SlideShare a Scribd company logo
-1-


Putty:
What is PuTTY?
PuTTY is a client program for the Secure Shell (SSH), Telnet and Rlogin using network protocols.These
use remote session on a computer over the network. PuTTY implements the client end session at which the
session is displayed, rather than the end at which it runs.

How does it work?
By double clicking PuTTY icon       , it opens a window. Then, anything you type into that window is sent
                                Putty.exe


straight to the UNIX server and everything the UNIX server sends back is displayed in the window. By
having internet connection, you can work on the server from any part of the world.

System Requirements.
PuTTY is very small program and can run any of these operating systems Microsoft Windows 95, 98, NT,
ME, 2000, and XP; Unix. PuTTY also requires having steady internet connection (Dial up or Broadband, or
LAN connection) to communicate with UNIX server.

Download and Install.
It is easily available freeware software. If you search “Download Putty” in search engine like google,
yahoo, you will find easily. PuTTY can be downloaded by click on the following link.
                       http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Since PuTTY is executeable software, so it does not require specific installation. To run PuTTY, double
click on the PuTTY icon.


                                                   Putty.exe
                                            Figure 1: Putty Icon
-2-


Confugring PuTTY:
PuTTY can be configured by following steps.

1.   As show in the Figure 2, on the SESSION Tab (check to make sure it is highlighted up in the upper
     left hand corner), enter login.ncsu.edu (cs.ucok.edu for UCO) under Host Name.
2.   Select the SSH radio button under Protocol.




                                     Figure 2: PuTTY Configuration

3.   Look to the left column and click on SSH. A gray box will form around it and the window will
     change.
4.   Click the Enable Compression checkbox.
5.   Select the Preferred SSH protocol version to radio button.
6.   Under Encryption Options, select (click on it and it will darken) either Blowfish or 3DES. Make sure
     your window looks like Figure 3.
-3-




                                   Figure 3: PuTTY Configuration

7.   Look back to the left column and click on Tunnels which is underneath SSH, which we were just
     working on.
8.   At the very top of the window, select the checkbox labeled Enable X11 forwarding. Please do not
     forget to do this very important step! Then the window should match Figure 4.
-4-




                                     Figure 4: PuTTY Configuration

9.    Click back on the Session tab at the very top of the left hand column.
10.   On the right under Saved Sessions, enter a name for these settings (something like ncsu or ucok ).
11.   Click the Save button to the right of the text box.
12.   Select (highlight) the settings you just saved from the list and click the Open button at the bottom of
      the page (Figure 5).
-5-




                                  Figure 5: PuTTY Configuration

Wow! You have now configured PuTTY. To run PuTTY, make sure that you select your saved settings and
click Open.
-6-


Login:
1. Click on the PuTTY icon. The following screen will pop up.




                                        Figure 6: PuTTY Log in.

13. Select the saved session and click on open. The following command window will open.




                                  Figure 7: PuTTY Command Prompt.
-7-


14. Type the Login ID (Login ID and password for UNIX server account is provided by the instructor)
    and press enter. Then, enter your password and press enter.


       The password is not visible on the screen. So, please make sure you type the correct password and
press enter.

You should see the following screen.




                                       Figure 8: Screen after Login.

On the green (rectangular shaped as show in above figure), you can simply type the UNIX commands and
press Enter.
-8-


UNIX COMMANANDS:

Basic UNIX command:

      UNIX is case sensitive operating system. So, it is very important to follow the case of command
to make it work.

To use UNIX commands, just type the command on the screen as below.

cal: Simply type cal then hit ENTER. This command will display the calendar of the current month.




                                    Figure 9: Displaying Current Calendar


cd: It stands for change current directory. Without a dirname, itc will return you to your home
directory. Otherwise, it takes you to the directory named. quot;cd /quot; will take you to the root directory.

Chmod: it Changes the permission of a file. If you type quot;ls -lquot; in a directory, you might get
something like this:
     drwx------ 3 ertle 512 Jul 16 13:38 LaTeX/
     drwxr-xr-- 2 ertle 512 Jun22 12:26 X/
     drwxr-xr-x 3 ertle 512 Jul 13 16:29 Xroff/
     -rw-r--r-- 1 ertle 373 Oct 3 1992 o.me
     -rw-r--r-- 1 ertle 747 Nov 21 1992 profile
     -rwxr-xr-x 1 ertle 244 Jul 16 23:44 zap*

The first part of the line tells you the file’s permissions. For example, the X file permissions start with a d
denotes it is a directory. The next three characters, rwx show that the owner has read, write, and execute
permissions on this file. The next three characters, r-x shows that people in the same group have read
and execute permission on the file. Finally, the last three characters r- shows that everyone else only has
read permission on that file. You can use chmod to change these permissions.

cp {filename(s)}{path}
Copies files from one directory/filename to another. cp f1 f2 makes a file f2 identical to f1. cp *.c
src/ copies all files that end in .c into the src subdirectory.
-9-
date: shows the current date and time.

Find: It searches the named directory and it’s sub-directories for files. Most frequently called like this:
    find ./ -name quot;t*quot; -print

Which searches the current directory (and all of its sub-directories) for any files that begin with the
letter ’t’ and then prints them out. If you are looking for a specific filename, then replace quot;t*quot; with
filename, and find will print out all incidences of this file.

Logout: Exits and disconnects your network connection.

ls {directory}: Shows directory listing. If no directory is specified, ls prints the names of the
files in the current directory.

ls -l {directory}: Shows long directory listing. If you type ls -l in a directory, you might get
something like this:
     drwx------    3   ertle   512   Jul   16 13:38 LaTeX/
     drwxr-xr--    2   ertle   512   Jun   22 12:26 X/
     drwxr-xr-x    3   ertle   512   Jul   13 16:29 Xroff/
     -rw-r--r--    1   ertle   373   Oct   3 1992 o.me
     -rw-r--r--    1   ertle   747   Nov   21 1992 profile
     -rwxr-xr-x    1   ertle   244   Jul   16 23:44 zap*
The first part of the line tells you the file’s permissions. For example, the X file permissions start with a d
which tells that it is a directory. The next three characters, rwx show that the owner has read, write, and
execute permissions on this file. The next three characters, r-x shows that people in the same group have
read and execute permission on the file. Finally, the last three characters r- shows that everyone else only
has read permission on that file.

mkdir dirname: Makes a sub-directory named dirname in the current directory.

man {section}name: Shows the full manual page entry for name. Without a section number, man
may give you any or all man pages for that name. For example, man write will give you the manual
pages for the write command, and man 2 write will give you the system call for write.


Pwd: Shows current working directory path.

rm filename(s): Removes files.

      Be careful with this one because it is irreversible.

rmdir dirname: Removes the directory dirname.

who: Shows who is currently logged on UNIX server.
- 10 -


Text editors: VI, NANO:
These are the popular text editors available in PuTTY. Among these, VI is the most popular because it does
indentation and highlights the code automatically. It helps programmer to correct mistakes quickly. NANO
is simple text editor like Textpad. NANO displays the command on the screen. At the beginner level, it is
recommended to use NANO, because you do not have to remember commands to use this text editor like VI
.
For vi:        vi filename
For NANO nano filename


Compiling Commands:
                                cc -g file.c -o executablename –llib
               C file
                                c++ -g file.cpp -o executablename -
               C++
                                llibquot;.
                                javac filename.java
               JAVA

                                f77 filename
               FORTRAN
                                     Table 1: Compiling Commands
- 11 -


Advanced PuTTY User:
 If you are interested in the advanced feature of PuTTY, you can consult with your instructor or click the
following website.
                                    http://www.emba.uvm.edu/CF/adv.php
- 12 -


Summary of UNIX command:
          Displays a calendar.
cal
          Concatenates and displays files.
cat
          C compiler.
cc
          Change directory.
cd
          Changes a file's group ownership.
chgrp
          Changes a file's access permissions.
chmod
          Changes the individual ownership of a file.
chown
          Compares two files; diplays the location (line and byte) of the
cmp
            1st difference between the two files.
          Compares two files - finds lines that are common to both.
comm
          Copies a file to another location.
cp
          Returns the date and time.
date
          Displays free space in the file system.
df
          Displays the differences between two files or directories.
diff
          Reports on file system usage.
du
          Displays its argument.
echo
          Text editor.
ed
          FORTRAN compiler.
f77
          Locates the files with specified characteristics.
find
          Searches for a pattern within a file. (also see awk)
grep
          1 line blurb.
help
          Ends a process.
kill
          Link files.
ln
          Copies the file to the line printer.
lpr
          Displays information about one or more files.
ls
          Used to receive or deliver e-mail.
mail
          Display manual for the most common unix commands.
man
          Creates a new directory.
mkdir
          Displays a long file so that the user can scroll through it.
more
          Used to move or rename files.
mv
          Get network status.
netstat
          Display a process's status.
ps
          Display the name of the working directory.
pwd
          Removes one or more files.
rm
          Deletes one or more directories.
rmdir
          Causes a process to become inactive for a specified length of time.
sleep
          Sort and merge one or more files.
sort
          Finds spelling errors in a file.
spell
          Divides a file.
split
          Display or set terminal parameters.
stty
          Displays the end of a file.
tail
          Sets the terminal type.
tset
          Compares 2 files. Displays lines in one file that are unique.
uniq
          Full screen editor.
vi
          Count words in a file.
wc
          1 line description of a few of the Unix commands
whatis
          Information on who else is online.
who
- 13 -



                                        References:
PuTTY FAQ < http://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html >

Configuring PuTTY
<http://ced.ncsu.edu/ltrc/studio/workshops/accessrights/configputty.htm >

TechShop
<http://www.techsoup.org/products/downdetails.cfm?downloadcat=18&downloadid=158 >

UVM College of Mathematics and Engineering < http://www.emba.uvm.edu/CF/adv.php >

Basic UNIX Commands <http://www.comsc.ucok.edu/~mcdaniel/mcdaniel/opsys/unixcmds >

Basic UNIX Commands < http://www.emba.uvm.edu/CF/basic.html#ls >
- 14 -

More Related Content

What's hot

Nfs
NfsNfs
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
Knoldus Inc.
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
Unix memory management
Unix memory managementUnix memory management
Unix memory management
Tech_MX
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
Threads .ppt
Threads .pptThreads .ppt
Threads .ppt
meet darji
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
udamale
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
shayan singla
 
Operating system 31 multiple processor scheduling
Operating system 31 multiple processor schedulingOperating system 31 multiple processor scheduling
Operating system 31 multiple processor scheduling
Vaibhav Khanna
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
Rohit Phulsunge
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency control
Prakash Poudel
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems
Ioanna Tsalouchidou
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Process management in os
Process management in osProcess management in os
Process management in os
Miong Lazaro
 
Deadlock
DeadlockDeadlock
Deadlock
Rajandeep Gill
 
Dhcp
DhcpDhcp
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
sgpraju
 
P4/FPGA, Packet Acceleration
P4/FPGA, Packet AccelerationP4/FPGA, Packet Acceleration
P4/FPGA, Packet Acceleration
Liz Warner
 

What's hot (20)

Nfs
NfsNfs
Nfs
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Unix memory management
Unix memory managementUnix memory management
Unix memory management
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Threads .ppt
Threads .pptThreads .ppt
Threads .ppt
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Operating system 31 multiple processor scheduling
Operating system 31 multiple processor schedulingOperating system 31 multiple processor scheduling
Operating system 31 multiple processor scheduling
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency control
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems The Chubby lock service for loosely- coupled distributed systems
The Chubby lock service for loosely- coupled distributed systems
 
Data link control
Data link controlData link control
Data link control
 
Process management in os
Process management in osProcess management in os
Process management in os
 
Deadlock
DeadlockDeadlock
Deadlock
 
Dhcp
DhcpDhcp
Dhcp
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
 
P4/FPGA, Packet Acceleration
P4/FPGA, Packet AccelerationP4/FPGA, Packet Acceleration
P4/FPGA, Packet Acceleration
 

Viewers also liked

Paints
PaintsPaints
Finishing works (Building Construction)
Finishing works (Building Construction)Finishing works (Building Construction)
Finishing works (Building Construction)
Zairul Zaiky
 
Different types of Paint and Finishes
Different types of Paint and FinishesDifferent types of Paint and Finishes
Different types of Paint and Finishes
paintlover
 
Paints
PaintsPaints
Paints And its types
Paints And its typesPaints And its types
Paints And its types
Harpreet Oberoi
 
Building Construction
Building ConstructionBuilding Construction
Building Construction
Wilden How
 

Viewers also liked (6)

Paints
PaintsPaints
Paints
 
Finishing works (Building Construction)
Finishing works (Building Construction)Finishing works (Building Construction)
Finishing works (Building Construction)
 
Different types of Paint and Finishes
Different types of Paint and FinishesDifferent types of Paint and Finishes
Different types of Paint and Finishes
 
Paints
PaintsPaints
Paints
 
Paints And its types
Paints And its typesPaints And its types
Paints And its types
 
Building Construction
Building ConstructionBuilding Construction
Building Construction
 

Similar to Putty

11 unix osx_commands
11 unix osx_commands11 unix osx_commands
11 unix osx_commands
Macinfosoft
 
Unix environment [autosaved]
Unix environment [autosaved]Unix environment [autosaved]
Unix environment [autosaved]
Er Mittinpreet Singh
 
LINUX
LINUXLINUX
LINUX
ARJUN
 
Linux introductory-course-day-1
Linux introductory-course-day-1Linux introductory-course-day-1
Linux introductory-course-day-1
Julio Pulido
 
Linux Cheat Sheet.pdf
Linux Cheat Sheet.pdfLinux Cheat Sheet.pdf
Linux Cheat Sheet.pdf
roschahacker
 
lec1.docx
lec1.docxlec1.docx
lec1.docx
ismailaboshatra
 
Linux Shortcuts and Commands:
Linux Shortcuts and Commands:Linux Shortcuts and Commands:
Linux Shortcuts and Commands:
wensheng wei
 
Unix
UnixUnix
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
Kavya Sri
 
Linux Systems Programming: File Handling
Linux Systems Programming: File HandlingLinux Systems Programming: File Handling
Linux Systems Programming: File Handling
RashidFaridChishti
 
Operating System Laboratory presentation .ppt
Operating System Laboratory presentation .pptOperating System Laboratory presentation .ppt
Operating System Laboratory presentation .ppt
PDhivyabharathi2
 
84640411 study-of-unix-os
84640411 study-of-unix-os84640411 study-of-unix-os
84640411 study-of-unix-os
homeworkping3
 
Linux
LinuxLinux
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxPart 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
karlhennesey
 
Chapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix ConceptsChapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix Concepts
MeenalJabde
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
Foss manual (1)
Foss manual (1)Foss manual (1)
Foss manual (1)
Janagi Raman S
 
Linux basic
Linux basicLinux basic
Linux basic
Pragyagupta37
 
Unix notes
Unix notesUnix notes
Unix
UnixUnix
Unix
Erm78
 

Similar to Putty (20)

11 unix osx_commands
11 unix osx_commands11 unix osx_commands
11 unix osx_commands
 
Unix environment [autosaved]
Unix environment [autosaved]Unix environment [autosaved]
Unix environment [autosaved]
 
LINUX
LINUXLINUX
LINUX
 
Linux introductory-course-day-1
Linux introductory-course-day-1Linux introductory-course-day-1
Linux introductory-course-day-1
 
Linux Cheat Sheet.pdf
Linux Cheat Sheet.pdfLinux Cheat Sheet.pdf
Linux Cheat Sheet.pdf
 
lec1.docx
lec1.docxlec1.docx
lec1.docx
 
Linux Shortcuts and Commands:
Linux Shortcuts and Commands:Linux Shortcuts and Commands:
Linux Shortcuts and Commands:
 
Unix
UnixUnix
Unix
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 
Linux Systems Programming: File Handling
Linux Systems Programming: File HandlingLinux Systems Programming: File Handling
Linux Systems Programming: File Handling
 
Operating System Laboratory presentation .ppt
Operating System Laboratory presentation .pptOperating System Laboratory presentation .ppt
Operating System Laboratory presentation .ppt
 
84640411 study-of-unix-os
84640411 study-of-unix-os84640411 study-of-unix-os
84640411 study-of-unix-os
 
Linux
LinuxLinux
Linux
 
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxPart 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docx
 
Chapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix ConceptsChapter 2 Introduction to Unix Concepts
Chapter 2 Introduction to Unix Concepts
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
 
Foss manual (1)
Foss manual (1)Foss manual (1)
Foss manual (1)
 
Linux basic
Linux basicLinux basic
Linux basic
 
Unix notes
Unix notesUnix notes
Unix notes
 
Unix
UnixUnix
Unix
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Putty

  • 1. -1- Putty: What is PuTTY? PuTTY is a client program for the Secure Shell (SSH), Telnet and Rlogin using network protocols.These use remote session on a computer over the network. PuTTY implements the client end session at which the session is displayed, rather than the end at which it runs. How does it work? By double clicking PuTTY icon , it opens a window. Then, anything you type into that window is sent Putty.exe straight to the UNIX server and everything the UNIX server sends back is displayed in the window. By having internet connection, you can work on the server from any part of the world. System Requirements. PuTTY is very small program and can run any of these operating systems Microsoft Windows 95, 98, NT, ME, 2000, and XP; Unix. PuTTY also requires having steady internet connection (Dial up or Broadband, or LAN connection) to communicate with UNIX server. Download and Install. It is easily available freeware software. If you search “Download Putty” in search engine like google, yahoo, you will find easily. PuTTY can be downloaded by click on the following link. http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html Since PuTTY is executeable software, so it does not require specific installation. To run PuTTY, double click on the PuTTY icon. Putty.exe Figure 1: Putty Icon
  • 2. -2- Confugring PuTTY: PuTTY can be configured by following steps. 1. As show in the Figure 2, on the SESSION Tab (check to make sure it is highlighted up in the upper left hand corner), enter login.ncsu.edu (cs.ucok.edu for UCO) under Host Name. 2. Select the SSH radio button under Protocol. Figure 2: PuTTY Configuration 3. Look to the left column and click on SSH. A gray box will form around it and the window will change. 4. Click the Enable Compression checkbox. 5. Select the Preferred SSH protocol version to radio button. 6. Under Encryption Options, select (click on it and it will darken) either Blowfish or 3DES. Make sure your window looks like Figure 3.
  • 3. -3- Figure 3: PuTTY Configuration 7. Look back to the left column and click on Tunnels which is underneath SSH, which we were just working on. 8. At the very top of the window, select the checkbox labeled Enable X11 forwarding. Please do not forget to do this very important step! Then the window should match Figure 4.
  • 4. -4- Figure 4: PuTTY Configuration 9. Click back on the Session tab at the very top of the left hand column. 10. On the right under Saved Sessions, enter a name for these settings (something like ncsu or ucok ). 11. Click the Save button to the right of the text box. 12. Select (highlight) the settings you just saved from the list and click the Open button at the bottom of the page (Figure 5).
  • 5. -5- Figure 5: PuTTY Configuration Wow! You have now configured PuTTY. To run PuTTY, make sure that you select your saved settings and click Open.
  • 6. -6- Login: 1. Click on the PuTTY icon. The following screen will pop up. Figure 6: PuTTY Log in. 13. Select the saved session and click on open. The following command window will open. Figure 7: PuTTY Command Prompt.
  • 7. -7- 14. Type the Login ID (Login ID and password for UNIX server account is provided by the instructor) and press enter. Then, enter your password and press enter. The password is not visible on the screen. So, please make sure you type the correct password and press enter. You should see the following screen. Figure 8: Screen after Login. On the green (rectangular shaped as show in above figure), you can simply type the UNIX commands and press Enter.
  • 8. -8- UNIX COMMANANDS: Basic UNIX command: UNIX is case sensitive operating system. So, it is very important to follow the case of command to make it work. To use UNIX commands, just type the command on the screen as below. cal: Simply type cal then hit ENTER. This command will display the calendar of the current month. Figure 9: Displaying Current Calendar cd: It stands for change current directory. Without a dirname, itc will return you to your home directory. Otherwise, it takes you to the directory named. quot;cd /quot; will take you to the root directory. Chmod: it Changes the permission of a file. If you type quot;ls -lquot; in a directory, you might get something like this: drwx------ 3 ertle 512 Jul 16 13:38 LaTeX/ drwxr-xr-- 2 ertle 512 Jun22 12:26 X/ drwxr-xr-x 3 ertle 512 Jul 13 16:29 Xroff/ -rw-r--r-- 1 ertle 373 Oct 3 1992 o.me -rw-r--r-- 1 ertle 747 Nov 21 1992 profile -rwxr-xr-x 1 ertle 244 Jul 16 23:44 zap* The first part of the line tells you the file’s permissions. For example, the X file permissions start with a d denotes it is a directory. The next three characters, rwx show that the owner has read, write, and execute permissions on this file. The next three characters, r-x shows that people in the same group have read and execute permission on the file. Finally, the last three characters r- shows that everyone else only has read permission on that file. You can use chmod to change these permissions. cp {filename(s)}{path} Copies files from one directory/filename to another. cp f1 f2 makes a file f2 identical to f1. cp *.c src/ copies all files that end in .c into the src subdirectory.
  • 9. -9- date: shows the current date and time. Find: It searches the named directory and it’s sub-directories for files. Most frequently called like this: find ./ -name quot;t*quot; -print Which searches the current directory (and all of its sub-directories) for any files that begin with the letter ’t’ and then prints them out. If you are looking for a specific filename, then replace quot;t*quot; with filename, and find will print out all incidences of this file. Logout: Exits and disconnects your network connection. ls {directory}: Shows directory listing. If no directory is specified, ls prints the names of the files in the current directory. ls -l {directory}: Shows long directory listing. If you type ls -l in a directory, you might get something like this: drwx------ 3 ertle 512 Jul 16 13:38 LaTeX/ drwxr-xr-- 2 ertle 512 Jun 22 12:26 X/ drwxr-xr-x 3 ertle 512 Jul 13 16:29 Xroff/ -rw-r--r-- 1 ertle 373 Oct 3 1992 o.me -rw-r--r-- 1 ertle 747 Nov 21 1992 profile -rwxr-xr-x 1 ertle 244 Jul 16 23:44 zap* The first part of the line tells you the file’s permissions. For example, the X file permissions start with a d which tells that it is a directory. The next three characters, rwx show that the owner has read, write, and execute permissions on this file. The next three characters, r-x shows that people in the same group have read and execute permission on the file. Finally, the last three characters r- shows that everyone else only has read permission on that file. mkdir dirname: Makes a sub-directory named dirname in the current directory. man {section}name: Shows the full manual page entry for name. Without a section number, man may give you any or all man pages for that name. For example, man write will give you the manual pages for the write command, and man 2 write will give you the system call for write. Pwd: Shows current working directory path. rm filename(s): Removes files. Be careful with this one because it is irreversible. rmdir dirname: Removes the directory dirname. who: Shows who is currently logged on UNIX server.
  • 10. - 10 - Text editors: VI, NANO: These are the popular text editors available in PuTTY. Among these, VI is the most popular because it does indentation and highlights the code automatically. It helps programmer to correct mistakes quickly. NANO is simple text editor like Textpad. NANO displays the command on the screen. At the beginner level, it is recommended to use NANO, because you do not have to remember commands to use this text editor like VI . For vi: vi filename For NANO nano filename Compiling Commands: cc -g file.c -o executablename –llib C file c++ -g file.cpp -o executablename - C++ llibquot;. javac filename.java JAVA f77 filename FORTRAN Table 1: Compiling Commands
  • 11. - 11 - Advanced PuTTY User: If you are interested in the advanced feature of PuTTY, you can consult with your instructor or click the following website. http://www.emba.uvm.edu/CF/adv.php
  • 12. - 12 - Summary of UNIX command: Displays a calendar. cal Concatenates and displays files. cat C compiler. cc Change directory. cd Changes a file's group ownership. chgrp Changes a file's access permissions. chmod Changes the individual ownership of a file. chown Compares two files; diplays the location (line and byte) of the cmp 1st difference between the two files. Compares two files - finds lines that are common to both. comm Copies a file to another location. cp Returns the date and time. date Displays free space in the file system. df Displays the differences between two files or directories. diff Reports on file system usage. du Displays its argument. echo Text editor. ed FORTRAN compiler. f77 Locates the files with specified characteristics. find Searches for a pattern within a file. (also see awk) grep 1 line blurb. help Ends a process. kill Link files. ln Copies the file to the line printer. lpr Displays information about one or more files. ls Used to receive or deliver e-mail. mail Display manual for the most common unix commands. man Creates a new directory. mkdir Displays a long file so that the user can scroll through it. more Used to move or rename files. mv Get network status. netstat Display a process's status. ps Display the name of the working directory. pwd Removes one or more files. rm Deletes one or more directories. rmdir Causes a process to become inactive for a specified length of time. sleep Sort and merge one or more files. sort Finds spelling errors in a file. spell Divides a file. split Display or set terminal parameters. stty Displays the end of a file. tail Sets the terminal type. tset Compares 2 files. Displays lines in one file that are unique. uniq Full screen editor. vi Count words in a file. wc 1 line description of a few of the Unix commands whatis Information on who else is online. who
  • 13. - 13 - References: PuTTY FAQ < http://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html > Configuring PuTTY <http://ced.ncsu.edu/ltrc/studio/workshops/accessrights/configputty.htm > TechShop <http://www.techsoup.org/products/downdetails.cfm?downloadcat=18&downloadid=158 > UVM College of Mathematics and Engineering < http://www.emba.uvm.edu/CF/adv.php > Basic UNIX Commands <http://www.comsc.ucok.edu/~mcdaniel/mcdaniel/opsys/unixcmds > Basic UNIX Commands < http://www.emba.uvm.edu/CF/basic.html#ls >