but,v 1.35 2002/09/14 10:24:27 jacob Exp $]
[$Id: feedback.but,v 1.8 2002/08/12 14:08:55 simon Exp $]
[$Id: licence.but,v 1.4 2002/03/27 21:09:16 simon Exp $]