Moving Files In Linux - page 6
The Low Security Family
While many of the tools we've already discussed have security features, there are some that are specially built for using in a secure manner. These are the tools you'll want to develop a habit of using when transferring information you need to keep private, or even just accessing accounts whose passwords you don't want to broadcast to the world. Still, don't let this tool lull you into complacency. There is no such thing as a fully secured setup.
You'll need to have ssh configured between the two machines in question before you can use either of these tools. Setting up ssh is beyond the scope of this article, so see the ssh man page and your distribution's documentation for more information.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.