X-Git-Url: https://git.distorted.org.uk/~mdw/sgt/putty/blobdiff_plain/6cc170f02be245cb3269b2512f9e8a9373cc0c55..c16e353eb95120407b78602f0bbaedac57eccf44:/doc/intro.but diff --git a/doc/intro.but b/doc/intro.but index c8d60d45..a137788f 100644 --- a/doc/intro.but +++ b/doc/intro.but @@ -1,4 +1,4 @@ -\versionid $Id: intro.but,v 1.5 2004/04/08 12:38:53 simon Exp $ +\define{versionidintro} \versionid $Id$ \C{intro} Introduction to PuTTY @@ -15,7 +15,7 @@ logging in to a multi-user computer from another computer, over a network. Multi-user operating systems, such as Unix and VMS, usually present -a command-line interface to the user, much like the \q{\i{Command +a \i{command-line interface} to the user, much like the \q{\i{Command Prompt}} or \q{\i{MS-DOS Prompt}} in Windows. The system prints a prompt, and you type commands which the system will obey. @@ -33,7 +33,7 @@ you. These protocols can also be used for other types of keyboard-based interactive session. In particular, there are a lot of bulletin -boards, talker systems and MUDs (Multi-User Dungeons) which support +boards, \i{talker systems} and \i{MUDs} (Multi-User Dungeons) which support access using Telnet. There are even a few that support SSH. You might want to use SSH, Telnet or Rlogin if: @@ -42,11 +42,11 @@ You might want to use SSH, Telnet or Rlogin if: able to access from somewhere else \b your Internet Service Provider provides you with a login account -on a web server. (This might also be known as a \i\e{shell account}. +on a \i{web server}. (This might also be known as a \i\e{shell account}. A \e{shell} is the program that runs on the server and interprets your commands for you.) -\b you want to use a bulletin board system, talker or MUD which can +\b you want to use a \i{bulletin board system}, talker or MUD which can be accessed using Telnet. You probably do \e{not} want to use SSH, Telnet or Rlogin if: @@ -61,21 +61,13 @@ remote login protocols. This list summarises some of the \i{differences between SSH, Telnet and Rlogin}. -\b SSH is a recently designed, high-security protocol. It uses -strong cryptography to protect your connection against -eavesdropping, hijacking and other attacks. Telnet and Rlogin are -both older protocols offering minimal security. - -\b Telnet allows you to pass some settings on to the server, such as -environment variables. (These control various aspects of the -server's behaviour. You can usually set them by entering commands -into the server once you're connected, but it's easier to have -Telnet do it automatically.) SSH and Rlogin do not support this. -However, most modern Telnet servers don't allow it either, because -it has been a constant source of security problems. - -\b SSH and Rlogin both allow you to log in to the server without -having to type a password. (Rlogin's method of doing this is +\b SSH (which stands for \q{\i{secure shell}}) is a recently designed, +high-security protocol. It uses strong cryptography to protect your +connection against eavesdropping, hijacking and other attacks. Telnet +and Rlogin are both older protocols offering minimal security. + +\b SSH and Rlogin both allow you to \I{passwordless login}log in to the +server without having to type a password. (Rlogin's method of doing this is insecure, and can allow an attacker to access your account on the server. SSH's method is much more secure, and typically breaking the security requires the attacker to have gained access to your actual