Your browser does not allow storing cookies. We recommend enabling them.



The print settings can be configured using the Printing page of the Settings dialog.

The Printing page of the Settings dialog

Figure B.11. The Printing page of the Settings dialog

Printer Font

Select the Font Name and Font Size to be used in the printed output. Any non-proportional font installed on your system can be selected.

Margins (mm)

Select the width of the blank border around the page in printed output. The margins for the top, bottom, left and right side of the page can all be specified individually. The default value for all margins is 10 millimeters (or 1 centimeter).

Header & footer

Select additional information to appear on the printed pages.

Title appears at the top left of the page and displays the title of the terminal window (for example remotehost - Tectia Client).

Date appears at the top right of the page and displays the date and time when the page was printed (for example 15 September 2003, 11:10). The date and time format is the same as used in Windows.

Page number appears at the bottom right of the page (for example Page 1 of 2).

Pass-through printing

Pass-through printing allows the server to print on a client printer using terminal emulation codes.

In raw mode, Tectia Client sends the data to be printed as plaintext to the printer. In this mode, printing for example line graphics does not work.

If not in raw mode, Tectia Client sends the data to be printed to the printer as graphics. This is the default setting and should be used if there are no problems in printing. However, some older printers might not support printing graphics.

Use raw mode

Select this check box to pass the data to be printed to the printer in raw mode. If you experience printing problems, select or clear this selection as applicable.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more