Manage Remote Linux Machines from Windows Using KiTTY
Need to connect to a remote Linux machine or server from a Windows computer? Then KiTTY is your best friend. This Telnet and SSH client is a fork of the popular PuTTY tool that offers several useful improvements.
For starters, KiTTY sports the portability mode which allows you to run the tool on a Windows machine without leaving any traces. To enable the portability mode, create a kitty.ini file in the same location as KiTTY, and add the following lines to the file:
KiTTY can save multiple session profiles, and the utility allows you to group sessions into folders, which can be useful for keeping tabs on profiles. The ability to handle URLs is another of KiTTY's handy features, and you can configure how the utility should treat links in the Window | Hyperlinks section.
Tired of entering login credentials every time you connect to a remote machine? KiTTY got you covered: in the Connection | Data section, you can specify auto-login details, and the utility uses them to log you in automatically when you connect to a remote machine.
KiTTY also lets you temporarily disable keyboard input to avoid accidental typing, and you can use the Ctrl+F9 keyboard shortcut to toggle keyboard input.
These are just a few of KiTTY's highlights, but the utility has a raft of other neat features that make it a perfect tool for managing remote Linux machines.comments powered by Disqus
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm