Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is...
9 KB (993 words) - 21:36, 12 March 2025
The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most...
41 KB (4,503 words) - 14:12, 4 May 2025
handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN)...
34 KB (3,997 words) - 20:25, 16 April 2025
WinSCP (category SSH File Transfer Protocol clients)
(Windows Secure Copy) is a file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol (SCP)...
8 KB (653 words) - 22:50, 7 March 2025
3-D Secure is a protocol designed to be an additional security layer for online credit and debit card transactions. The name refers to the "three domains"...
24 KB (2,945 words) - 10:08, 19 December 2024
Transport Layer Security (redirect from Secure Socket Layer)
messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including...
178 KB (17,514 words) - 17:10, 3 May 2025
of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command...
63 KB (3,211 words) - 11:43, 29 April 2025
FTPS (redirect from FTP Secure)
FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer...
11 KB (1,569 words) - 07:54, 15 March 2025
a Christian evangelical parachurch organization Secure copy protocol, an outdated network protocol and its UNIX-family OS command scp Service control...
4 KB (496 words) - 22:21, 18 January 2025
The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication...
8 KB (1,132 words) - 15:59, 23 July 2024
communication protocol for federated real-time communication. It provides HTTP APIs and open source reference implementations for securely distributing...
38 KB (3,326 words) - 09:37, 22 April 2025
IPsec (redirect from Internet Protocol Security)
computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication...
44 KB (5,337 words) - 23:10, 17 April 2025
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail...
15 KB (1,892 words) - 10:47, 23 March 2025
anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently...
8 KB (1,079 words) - 15:34, 13 February 2025
File transfer (category Network file transfer protocols)
transfer protocol SSH File Transfer Protocol a file transfer protocol secured by the Secure Shell (SSH) protocol Secure copy (scp) is based on the Secure Shell...
2 KB (246 words) - 22:57, 23 February 2025
List of TCP and UDP port numbers (category Transmission Control Protocol)
numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
320 KB (13,110 words) - 23:14, 4 May 2025
Protocol (DHCP) client, Secure Shell (SSH) and secure copy protocol (SCP) client and server; Point-to-Point Protocol (PPP), Point-to-Point Protocol over...
15 KB (1,410 words) - 07:22, 21 April 2025
Diffie–Hellman key exchange (category Key-agreement protocols)
mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols as conceived by...
48 KB (5,437 words) - 16:48, 22 April 2025
OpenSSH (redirect from OpenBSD Secure Shell)
known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...
26 KB (2,781 words) - 08:09, 9 March 2025
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...
62 KB (7,380 words) - 13:43, 27 April 2025
communication protocol that specifies the communication between a display server and its clients, as well as a C library implementation of that protocol. A display...
129 KB (9,732 words) - 12:18, 4 May 2025
ledger. Each node has a copy of the ledger's entire transaction history. If a transaction violates the rules of the bitcoin protocol, it is ignored, as transactions...
22 KB (3,075 words) - 00:44, 6 April 2025
The Kyoto Protocol (Japanese: 京都議定書, Hepburn: Kyōto Giteisho) was an international treaty which extended the 1992 United Nations Framework Convention on...
154 KB (13,539 words) - 09:19, 18 April 2025
SSHFS (redirect from Secure Shell Filesystem)
over shell protocol (FISH) FileZilla, a free software utility for multiple platforms. FTPFS GVfs SSH file transfer protocol (SFTP) Secure copy (SCP) WinSCP...
5 KB (398 words) - 06:31, 20 February 2025
The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams...
23 KB (2,938 words) - 12:33, 11 April 2025
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation...
109 KB (12,952 words) - 00:17, 24 April 2025
Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the others...
14 KB (1,920 words) - 05:01, 5 November 2024
Berkeley r-commands (category Internet protocols)
vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment...
17 KB (1,661 words) - 06:04, 29 November 2023
which are natively digital, the standard protocol ZRTP could be used as an end-to-end encryption technology. Secure voice's robustness greatly benefits from...
12 KB (1,687 words) - 00:30, 11 November 2024