Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
        Terminal Window >>
        File Transfer Window >>
            File Transfer Window Title Bar
            File Transfer Window Menu Bar
            File Transfer Window Toolbars
            File Transfer Window Status Bar
            Local View
            Local Folder View
            Remote View
            Remote Folder View
            Transfer View
            Navigating in the File Transfer Window
            File Transfer Shortcut Menus
        Toolbar Reference >>
        Menu Reference >>
    Troubleshooting >>
    Command-Line Tools >>

File Transfer Window Title Bar

The title bar is located at the top of the file transfer window.

The leftmost item on the title bar is the window icon. Click it to display the Window menu or double-click to close the window. If a file transfer is active when you attempt to close the window, a confirmation dialog asks if you actually want to cancel the transfer operation.

The next item on the title bar is the sequence number of the window. This helps you to distinguish between different windows using the same connection.


client-filetransfer-titlebar-72.gif
Figure : The file transfer window title bar

Next on the title bar is the host name of the remote computer. Displaying the name on the title bar is optional, and it is shown only if defined on the Appearance page (see Section Defining the Appearance). For example, a second window associated with a connection to a host computer called remote would display as 2:remote.

The next item on the title bar is the name of the settings file in use. Displaying the name on the title bar is optional, and it is shown only if defined on the Appearance page (see Section Defining the Appearance). If you are not using a settings file that has been saved with a specific file name, a settings file called default is used.

If you have changed the settings without saving them, an asterisk (*) is displayed on the title bar, after the name of the current settings file (for example default*). For information on saving the changed settings, see Section Saving Settings.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more