PuTTY :: High Performance Computing (2024)

PuTTY is a free and open-source terminal emulator application. It was first written for Microsoft Windows, but it has also been ported to some other Unix-like platforms.

Terminal Emulator

In the past, when personal computers (PCs) were rare, users connected using devices called terminals. These were essentially a display device and a keyboard. A terminal is a physical device that transmits and receives character data, and displays it on a display or a paper printer. The terminal communicates with a computer that’s typically somewhere else, using communications cabling.

PuTTY :: High Performance Computing (1)

The purpose of an emulator is to accurately reproduce the behavior of some hardware. Emulation refers to the ability of a computer program to emulate (or imitate) another program or device. Hence, a terminal emulation software, such as PuTTY, replicates the function of a terminal. In this way, a user can access a distant terminal system. An emulator typically enables the host system to run software or use peripheral devices designed for the guest system. It can act as a client for network protocols (such as SSH, Telnet, rlogin) to enable remote computer sessions.

PuTTY :: High Performance Computing (2)

When thousands of clients store data on a single server, safety is the first priority. Hence, most of the hosting services are built on Linux OS, as it provides better safety for client data. However this poses a greater challenge for Non-Linux users to access the server. But, terminal emulators, such as PuTTy, enable Non-Linux users to interact with Linux servers from a Non-Linux OS.

For example, NMSU supercomputer Discovery is hosted by NMSU. However, students, faculty, and staff can access it through their own PCs with installed PuTTY. Thus, using PuTTY, they can log in to Discovery, use its memory, and available software. For example, users can run a MATLAB code and get results, without installing the MATLAB software on their PCs, or using their PC’s memory.

PuTTY :: High Performance Computing (3)

Purpose of PuTTY

PuTTY is most commonly used:

  • as a File Transfer ProtocolPuTTY can connect to a remote machine through SSH. SSH (Secure shell) is a protocol that allows a secure connection. In this way, a PC can securely send and receive data from a remote server. PuTTy provides various file transfer features like FTP and SFTP, depending on the user security requirements.

  • to generate SSH keyNowadays, passwords are prone to security threats specially when you are dealing with a lot of confidential data online. With SSH key, you can just point to the public key and login to the server any time without entering any password or user name.

Using PuTTY

1. Getting and Installing

- Go to the link to downloaD a copy of the software for the Windows platform fromDownload PuTTY

- Now, Download the installation package:

PuTTY :: High Performance Computing (4)

If you have a 64-bit computer, it’s recommended that you install the 64-bit version Almost any computer bought after 2015 has a 64-bit processor, except for the very cheapest ones. Many high-end computers sold several years before that. If you don’t know or don’t care, it’s always safe to use the 32-bit version.

- Starting the installer:On Windows 10, the Edge browser offers to run the installer when the download is complete. Just click to install the software. On older versions of Windows, you may need to run the installer manually. Open the Windows Explorer (right-click on the Windows logo in the bottom left corner) and navigate to the Downloads directory (or wherever you saved the installer). Then, double-click on the filename.

The installation has to be performed with Administrator rights (either using the Administrator account or your personal account must have Administrator permissions).

- Configuring and installing:When the installer starts, it shows the welcome screen. Just click Next.

The installer then asks for the Destination folder in which to install the software. Almost always it’s best to use the default value. Just click Next.

PuTTY :: High Performance Computing (6)

Then, the installer asks to select product features to install. You probably want to add a shortcut on the desktop if you expect to use the software often. All the other options generally should be enabled. When ready, click Install.

PuTTY :: High Performance Computing (7)

When the installation has completed successfully, it should show a "Completed" screen. Click Finish to exit the installer.

PuTTY :: High Performance Computing (8)

2. Running PuTTY

Once installation successfully completed, you should test to make sure that PuTTY runs correctly and you can find the program. If you installed a shortcut on the desktop, you should be able to find the icon for PuTTY. Try (double-)clicking on the icon. It should start the software.

Otherwise, you should be able to find the software from the Windows Start menu in the bottom left corner of the screen. The menu looks different in each version of Windows. On Windows 10, scroll down until you see PuTTY. Open the group, and select PuTTY.

If you are accessing Discovery from outside the NMSU campus, you have to run the VPN before you proceed!

3. Log In

When the software starts, you should get a window with the title "PuTTY Configuration" with a field Host Name in the upper middle part. Try entering a host name to connect to in that field, and click Open.

PuTTY :: High Performance Computing (9)

Host Name: discovery.nmsu.edu

PuTTY :: High Performance Computing (10)

Other Options:

  • PortThe port field specifies the TCP/IP port to connect. For SSH, this is the port on which the SSH server runs. Normally it can be left to 22. If for some reason you need to connect to a different port number, just change the value.

  • Connection TypeThe Connection type selection seldom needs to be touched. Just leave it as SSH. SSH is a secure, encrypted communications protocol designed to ensure your password and data are maximally protected.

  • Load, save, or delete a stored sessionThis section allows you to save your settings as named profiles. Just write the name of your new profile in the Saved Sessions box and click Save to create a new profile. The host name and your other settings are saved in the profile. Saved profiles appear in the larger box below it. Initially it will contain just Default Settings. Profiles you save will be included there. Select a profile and click Load to use a previously saved profile. Select a profile and click Delete to delete a profile that’s no longer needed.

  • Close window on exitFinally, the Close window on exit setting specifies whether the terminal window should be automatically closed when the connection is terminated. There is rarely any need to change it from the default value of Only on clean exit.

4. Connect

When you connect to a server for the first time, you are likely to see a PuTTY Security Alert dialog about server’s host key not being cached in the registry. You should just click Yes.

PuTTY :: High Performance Computing (11)

Enter your credentialsAfter the security alert, you should get a terminal window. By default, this is a black, very bland window. It should first ask for your user name and then password. Enter your MyNMSU usernameand password.

PuTTY :: High Performance Computing (12)

Use the terminalAfter these, you should get a command line on the server. You can then type into the terminal Window. You are now connected to the server, and anything you type in the Window is sent to the server. Server’s responses are displayed in the Window. You can run any text-based applications on the server using the window. The session terminates when you exit the command-line shell on the server (typically by typing exit) to the command line or pressing Ctrl + D. You can also forcibly end the session by closing the terminal window.

5. Authentication options - public key authentication

The Auth subtree contains some options that may be useful. When Auth is clicked, it shows a pane titled Options controlling SSH authentication.image::tutorials/PuTTY/putty_auth.jpg[putty_auth.jpg]

To enable public key authentication, you need to generate an SSH key. PuTTYgen is a key generator tool for creating SSH keys for PuTTY.

- Download and install PuTTYgen:Go to → Download PuTTYgen and download PuTTYgen.

PuTTY :: High Performance Computing (13)

PuTTY :: High Performance Computing (14)

- Create a new key pair:To create a new key pair, select the type of key to generate from the bottom of the screen using RSA with 4096 bit key size is good for most people. Another well-known alternative for RSA is ECDSA. Then click Generate, and start moving the mouse in the Window. Putty uses mouse movements to collect randomness. The exact way you are going to move your mouse can’t be predicted by an external attacker. You may need to move the mouse for some time, depending on the size of your key. As you move it, the green progress bar should advance. After the progress bar becomes full, the actual key generation computation takes place. This may take from several seconds to several minutes. When complete, the public key should appear in the Window. You can now specify a passphrase for the key. You should save at least the private key by clicking Save private key. It may be advisable to also save the public key, though it can be later regenerated by loading the private key (by clicking Load). It’s strongly recommended to use a passphrase for private key files intended for interactive use. If keys are needed for automation (For Example, with WinSCP, then they may be left without a passphrase.

PuTTY :: High Performance Computing (15)

- Specify a key passphrase:You can now specify a passphrase for the key. You should save at least the private key by clicking Save private key. It may be advisable to also save the public key, though it can be later regenerated by loading the private key (by clicking Load). It’s strongly recommended to use a passphrase for private key files intended for interactive use. If keys are needed for automation (For Example, with WinSCP, then they may be left without a passphrase.

PuTTY :: High Performance Computing (16)

- Save Private Key

Click Save private key to save the private key to your local machine. Click save after giving the filename.

PuTTY :: High Performance Computing (17)

- Setting up public key

The public key has to be transferred to the Discovery. Hence, select the whole key and copy like below:

PuTTY :: High Performance Computing (18)

  • Login to the Discovery using the credentials. Run the following command to go to the ./ssh directory.

cd ~/.ssh
  • Run the below command to create/open the file authorized_keys.

vi authorized_keys
  • Paste the copied public key file in the authorized_keys file. Then, save and close the file.

ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjoAD5ikBYfDDdy1sLegiVIwfC9xTAbWaW8nNHTobUeNXBy251KeYqOAE8eq6ccGJh4lvUC6tVqXeyoGXoHpYP4NZ5C07ZfCBmhl5TzEl/cXE+qQTT3Kw3HYAL0K9pDjdTveZ2T7aizw2Hu3dU9iybROqy5DyQbTrA33chd55Y80TBmf4kzYRnpWj95pUbWUwM3sTLZbbLgTROdqWIA6QiMYVZGNgUcSWjPuanMloyK3neVhGOAew+nXSTXxBrYtuP0Q5XhIPMROP6NKbzEPy1yJLFvYYN/xhfT+HN671ZOGVfGSCePbQfI0ZaPbefM+iGpm7yfTURL+HVCFNLqTkJw== rsa-key-20201023
  • Now, set the read, write, and execute permissions to the ~/.ssh directory, and `~/.ssh/* ` files. Run the below command from the home directory in Discovery.

chmod 700 ~/.sshchmod 600 ~/.ssh/*

chmod 700 sets read, write and execute permissions to the user/owner while chmod 600 sets read and write permissions to the user/owner.

  • Logout of the discovery. Open PuTTy and enter the <username>discovery.nmsu.edu in Host Name text entry.

PuTTY :: High Performance Computing (19)

- Loading Private Key:

  • Click Auth tab and then browse the path where you have stored the private key.

PuTTY :: High Performance Computing (20)

  • Click Open and you will be able to ssh into discovery without even entering the password.

Using username "your-username".Authenticating with public key "rsa-key-20201023"Last login: Thu Oct 22 23:13:18 2020 from 10.253.233.20################################################# ____ _ / __ \(_)_____________ _ _____ _______ __ / / / / / ___/ ___/ __ \ | / / _ \/ ___/ / / / / /_/ / (__ ) /__/ /_/ / |/ / __/ / / /_/ //_____/_/____/\___/\____/|___/\___/_/ \__, / /____/################################################### Welcome to Discovery! ##- For more inforamtion on how to use the system, please visit 'https://hpc.nmsu.edu'.- Visit 'https://slurm.nmsu.edu' to generate sbatch job submission scripts.- Please review our policies at 'https://hpc.nmsu.edu/home/resources/policies'.- To contact us email '[email protected]'...............

6. X11 forwarding options

X11 is a protocol and system for running graphical applications on Unix and Linux. It supports running graphical applications remotely over a network out-of-the-box. To use an X11 server, you need to check the Enable X11 forwarding box.

PuTTY :: High Performance Computing (21)

PuTTY :: High Performance Computing (2024)
Top Articles
How to Boost Gaming Performance on Your Android Phone
The Worst Failed Mergers in Business History: 10 Examples
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6334

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.