Recently requested by the company, the need for remote transmission and backup of file data, wrote an article on the SSH, SCP and rsync application configuration of the whole process, may be too wordy, but mainly to want to do not miss each process
What is the security comparison between FTP and SSH?
Ftp:
Http://baike.baidu.com/subview/369/6149695.htmIn the TCP/IP protocol, the FTP standard command TCP port number is 21,port mode with a data port of 20. The task of FTP is to
Recently requested by the company, the need for remote transmission and backup of file data, wrote an article on the SSH, SCP and rsync application configuration of the whole process, may be too wordy, but mainly to want to do not miss each process
Original link Address: http://www.binghe.org/2010/03/telnet-ftp-ssh-sftp-scp/"Telnet" is a well-known terminal access Protocol, and traditional Web service programs such as FTP, Pop, and Telnet are inherently insecure because they transmit data,
SSH Remote connection command:Usage format:ssh ipaddr does not specify the user to log on to the remote host as the user of the current host login systemssh [email protected] telnet to a host as a user via SSH protocolusage:ssh [email protected]
The usage of SCP command in Inux system
Note: If-bash:scp:command not found appears during use, perform yum install openssh-clients
The SCP is a secure copy abbreviation, and the SCP is a secure remote file Copy command under the Linux system
SVN deletes all the. svn files
Copy Code code as follows:
Find. -name. Svn-type d-exec rm-fr {} \;
Linux CP/SCP Command +SCP command detailed
Name: CP
Use Rights: All users
How to use:
CP [Options] source dest
From: http://www.blogjava.net/Unmi/archive/2006/01/03/124033.html
Currently, when installing Linux, we usually consider that the security (by default) does not enable the telnet service, while the SSH service does. ant has long supported Telnet,
1.SSH Remote ManagementSSH (Secure Sheel) is a secure channel protocol, which is mainly used to realize remote login of character interface, and so on. The SSH protocol encrypts the data transmitted by both parties, including the user's password.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.