Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
        Terminal Window >>
            Terminal Window Title Bar
            Terminal Window Status Bar
            Terminal Window Shortcut Menu
        File Transfer Window >>
        Toolbar Reference >>
        Menu Reference >>
    Troubleshooting >>
    Command-Line Tools >>

Terminal Window Shortcut Menu

If you have not set the Paste on Right Mouse Click option (see Section Defining the Appearance), a shortcut menu appears when you click the terminal window with the right mouse button.

By default, the following menu options are available:

  • Copy

    Copies text onto the Windows clipboard.

  • Paste

    Pastes text from the Windows clipboard.

  • Paste Selection

    Copies the currently selected text into the cursor location without first copying it onto the Windows clipboard.

  • Select All

    Selects all of the scrollback buffer.

  • Select Screen

    Selects all text currently displayed on the screen. The rest of the scrollback buffer will not be selected.

  • Select None

    Cancels the current selection.

  • Find

    Searches for text in the scrollback buffer.

  • New Terminal

    Opens a new terminal window.

  • New File Transfer

    Opens a new file transfer window.

  • Close Window

    Closes the current window.

  • Settings

    Opens the Settings dialog.

The available options can be configured using the Customize dialog (see Section Customize).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more