PuTTY :: High Performance Computing (2024)

PuTTY is a free and open-source terminal emulator application. It was first written for Microsoft Windows, but it has also been ported to some other Unix-like platforms.

Terminal Emulator

In the past, when personal computers (PCs) were rare, users connected using devices called terminals. These were essentially a display device and a keyboard. A terminal is a physical device that transmits and receives character data, and displays it on a display or a paper printer. The terminal communicates with a computer that’s typically somewhere else, using communications cabling.

PuTTY :: High Performance Computing (1)

The purpose of an emulator is to accurately reproduce the behavior of some hardware. Emulation refers to the ability of a computer program to emulate (or imitate) another program or device. Hence, a terminal emulation software, such as PuTTY, replicates the function of a terminal. In this way, a user can access a distant terminal system. An emulator typically enables the host system to run software or use peripheral devices designed for the guest system. It can act as a client for network protocols (such as SSH, Telnet, rlogin) to enable remote computer sessions.

PuTTY :: High Performance Computing (2)

When thousands of clients store data on a single server, safety is the first priority. Hence, most of the hosting services are built on Linux OS, as it provides better safety for client data. However this poses a greater challenge for Non-Linux users to access the server. But, terminal emulators, such as PuTTy, enable Non-Linux users to interact with Linux servers from a Non-Linux OS.

For example, NMSU supercomputer Discovery is hosted by NMSU. However, students, faculty, and staff can access it through their own PCs with installed PuTTY. Thus, using PuTTY, they can log in to Discovery, use its memory, and available software. For example, users can run a MATLAB code and get results, without installing the MATLAB software on their PCs, or using their PC’s memory.

PuTTY :: High Performance Computing (3)

Purpose of PuTTY

PuTTY is most commonly used:

  • as a File Transfer ProtocolPuTTY can connect to a remote machine through SSH. SSH (Secure shell) is a protocol that allows a secure connection. In this way, a PC can securely send and receive data from a remote server. PuTTy provides various file transfer features like FTP and SFTP, depending on the user security requirements.

  • to generate SSH keyNowadays, passwords are prone to security threats specially when you are dealing with a lot of confidential data online. With SSH key, you can just point to the public key and login to the server any time without entering any password or user name.

Using PuTTY

1. Getting and Installing

- Go to the link to downloaD a copy of the software for the Windows platform fromDownload PuTTY

- Now, Download the installation package:

PuTTY :: High Performance Computing (4)

If you have a 64-bit computer, it’s recommended that you install the 64-bit version Almost any computer bought after 2015 has a 64-bit processor, except for the very cheapest ones. Many high-end computers sold several years before that. If you don’t know or don’t care, it’s always safe to use the 32-bit version.

- Starting the installer:On Windows 10, the Edge browser offers to run the installer when the download is complete. Just click to install the software. On older versions of Windows, you may need to run the installer manually. Open the Windows Explorer (right-click on the Windows logo in the bottom left corner) and navigate to the Downloads directory (or wherever you saved the installer). Then, double-click on the filename.

The installation has to be performed with Administrator rights (either using the Administrator account or your personal account must have Administrator permissions).

- Configuring and installing:When the installer starts, it shows the welcome screen. Just click Next.

The installer then asks for the Destination folder in which to install the software. Almost always it’s best to use the default value. Just click Next.

PuTTY :: High Performance Computing (6)

Then, the installer asks to select product features to install. You probably want to add a shortcut on the desktop if you expect to use the software often. All the other options generally should be enabled. When ready, click Install.

PuTTY :: High Performance Computing (7)

When the installation has completed successfully, it should show a "Completed" screen. Click Finish to exit the installer.

PuTTY :: High Performance Computing (8)

2. Running PuTTY

Once installation successfully completed, you should test to make sure that PuTTY runs correctly and you can find the program. If you installed a shortcut on the desktop, you should be able to find the icon for PuTTY. Try (double-)clicking on the icon. It should start the software.

Otherwise, you should be able to find the software from the Windows Start menu in the bottom left corner of the screen. The menu looks different in each version of Windows. On Windows 10, scroll down until you see PuTTY. Open the group, and select PuTTY.

If you are accessing Discovery from outside the NMSU campus, you have to run the VPN before you proceed!

3. Log In

When the software starts, you should get a window with the title "PuTTY Configuration" with a field Host Name in the upper middle part. Try entering a host name to connect to in that field, and click Open.

PuTTY :: High Performance Computing (9)

Host Name: discovery.nmsu.edu

PuTTY :: High Performance Computing (10)

Other Options:

  • PortThe port field specifies the TCP/IP port to connect. For SSH, this is the port on which the SSH server runs. Normally it can be left to 22. If for some reason you need to connect to a different port number, just change the value.

  • Connection TypeThe Connection type selection seldom needs to be touched. Just leave it as SSH. SSH is a secure, encrypted communications protocol designed to ensure your password and data are maximally protected.

  • Load, save, or delete a stored sessionThis section allows you to save your settings as named profiles. Just write the name of your new profile in the Saved Sessions box and click Save to create a new profile. The host name and your other settings are saved in the profile. Saved profiles appear in the larger box below it. Initially it will contain just Default Settings. Profiles you save will be included there. Select a profile and click Load to use a previously saved profile. Select a profile and click Delete to delete a profile that’s no longer needed.

  • Close window on exitFinally, the Close window on exit setting specifies whether the terminal window should be automatically closed when the connection is terminated. There is rarely any need to change it from the default value of Only on clean exit.

4. Connect

When you connect to a server for the first time, you are likely to see a PuTTY Security Alert dialog about server’s host key not being cached in the registry. You should just click Yes.

PuTTY :: High Performance Computing (11)

Enter your credentialsAfter the security alert, you should get a terminal window. By default, this is a black, very bland window. It should first ask for your user name and then password. Enter your MyNMSU usernameand password.

PuTTY :: High Performance Computing (12)

Use the terminalAfter these, you should get a command line on the server. You can then type into the terminal Window. You are now connected to the server, and anything you type in the Window is sent to the server. Server’s responses are displayed in the Window. You can run any text-based applications on the server using the window. The session terminates when you exit the command-line shell on the server (typically by typing exit) to the command line or pressing Ctrl + D. You can also forcibly end the session by closing the terminal window.

5. Authentication options - public key authentication

The Auth subtree contains some options that may be useful. When Auth is clicked, it shows a pane titled Options controlling SSH authentication.image::tutorials/PuTTY/putty_auth.jpg[putty_auth.jpg]

To enable public key authentication, you need to generate an SSH key. PuTTYgen is a key generator tool for creating SSH keys for PuTTY.

- Download and install PuTTYgen:Go to → Download PuTTYgen and download PuTTYgen.

PuTTY :: High Performance Computing (13)

PuTTY :: High Performance Computing (14)

- Create a new key pair:To create a new key pair, select the type of key to generate from the bottom of the screen using RSA with 4096 bit key size is good for most people. Another well-known alternative for RSA is ECDSA. Then click Generate, and start moving the mouse in the Window. Putty uses mouse movements to collect randomness. The exact way you are going to move your mouse can’t be predicted by an external attacker. You may need to move the mouse for some time, depending on the size of your key. As you move it, the green progress bar should advance. After the progress bar becomes full, the actual key generation computation takes place. This may take from several seconds to several minutes. When complete, the public key should appear in the Window. You can now specify a passphrase for the key. You should save at least the private key by clicking Save private key. It may be advisable to also save the public key, though it can be later regenerated by loading the private key (by clicking Load). It’s strongly recommended to use a passphrase for private key files intended for interactive use. If keys are needed for automation (For Example, with WinSCP, then they may be left without a passphrase.

PuTTY :: High Performance Computing (15)

- Specify a key passphrase:You can now specify a passphrase for the key. You should save at least the private key by clicking Save private key. It may be advisable to also save the public key, though it can be later regenerated by loading the private key (by clicking Load). It’s strongly recommended to use a passphrase for private key files intended for interactive use. If keys are needed for automation (For Example, with WinSCP, then they may be left without a passphrase.

PuTTY :: High Performance Computing (16)

- Save Private Key

Click Save private key to save the private key to your local machine. Click save after giving the filename.

PuTTY :: High Performance Computing (17)

- Setting up public key

The public key has to be transferred to the Discovery. Hence, select the whole key and copy like below:

PuTTY :: High Performance Computing (18)

  • Login to the Discovery using the credentials. Run the following command to go to the ./ssh directory.

cd ~/.ssh
  • Run the below command to create/open the file authorized_keys.

vi authorized_keys
  • Paste the copied public key file in the authorized_keys file. Then, save and close the file.

ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjoAD5ikBYfDDdy1sLegiVIwfC9xTAbWaW8nNHTobUeNXBy251KeYqOAE8eq6ccGJh4lvUC6tVqXeyoGXoHpYP4NZ5C07ZfCBmhl5TzEl/cXE+qQTT3Kw3HYAL0K9pDjdTveZ2T7aizw2Hu3dU9iybROqy5DyQbTrA33chd55Y80TBmf4kzYRnpWj95pUbWUwM3sTLZbbLgTROdqWIA6QiMYVZGNgUcSWjPuanMloyK3neVhGOAew+nXSTXxBrYtuP0Q5XhIPMROP6NKbzEPy1yJLFvYYN/xhfT+HN671ZOGVfGSCePbQfI0ZaPbefM+iGpm7yfTURL+HVCFNLqTkJw== rsa-key-20201023
  • Now, set the read, write, and execute permissions to the ~/.ssh directory, and `~/.ssh/* ` files. Run the below command from the home directory in Discovery.

chmod 700 ~/.sshchmod 600 ~/.ssh/*

chmod 700 sets read, write and execute permissions to the user/owner while chmod 600 sets read and write permissions to the user/owner.

  • Logout of the discovery. Open PuTTy and enter the <username>discovery.nmsu.edu in Host Name text entry.

PuTTY :: High Performance Computing (19)

- Loading Private Key:

  • Click Auth tab and then browse the path where you have stored the private key.

PuTTY :: High Performance Computing (20)

  • Click Open and you will be able to ssh into discovery without even entering the password.

Using username "your-username".Authenticating with public key "rsa-key-20201023"Last login: Thu Oct 22 23:13:18 2020 from 10.253.233.20################################################# ____ _ / __ \(_)_____________ _ _____ _______ __ / / / / / ___/ ___/ __ \ | / / _ \/ ___/ / / / / /_/ / (__ ) /__/ /_/ / |/ / __/ / / /_/ //_____/_/____/\___/\____/|___/\___/_/ \__, / /____/################################################### Welcome to Discovery! ##- For more inforamtion on how to use the system, please visit 'https://hpc.nmsu.edu'.- Visit 'https://slurm.nmsu.edu' to generate sbatch job submission scripts.- Please review our policies at 'https://hpc.nmsu.edu/home/resources/policies'.- To contact us email '[email protected]'...............

6. X11 forwarding options

X11 is a protocol and system for running graphical applications on Unix and Linux. It supports running graphical applications remotely over a network out-of-the-box. To use an X11 server, you need to check the Enable X11 forwarding box.

PuTTY :: High Performance Computing (21)

PuTTY :: High Performance Computing (2024)
Top Articles
Is LDA Topic Modeling Dead?
The many definitions of sustainability and sustainable development
Fort Morgan Hometown Takeover Map
Cars & Trucks - By Owner near Kissimmee, FL - craigslist
Craigslist Niles Ohio
Southside Grill Schuylkill Haven Pa
Southeast Iowa Buy Sell Trade
Hk Jockey Club Result
Erskine Plus Portal
Nwi Police Blotter
Xrarse
biBERK Business Insurance Provides Essential Insights on Liquor Store Risk Management and Insurance Considerations
Which Is A Popular Southern Hemisphere Destination Microsoft Rewards
Lantana Blocc Compton Crips
83600 Block Of 11Th Street East Palmdale Ca
Palace Pizza Joplin
Evangeline Downs Racetrack Entries
Johnston v. State, 2023 MT 20
Caliber Collision Burnsville
Ostateillustrated Com Message Boards
Images of CGC-graded Comic Books Now Available Using the CGC Certification Verification Tool
Xsensual Portland
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
Uncovering The Mystery Behind Crazyjamjam Fanfix Leaked
Sec Baseball Tournament Score
Hdmovie2 Sbs
30+ useful Dutch apps for new expats in the Netherlands
3 Ways to Format a Computer - wikiHow
Evil Dead Rise - Everything You Need To Know
Ravens 24X7 Forum
Att U Verse Outage Map
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Nicole Wallace Mother Of Pearl Necklace
Babbychula
No Hard Feelings Showtimes Near Tilton Square Theatre
Ny Post Front Page Cover Today
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Caderno 2 Aulas Medicina - Matemática
Eastern New Mexico News Obituaries
Restored Republic June 6 2023
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Dicks Mear Me
New Zero Turn Mowers For Sale Near Me
Marcel Boom X
Enter The Gungeon Gunther
Www.homedepot .Com
Shiftselect Carolinas
Diablo Spawns Blox Fruits
View From My Seat Madison Square Garden
Read Love in Orbit - Chapter 2 - Page 974 | MangaBuddy
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6334

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.