What is SSH?
Traditional network service programs, such as telnet, are inherently insecure, because they transmit passwords and data in plain text on the network, and those with ulterior motives can easily intercept these passwords and data. In addition, the security authentication methods of these service programs also have their weaknesses, that is, they are vulnerable to man-in-the-middle attacks. The so-called "man-in-the-middle" attack means that "man-in-the-middle" impersonates a Real Server to receive the data you send to the server, and then impersonates you to pass the data to the Real Server. When the data transfer between the server and you is transferred by a man-in-the-middle, a serious problem may occur.
The full name of SSH is secure shell. By using SSH, You can encrypt all transmitted data so that the "man-in-the-middle" attack method is impossible and can also prevent DNS and IP spoofing. Another advantage is that the data transmitted is compressed, which can speed up transmission.
Download SSH: http://www.ssh.com/download SSH Secure Shell client and install.
Open the program, click File-> quick connect, enter host, user name, and port, and connect.
File Transfer: click on the toolbar to open the transfer interface.
Find the file to be transferred on the left and right-click upload to upload the file.