• Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is...
    9 KB (993 words) - 21:36, 12 March 2025
  • . The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most...
    41 KB (4,503 words) - 12:21, 3 May 2025
  • handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN)...
    34 KB (3,997 words) - 20:25, 16 April 2025
  • Thumbnail for WinSCP
    WinSCP (category SSH File Transfer Protocol clients)
    (Windows Secure Copy) is a file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol (SCP)...
    8 KB (653 words) - 22:50, 7 March 2025
  • 3-D Secure is a protocol designed to be an additional security layer for online credit and debit card transactions. The name refers to the "three domains"...
    24 KB (2,945 words) - 10:08, 19 December 2024
  • messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including...
    178 KB (17,514 words) - 17:10, 3 May 2025
  • of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command...
    63 KB (3,211 words) - 11:43, 29 April 2025
  • FTPS (redirect from FTP Secure)
    FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer...
    11 KB (1,569 words) - 07:54, 15 March 2025
  • In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail...
    15 KB (1,892 words) - 10:47, 23 March 2025
  • Thumbnail for Matrix (protocol)
    communication protocol for federated real-time communication. It provides HTTP APIs and open source reference implementations for securely distributing...
    38 KB (3,326 words) - 09:37, 22 April 2025
  • The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication...
    8 KB (1,132 words) - 15:59, 23 July 2024
  • computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication...
    44 KB (5,337 words) - 23:10, 17 April 2025
  • a Christian evangelical parachurch organization Secure copy protocol, an outdated network protocol and its UNIX-family OS command scp Service control...
    4 KB (496 words) - 22:21, 18 January 2025
  • List of TCP and UDP port numbers (category Transmission Control Protocol)
    numbers used by protocols for operation on network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
    320 KB (13,102 words) - 16:55, 3 May 2025
  • File transfer (category Network file transfer protocols)
    transfer protocol SSH File Transfer Protocol a file transfer protocol secured by the Secure Shell (SSH) protocol Secure copy (scp) is based on the Secure Shell...
    2 KB (246 words) - 22:57, 23 February 2025
  • Thumbnail for Damn Small Linux
    Protocol (DHCP) client, Secure Shell (SSH) and secure copy protocol (SCP) client and server; Point-to-Point Protocol (PPP), Point-to-Point Protocol over...
    15 KB (1,410 words) - 07:22, 21 April 2025
  • Thumbnail for Diffie–Hellman key exchange
    Diffie–Hellman key exchange (category Key-agreement protocols)
    mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols as conceived by...
    48 KB (5,437 words) - 16:48, 22 April 2025
  • WebDAV (redirect from HTTP COPY)
    extends FTP for secure traffic. SSH File Transfer Protocol (SFTP), an extension of the Secure Shell protocol (SSH) version 2.0, provides secure file-transfer...
    19 KB (1,776 words) - 05:11, 29 March 2025
  • anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently...
    8 KB (1,079 words) - 15:34, 13 February 2025
  • OpenSSH (redirect from OpenBSD Secure Shell)
    known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...
    26 KB (2,781 words) - 08:09, 9 March 2025
  • Thumbnail for Wayland (protocol)
    communication protocol that specifies the communication between a display server and its clients, as well as a C library implementation of that protocol. A display...
    128 KB (9,741 words) - 08:14, 29 April 2025
  • The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...
    62 KB (7,380 words) - 13:43, 27 April 2025
  • Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the others...
    14 KB (1,920 words) - 05:01, 5 November 2024
  • Kermit is a computer file transfer and management protocol and a set of communications software tools primarily used in the early years of personal computing...
    19 KB (2,008 words) - 17:51, 8 April 2025
  • Thumbnail for Secure voice
    which are natively digital, the standard protocol ZRTP could be used as an end-to-end encryption technology. Secure voice's robustness greatly benefits from...
    12 KB (1,687 words) - 00:30, 11 November 2024
  • Ssh-keygen (category Secure Shell)
    component of the Secure Shell (SSH) protocol suite found on Unix, Unix-like and Microsoft Windows computer systems used to establish secure shell sessions...
    9 KB (717 words) - 02:49, 3 March 2025
  • The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams...
    23 KB (2,938 words) - 12:33, 11 April 2025
  • Ekert proposed to use Bell's inequalities to achieve secure key distribution. Ekert's protocol for the key distribution, as it was subsequently shown...
    81 KB (9,073 words) - 05:33, 17 April 2025
  • The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation...
    109 KB (12,952 words) - 00:17, 24 April 2025
  • Thumbnail for SSHFS
    over shell protocol (FISH) FileZilla, a free software utility for multiple platforms. FTPFS GVfs SSH file transfer protocol (SFTP) Secure copy (SCP) WinSCP...
    5 KB (398 words) - 06:31, 20 February 2025