PuTTY 0.74 freeware
PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham.
|OS||Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64|
|Installation||Instal And Uninstall|
|Keywords||Telnet client, SSH client, free SSH client, SSH, Telnet, client|
PuTTY Free Download - we do not host any PuTTY torrent files or links of PuTTY on rapidshare.com, depositfiles.com, megaupload.com etc. All PuTTY download links are direct PuTTY download from publisher site or their selected mirrors.
|0.74||Jun 27, 2020||New Release||Security fix: if an SSH server accepted an offer of a public key and then rejected the signature, PuTTY could access freed memory, if the key had come from an SSH agent.
Security feature: new config option to disable PuTTY's dynamic host key preference policy, if you prefer to avoid giving away to eavesdroppers which hosts you have stored keys for.
Bug fix: the installer UI was illegible in Windows high-contrast mode.
Bug fix: console password input failed on Windows 7.
Bug fixes in the terminal: one instance of the dreaded "line==NULL" error box, and two other assertion failures.
Bug fix: potential memory-consuming loop in bug-compatible padding of an RSA signature from an agent.
Bug fix: PSFTP's buffer handling worked badly with some servers (particularly proftpd's mod_sftp).
Bug fix: cursor could be wrongly positioned when restoring from the alternate terminal screen. (A bug of this type was fixed in 0.59; this is a case that that fix missed.)
|0.73||Sep 29, 2019||New Release||PuTTY 0.73, released today, is a bug-fix release. It fixes a small number of bugs since 0.72, and a couple of them have potential security implications.|
|0.68||Feb 21, 2017||New Release||Security fix: an integer overflow bug in the agent forwarding code. See vuln-agent-fwd-overflow.
Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory (on versions of Windows where they previously were). See vuln-indirect-dll-hijack.
Windows PuTTY no longer sets a restrictive process ACL by default, because this turned out to inconvenience too many legitimate applications such as NVDA and TortoiseGit. You can still manually request a restricted ACL using the command-line option -restrict-acl.
The Windows PuTTY tools now come in a 64-bit version.
The Windows PuTTY tools now have Windows's ASLR and DEP security features turned on.
Support for elliptic-curve cryptography (the NIST curves and 25519), for host keys, user authentication keys, and key exchange.
Support for importing and exporting OpenSSH's new private key format.
Host key preference policy change: PuTTY prefers host key formats for which it already k