Manage Remote Linux Machines from Windows Using KiTTY
Need to connect to a remote Linux machine or server from a Windows computer? Then KiTTY is your best friend. This Telnet and SSH client is a fork of the popular PuTTY tool that offers several useful improvements.
For starters, KiTTY sports the portability mode which allows you to run the tool on a Windows machine without leaving any traces. To enable the portability mode, create a kitty.ini file in the same location as KiTTY, and add the following lines to the file:
KiTTY can save multiple session profiles, and the utility allows you to group sessions into folders, which can be useful for keeping tabs on profiles. The ability to handle URLs is another of KiTTY's handy features, and you can configure how the utility should treat links in the Window | Hyperlinks section.
Tired of entering login credentials every time you connect to a remote machine? KiTTY got you covered: in the Connection | Data section, you can specify auto-login details, and the utility uses them to log you in automatically when you connect to a remote machine.
KiTTY also lets you temporarily disable keyboard input to avoid accidental typing, and you can use the Ctrl+F9 keyboard shortcut to toggle keyboard input.
These are just a few of KiTTY's highlights, but the utility has a raft of other neat features that make it a perfect tool for managing remote Linux machines.comments powered by Disqus
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.