![]() ![]() generated by trackpads).īackwards compatibility fix: certificate-based user authentication now works with OpenSSH 7.7 and earlier.īug fix: in a session using the 'Raw' protocol, pressing ^D twice in the terminal window could cause an assertion failure.īug fix: terminal output could hang if a resize control sequence was sent by the server (and was not disabled in the Features panel) but PuTTY's window was set to non-resizable in the Window panel.īug fix: GTK PuTTY could fail an assertion if a resize control sequence was sent by the server while the window was docked to one half of the screen in KDE.īug fix: GTK PuTTY could fail an assertion if you tried to change the font size while the window was maximised.īug fix: the 'bell overload' timing settings were misinterpreted by Unix PuTTY and pterm 0.77/0.78 if any settings were saved using these versions, confusion can persist with newer versions.īug fix: SSH authentication banners were not reliably printed if a server sent one immediately before closing the connection (e.g. Terminal mouse tracking: support for horizontal scroll events (e.g. Terminal mouse tracking: support for mouse movements which are not drags. If both end up installed, uninstalling both and then re-installing the new version will fix things up. In that situation we recommend uninstalling 0.78 first, if possible. ![]() Note: this means that installing the 0.79 or later Windows installer will not automatically uninstall 0.78, if 0.78 was installed using its default 'per user' scope. ![]() Windows installer scope is back to the normal 'per machine' setting, reverting 0.78's security workaround. These features are new in 0.79 (released ): For features planned for the next full release (and already available in the development snapshots), see the wishlist page. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |