PuTTY 歷史版本列表 Page1

最新版本 Alien Skin Exposure 4.5.6

PuTTY 歷史版本列表

PuTTY 是一個免費的 Windows 和 Unix 平台的 Telnet 和 SSH 實現,以及一個 xterm 終端模擬器。它主要由 Simon Tatham 編寫和維護. 這些協議全部用於通過網絡在計算機上運行遠程會話。 PuTTY 實現該會話的客戶端:會話顯示的結束,而不是運行結束. 真的很簡單:在 Windows 計算機上運行 PuTTY,並告訴它連接到(例如)一台 Unix 機器。 ... PuTTY 軟體介紹


更新時間:2019-07-20
更新細節:

What's new in this version:

- It fixes a small number of further security issues found by the 2019 EU-funded HackerOne bug bounty, and a variety of other bugs introduced in 0.71

Superstring 3.3.4 查看版本資訊

更新時間:2019-07-20
更新細節:

What's new in this version:

Superstring 3.3.4
- Adds a zoom feature to the editor
- Improves video quality
- Fixes minor issues


Superstring 3.2.8
- Adds new "GFS Neohellenic" font
- Improves stability
- Fixes minor issues


Superstring 3.2.6
- Change log not available for this version


Superstring 3.2.4
- Change log not available for this version


Superstring 3.2.2
- Adds "Appearance" in settings
- Improves stability
- Fixes minor issues


Superstring 3.2.0
- Adds a new "Direction Sign" text style
- Removes the background color to increase performance
- Improves stability
- Fixes minor issues

Alien Skin Exposure 4.5.6 查看版本資訊

更新時間:2019-07-20
更新細節:

Alien Skin Exposure 4.5.5 (Bundle) 查看版本資訊

更新時間:2019-05-22
更新細節:

Alien Skin Exposure 4.5.1 查看版本資訊

更新時間:2019-05-20
更新細節:

更新時間:2019-03-16
更新細節:

What's new in this version:

Security fixes found by an EU-funded bug bounty programme:
- a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification
- potential recycling of random numbers used in cryptography
- on Windows, hijacking by a malicious help file in the same directory as the executable
- on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding
- multiple denial-of-service attacks that can be triggered by writing to the terminal
- Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels
- We now provide pre-built binaries for Windows on Arm
- Hardware-accelerated versions of the most common cryptographic primitives: AES, SHA-256, SHA-1
- GTK PuTTY now supports non-X11 displays (e.g. Wayland) and high-DPI configurations
- Type-ahead now works as soon as a PuTTY window is opened: keystrokes typed before authentication has finished will be buffered instead of being dropped
- Support for GSSAPI key exchange: an alternative to the older GSSAPI authentication system which can keep your forwarded Kerberos credentials updated during a long session
- More choices of user interface for clipboard handling
- New terminal features: support the REP escape sequence (fixing an ncurses screen redraw failure), true colour, and SGR 2 dim text
- Pressing Ctrl+Shift+PgUp or Ctrl+Shift+PgDn now takes you straight to the top or bottom of the terminal scrollback

Mono 5.18.1.0 (64-bit) 查看版本資訊

更新時間:2019-03-16
更新細節:

更新時間:2017-07-09
更新細節:

What's new in this version:

- Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even a name we missed when we thought we'd fixed this in 0.69. See vuln-indirect-dll-hijack-3
- Windows PuTTY should be able to print again, after our DLL hijacking defences broke that functionality
- Windows PuTTY should be able to accept keyboard input outside the current code page, after our DLL hijacking defences broke that too

更新時間:2017-04-29
更新細節:

更新時間:2017-02-22
更新細節:

What's new in this version:

- Security fix: an integer overflow bug in the agent forwarding code
- Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory (on versions of Windows where they previously were)
- Windows PuTTY no longer sets a restrictive process ACL by default, because this turned out to inconvenience too many legitimate applications such as NVDA and TortoiseGit. You can still manually request a restricted ACL using the command-line option -restrict-acl
- The Windows PuTTY tools now come in a 64-bit version
- The Windows PuTTY tools now have Windows's ASLR and DEP security features turned on
- Support for elliptic-curve cryptography (the NIST curves and 25519), for host keys, user authentication keys, and key exchange
- Support for importing and exporting OpenSSH's new private key format
- Host key preference policy change: PuTTY prefers host key formats for which it already knows the key
- Run-time option (from the system menu / Ctrl-right-click menu) to retrieve other host keys from the same server (which cross-certifies them using the session key established using an already-known key) and add them to the known host-keys database