


WindTerm is a cross-platform (Windows, MacOS, Linux) SSH client developed in C language. It is completely free for commercial and non-commercial use without restrictions. With the exception of third-party directories, all published source code is provided under the terms of the Apache-2.0 license.
Main features:
Support SSH, Telnet, Tcp, Shell, Serial
Supports SSH v2, Telnet, Raw Tcp, serial, and Shell protocols.
Support SSH automatic execution during session authentication.
Support SSH ControlMaster.
Supports SSH ProxyCommand or ProxyJump.
Support SSH agent forwarding.
Supports SSH automatic login using password, public key, keyboard interaction, and gssapi-with-mic.
Supports X11 forwarding.
Supports direct/local port forwarding, reverse/remote port forwarding and dynamic port forwarding.
Supports XModem, YModem and ZModem.
Integrate sftp and scp clients, support downloading, uploading, deleting, renaming, creating new files/directories, etc.
Integrated local file manager, supports moving to, copying to, copying from, deleting, renaming, creating new files/directories, etc.
Supports Windows Cmd, PowerShell and Cmd, PowerShell as administrator.
Supports Linux bash, zsh, powershell core, etc.
Supports MacOS bash, zsh, powershell core, etc.
Based on my experience of using it these days, I would like to share with you some features that really shocked me.
The following animation comes from the author's blog. I wanted to record it myself, but the resulting gif file was very large. Is there anyone who can teach me?
1. The power of WindTerm
1. Auto-completion function
The auto-completion function is simply good news for our programmers! Think about how much time the auto-completion function saves us when we write code?
WindTerm
It also comes with an auto-completion function. This is the first time I have seen this in a terminal tool. In the past, when we typed commands, we completed the commands by continuously tapping the Tab
key. Now, we no longer need to type the Tab
key.
2. Powerful historical backtracking function
Generally, if we need to view previously entered commands, we use history
Order. And WindTerm
will bring you a window of history commands directly on the right side, so you can save even the history
command!
And it also has a filtering function, you don’t even have to grep
anymore, this is so considerate!
If you want to re-execute a certain command, just double-click the corresponding command. Before, we also needed to remember the number of the historical command and then use !
to re-execute it.
Of course you can still use !
, but it will strengthen it for you. Not only can you re-execute commands in the current session, but you can also retrace commands you entered in other sessions!
3. Quick command
The so-called quick command is similar to a script. You can put the command to be executed in the quick command and then execute it. This quick command will execute the commands inside in order.
It’s a bit hard to pronounce, isn’t it? Give me a picture and everyone will understand.
(How did this window come out? Just click the small gear in the lower right corner)
Then, click the name of the quick command you created in the lower left corner , you can automatically execute the commands you just entered in sequence.
#If you don’t know how to write scripts, this feature is also a blessing. Are there any programmers who can't write scripts? If not, go check out the courses I recommend at the end of the article! [Smiley face]
4. Free input mode
In other terminal tools, when we enter commands, we can only type letters in order. If we forget to type an option or parameter in the middle , you need to move the cursor back to make up for it.
Early computers did not have a mouse, so this operation is understandable.
But now, almost all text editors support mouse operations, such as clicking on a certain location and entering text, selecting text to delete, dragging text to other locations, etc.
Other terminal tools I have seen basically do not support such operations, but WindTerm
It actually supports it! ! Not only in the command window, but also supports Vim
, Emac
and other editors!
The effect of using it is very similar to Word!
Insert as you want, delete as you want, drag as you want, it’s so convenient!
5. Highly customized interface
We can see that the interface of WindTerm
contains a lot of content, but some columns may not be what we need, then It can be removed or customized.
This customizable interface is really powerful!
Customized column:
Customized Dock:
Split screen function:
#6. Synchronous input function
If you are an operation and maintenance programmer , there may be a need to input a certain command to multiple servers at the same time.
I don’t know about other terminal tools (I haven’t seen any that I have used), WindTerm
has already fulfilled this requirement, which is another amazing function!
WindTerm also has many powerful functions, such as file upload and download, automatic screen lock, springboard, XModem, YModem, ZModem, etc. .
Create session
Menu--> Session--> New sessionpops up Enter the host name in the window and leave the rest as default. Of course, if you want to set labels and group, it also supports it.Automatically copy the selected content
My general usage habit is to automatically copy text when selected with the mouse, and then right-click to automatically paste. However, many terminals now do not have such a function turned on by default and need to be turned on manually. Menu Bar--> Session--> Preferences--> SettingsMenu Bar--> Session--> Preferences--> Settings
##Turn off mouseover on label Automatically activate label function
WindTerm
There is a function that I don’t like very much, that is, when you put the mouse on a label, it will automatically activate that label. We can turn this feature off manually.Menu Bar --> Session --> Preferences --> Settings
The above is the detailed content of How to use the Linux terminal artifact WindTerm. For more information, please follow other related articles on the PHP Chinese website!

Maintenance mode is used for system maintenance and repair, allowing administrators to work in a simplified environment. 1. System Repair: Repair corrupt file system and boot loader. 2. Password reset: reset the root user password. 3. Package management: Install, update or delete software packages. By modifying the GRUB configuration or entering maintenance mode with specific keys, you can safely exit after performing maintenance tasks.

Linux network configuration can be completed through the following steps: 1. Configure the network interface, use the ip command to temporarily set or edit the configuration file persistence settings. 2. Set up a static IP, suitable for devices that require a fixed IP. 3. Manage the firewall and use the iptables or firewalld tools to control network traffic.

Maintenance mode plays a key role in Linux system management, helping to repair, upgrade and configuration changes. 1. Enter maintenance mode. You can select it through the GRUB menu or use the command "sudosystemctlisolaterscue.target". 2. In maintenance mode, you can perform file system repair and system update operations. 3. Advanced usage includes tasks such as resetting the root password. 4. Common errors such as not being able to enter maintenance mode or mount the file system, can be fixed by checking the GRUB configuration and using the fsck command.

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

In Linux, file and directory management uses ls, cd, mkdir, rm, cp, mv commands, and permission management uses chmod, chown, and chgrp commands. 1. File and directory management commands such as ls-l list detailed information, mkdir-p recursively create directories. 2. Permission management commands such as chmod755file set file permissions, chownuserfile changes file owner, and chgrpgroupfile changes file group. These commands are based on file system structure and user and group systems, and operate and control through system calls and metadata.

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Zend Studio 13.0.1
Powerful PHP integrated development environment

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 English version
Recommended: Win version, supports code prompts!
