Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
        Terminal Window >>
            Terminal Window Title Bar
            Terminal Window Status Bar
            Terminal Window Shortcut Menu
        File Transfer Window >>
        Toolbar Reference >>
        Menu Reference >>
    Troubleshooting >>
    Command-Line Tools >>

Terminal Window Title Bar

The title bar is located at the top of the window.

The leftmost item on the title bar is the window icon. Click it to display the Window menu, or double-click it to close the window.

The next item on the title bar is the sequence number of the window that helps in distinguishing between windows that use the same connection.


client-terminal-titlebar-69.gif
Figure : The terminal window title bar

Next on the title bar is the remote computer host name. Displaying the name on the title bar is optional, and it is shown only if defined on the Appearance page (see Section Defining the Appearance). For example, a second window associated with a connection to a host computer called remote would display as 2:remote.

The next item on the title bar is the name of the settings file in use. Displaying the name on the title bar is optional, and it is shown only if defined on the Appearance page (see Section Defining the Appearance). If you are not using a settings file that has been saved with a specific file name, a settings file called default is used.

If you have changed the settings without saving them, an asterisk (*) is displayed on the title bar, after the name of the current settings file (for example: default*). For information on saving the changed settings, see Section Saving Settings.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more