Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is...
9 KB (993 words) - 21:36, 12 March 2025
The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most...
41 KB (4,510 words) - 20:00, 4 August 2025
WinSCP (category SSH File Transfer Protocol clients)
(Windows Secure Copy) is a file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol (SCP)...
8 KB (654 words) - 15:06, 23 July 2025
handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN)...
34 KB (3,976 words) - 15:37, 23 July 2025
Transport Layer Security (redirect from Secure Socket Layer)
messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including...
179 KB (17,586 words) - 04:56, 29 July 2025
3-D Secure is a protocol designed to be an additional security layer for online credit and debit card transactions. The name refers to the "three domains"...
24 KB (2,945 words) - 17:57, 19 June 2025
of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command...
63 KB (3,211 words) - 12:54, 4 July 2025
FTPS (redirect from FTP Secure)
FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer...
11 KB (1,569 words) - 07:54, 15 March 2025
Management SCM—Source Code Management SCP—Seattle Computer Products SCP—Secure copy protocol SCRAM—Salted Challenge Response Authentication Mechanism SCSI—Small...
118 KB (8,338 words) - 05:01, 4 August 2025
a Christian evangelical parachurch organization Secure copy protocol, an outdated network protocol and its UNIX-family OS command scp Service control...
4 KB (496 words) - 22:21, 18 January 2025
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail...
15 KB (1,884 words) - 23:13, 25 July 2025
The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication...
8 KB (1,132 words) - 18:17, 11 July 2025
IPsec (redirect from Internet Protocol Security)
computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication...
44 KB (5,337 words) - 05:26, 23 July 2025
anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently...
8 KB (1,079 words) - 23:12, 29 July 2025
communication protocol for federated real-time communication. It provides HTTP APIs and open source reference implementations for securely distributing...
39 KB (3,417 words) - 20:53, 4 August 2025
File transfer (category Network file transfer protocols)
transfer protocol SSH File Transfer Protocol a file transfer protocol secured by the Secure Shell (SSH) protocol Secure copy (scp) is based on the Secure Shell...
2 KB (248 words) - 16:12, 22 May 2025
Protocol (DHCP) client, Secure Shell (SSH) and secure copy protocol (SCP) client and server; Point-to-Point Protocol (PPP), Point-to-Point Protocol over...
15 KB (1,502 words) - 21:05, 29 July 2025
OpenSSH (redirect from OpenBSD Secure Shell)
known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...
26 KB (2,781 words) - 11:28, 8 July 2025
Quantum cryptography (redirect from Quantum Secure Direct Communication)
Ekert proposed to use Bell's inequalities to achieve secure key distribution. Ekert's protocol for the key distribution, as it was subsequently shown...
82 KB (9,126 words) - 16:08, 3 June 2025
communication protocol that specifies the communication between a display server and its clients, as well as a C library implementation of that protocol. A display...
121 KB (9,218 words) - 14:14, 29 July 2025
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...
62 KB (7,390 words) - 19:32, 2 August 2025
ledger. Each node has a copy of the ledger's entire transaction history. If a transaction violates the rules of the bitcoin protocol, it is ignored, as transactions...
22 KB (3,084 words) - 22:34, 13 June 2025
Diffie–Hellman key exchange (category Key-agreement protocols)
mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first protocols as conceived by Ralph...
47 KB (5,306 words) - 22:17, 27 July 2025
The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams...
23 KB (2,939 words) - 16:46, 13 June 2025
SSHFS (redirect from Secure Shell Filesystem)
over shell protocol (FISH) FileZilla, a free software utility for multiple platforms. FTPFS GVfs SSH file transfer protocol (SFTP) Secure copy (SCP) WinSCP...
5 KB (398 words) - 06:31, 20 February 2025
List of TCP and UDP port numbers (category Transmission Control Protocol)
numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
321 KB (13,135 words) - 10:31, 30 July 2025
Kermit is a computer file transfer and management protocol and a set of communications software tools primarily used in the early years of personal computing...
19 KB (2,022 words) - 18:52, 24 July 2025
Berkeley r-commands (category Internet protocols)
vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment...
17 KB (1,661 words) - 06:04, 29 November 2023
which are natively digital, the standard protocol ZRTP could be used as an end-to-end encryption technology. Secure voice's robustness greatly benefits from...
12 KB (1,687 words) - 00:30, 11 November 2024