• Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is...
    9 KB (993 words) - 21:36, 12 March 2025
  • The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most...
    41 KB (4,510 words) - 20:00, 4 August 2025
  • Thumbnail for WinSCP
    WinSCP (category SSH File Transfer Protocol clients)
    (Windows Secure Copy) is a file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol (SCP)...
    8 KB (654 words) - 15:06, 23 July 2025
  • handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN)...
    34 KB (3,976 words) - 15:37, 23 July 2025
  • messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including...
    179 KB (17,586 words) - 04:56, 29 July 2025
  • 3-D Secure is a protocol designed to be an additional security layer for online credit and debit card transactions. The name refers to the "three domains"...
    24 KB (2,945 words) - 17:57, 19 June 2025
  • of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command...
    63 KB (3,211 words) - 12:54, 4 July 2025
  • FTPS (redirect from FTP Secure)
    FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer...
    11 KB (1,569 words) - 07:54, 15 March 2025
  • Management SCM—Source Code Management SCP—Seattle Computer Products SCP—Secure copy protocol SCRAM—Salted Challenge Response Authentication Mechanism SCSI—Small...
    118 KB (8,338 words) - 05:01, 4 August 2025
  • a Christian evangelical parachurch organization Secure copy protocol, an outdated network protocol and its UNIX-family OS command scp Service control...
    4 KB (496 words) - 22:21, 18 January 2025
  • In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail...
    15 KB (1,884 words) - 23:13, 25 July 2025
  • The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication...
    8 KB (1,132 words) - 18:17, 11 July 2025
  • computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication...
    44 KB (5,337 words) - 05:26, 23 July 2025
  • anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently...
    8 KB (1,079 words) - 23:12, 29 July 2025
  • Thumbnail for Matrix (protocol)
    communication protocol for federated real-time communication. It provides HTTP APIs and open source reference implementations for securely distributing...
    39 KB (3,417 words) - 20:53, 4 August 2025
  • File transfer (category Network file transfer protocols)
    transfer protocol SSH File Transfer Protocol a file transfer protocol secured by the Secure Shell (SSH) protocol Secure copy (scp) is based on the Secure Shell...
    2 KB (248 words) - 16:12, 22 May 2025
  • Thumbnail for Damn Small Linux
    Protocol (DHCP) client, Secure Shell (SSH) and secure copy protocol (SCP) client and server; Point-to-Point Protocol (PPP), Point-to-Point Protocol over...
    15 KB (1,502 words) - 21:05, 29 July 2025
  • OpenSSH (redirect from OpenBSD Secure Shell)
    known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...
    26 KB (2,781 words) - 11:28, 8 July 2025
  • WebDAV (redirect from HTTP COPY)
    extends FTP for secure traffic. SSH File Transfer Protocol (SFTP), an extension of the Secure Shell protocol (SSH) version 2.0, provides secure file-transfer...
    19 KB (1,776 words) - 17:55, 25 May 2025
  • Ekert proposed to use Bell's inequalities to achieve secure key distribution. Ekert's protocol for the key distribution, as it was subsequently shown...
    82 KB (9,126 words) - 16:08, 3 June 2025
  • Thumbnail for Wayland (protocol)
    communication protocol that specifies the communication between a display server and its clients, as well as a C library implementation of that protocol. A display...
    121 KB (9,218 words) - 14:14, 29 July 2025
  • The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...
    62 KB (7,390 words) - 19:32, 2 August 2025
  • Thumbnail for Bitcoin protocol
    ledger. Each node has a copy of the ledger's entire transaction history. If a transaction violates the rules of the bitcoin protocol, it is ignored, as transactions...
    22 KB (3,084 words) - 22:34, 13 June 2025
  • Thumbnail for Diffie–Hellman key exchange
    Diffie–Hellman key exchange (category Key-agreement protocols)
    mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first protocols as conceived by Ralph...
    47 KB (5,306 words) - 22:17, 27 July 2025
  • The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams...
    23 KB (2,939 words) - 16:46, 13 June 2025
  • Thumbnail for SSHFS
    over shell protocol (FISH) FileZilla, a free software utility for multiple platforms. FTPFS GVfs SSH file transfer protocol (SFTP) Secure copy (SCP) WinSCP...
    5 KB (398 words) - 06:31, 20 February 2025
  • List of TCP and UDP port numbers (category Transmission Control Protocol)
    numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
    321 KB (13,135 words) - 10:31, 30 July 2025
  • Kermit is a computer file transfer and management protocol and a set of communications software tools primarily used in the early years of personal computing...
    19 KB (2,022 words) - 18:52, 24 July 2025
  • Berkeley r-commands (category Internet protocols)
    vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment...
    17 KB (1,661 words) - 06:04, 29 November 2023
  • Thumbnail for Secure voice
    which are natively digital, the standard protocol ZRTP could be used as an end-to-end encryption technology. Secure voice's robustness greatly benefits from...
    12 KB (1,687 words) - 00:30, 11 November 2024