October 20, 2014
 
 
RSSRSS feed

Moving Files In Linux - page 6

The Low Security Family

  • May 22, 2003
  • By Dee-Ann LeBlanc

While many of the tools we've already discussed have security features, there are some that are specially built for using in a secure manner. These are the tools you'll want to develop a habit of using when transferring information you need to keep private, or even just accessing accounts whose passwords you don't want to broadcast to the world. Still, don't let this tool lull you into complacency. There is no such thing as a fully secured setup.

You'll need to have ssh configured between the two machines in question before you can use either of these tools. Setting up ssh is beyond the scope of this article, so see the ssh man page and your distribution's documentation for more information.

Sitemap | Contact Us