Global Information Lookup Global Information

Secure copy protocol information


scp
Developer(s)The OpenSSH Project
Repositorygithub.com/openssh/openssh-portable/
Written inC
Operating systemCross-platform
TypeCommand, Communication protocol
Websitewww.openssh.com

Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.[1] "SCP" commonly refers to both the Secure Copy Protocol and the program itself.[2]

According to OpenSSH developers in April 2019, SCP is outdated, inflexible and not readily fixed; they recommend the use of more modern protocols like SFTP and rsync for file transfer.[3] As of OpenSSH version 9.0, scp client therefore uses SFTP for file transfers by default instead of the legacy SCP/RCP protocol.[4]

  1. ^ "Linux and Unix scp command". Computer Hope. Retrieved 4 August 2015.
  2. ^ Pechanec, Jan. "How the SCP protocol works". Jan Pechanec's weblog. Oracle. Archived from the original on 2017-02-15. Retrieved 4 August 2015.
  3. ^ "OpenSSH 8.0". OpenSSH Release Notes. 17 April 2019.
  4. ^ "OpenSSH 9.0". OpenSSH Release Notes. 8 April 2022.

and 22 Related for: Secure copy protocol information

Request time (Page generated in 0.8388 seconds.)

Secure copy protocol

Last Update:

Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is...

Word Count : 995

Secure Shell

Last Update:

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...

Word Count : 4271

WinSCP

Last Update:

Secure Copy) is a free and open-source file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy...

Word Count : 568

SCP

Last Update:

organization Secure copy protocol, an outdated network protocol SCP, a UNIX-family OS command for securely copying files across networks using Secure copy protocol...

Word Count : 483

File Transfer Protocol

Last Update:

handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN)...

Word Count : 4331

FTPS

Last Update:

FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer...

Word Count : 1459

IPsec

Last Update:

computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication...

Word Count : 5081

Comparison of file transfer protocols

Last Update:

of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command...

Word Count : 3195

Post Office Protocol

Last Update:

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail...

Word Count : 1879

Damn Small Linux

Last Update:

Protocol (DHCP) client, Secure Shell (SSH) and secure copy protocol (SCP) client and server; Point-to-Point Protocol (PPP), Point-to-Point Protocol over...

Word Count : 1325

Bitcoin protocol

Last Update:

ledger. Each node has a copy of the ledger's entire transaction history. If a transaction violates the rules of the Bitcoin protocol, it is ignored, as transactions...

Word Count : 3055

Comparison of software and protocols for distributed social networking

Last Update:

projects generally develop software, protocols, or both. Comparison of instant messaging protocols "The AT Protocol". atproto.com. Bluesky, PBC. Retrieved...

Word Count : 1898

Simple Mail Transfer Protocol

Last Update:

The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...

Word Count : 7177

WebDAV

Last Update:

extends FTP for secure traffic. SSH File Transfer Protocol (SFTP), an extension of the Secure Shell protocol (SSH) version 2.0, provides secure file-transfer...

Word Count : 1770

NETCONF

Last Update:

messages. The protocol messages are exchanged on top of a secure transport protocol. The NETCONF protocol can be conceptually partitioned into four layers: The...

Word Count : 1110

File transfer

Last Update:

transfer protocol SSH File Transfer Protocol a file transfer protocol secured by the Secure Shell (SSH) protocol Secure copy (scp) is based on the Secure Shell...

Word Count : 246

Interlock protocol

Last Update:

anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently...

Word Count : 1078

OpenSSH

Last Update:

known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...

Word Count : 2701

Quantum cryptography

Last Update:

quantum protocols for one-out-of-two oblivious transfer and other secure two-party computations. However, unconditionally secure relativistic protocols for...

Word Count : 8934

SSHFS

Last Update:

over shell protocol (FISH) FileZilla, a free software utility for multiple platforms. FTPFS GVfs SSH file transfer protocol (SFTP) Secure copy (SCP) WinSCP...

Word Count : 400

List of computing and IT abbreviations

Last Update:

Markup Language HTTP—Hypertext Transfer Protocol HTTPd—Hypertext Transport Protocol Daemon HTTPS—HTTP Secure HTX—HyperTransport eXpansion HURD—Hird of...

Word Count : 6615

Border Gateway Protocol

Last Update:

Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems...

Word Count : 7966

PDF Search Engine © AllGlobal.net