Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
SSH (SCP) Send Files from Windows to Your Linux Box > NetSparsh - Viral Content you Love & Share

SSH (SCP) Send Files from Windows to Your Linux Box

Not all of us have the luxury of working both at home and at work on a UNIX based system. However that doesn't mean you can't transfer files safely and securely between the two systems.

Due to a firewall, I'm unable to use FTP on a non-standard port, from my work, however I am able to use SSH to connect to my home computer.

There are many different clients for Windows based systems for SSH connections, however I am fond of PuTTy myself. This document will give you a very brief overview of how to send files from your Windows PC, from a command prompt, to your UNIX style server.

Once you have installed the PuTTy Client (full package not just the putty.exe), open a command prompt on your Windows PC (start menu > run > cmd).

You.re putty client may not be in your path, so change directory to where the program is installed, or copy the 'pscp' executable to your c: for ease of use.

Pscp is the SCP client that comes with the PuTTy package. Normally SCP is used for transferring files securely between UNIX based systems, but it's been ported over with the windows based clients.

The following is an example of how to transfer a file using pscp:

C:pscp -l yourname C:PicturesPictures*.jpg
my.server.com:/home/yourname/tmp/

This will transfer all the jpg files from the Pictures directory one at a time to your server. After you hit enter the server should ask you for your password on that system before it continues. There are many additional options for you to use that will help you make things a bit quicker, like the recursive option, so all subdirectories will get moved also.

Some of the more important options are as follows:

-P 1234 Specifies port 1234 is open for SSH

-l yourname Specifies the username you want to login with

-r Specifies recursive transfer of all subdirectories

-v Specifies verbose mode

-q Specifies quiet mode, and will not display the little statistics bar during the transfer

-C Specifies compress is enabled

-pw yourpass Specifies your password, if you do not use this, it will prompt you instead.

This pretty much covers the basics of transferring files from windows to unix via SCP.

Ken Dennis
[email protected]
http://KenDennis-RSS.homeip.net/

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

20 Constants In Software Development
HuffPost
If you have more than one developer worth their salt then you will always have disagreement about something. Everyone wants good documentation of code but no one budgets for it. The more high performing a team the more annoyed team members get about ...


PCWorld

The best free video editing software: Great tools for YouTube stardom and more
PCWorld
The best free video editing software can be surprisingly good. The choices vary widely and include include scaled-down, trial versions of professional suites, open-source alternatives with a plethora of features, and simple applications aimed at home ...
Video Editing Software Developer Avid to Offer Remote Collaboration ToolsCTech

all 2 news articles »

Naked Security

Mailsploit: using emails to attack mail software
Naked Security
The most basic tenet of secure programming is this: don't trust anything you're planning to consume. Why? Because computer programs consume things from the outside world – like files, cookies, voice commands, passwords and a multitude of other data ...


The Register

Language bugs infest downstream software, fuzzer finds • The ...
The Register
Developers working in secure development guidelines can still be bitten by upstream bugs in the languages they use. That's the conclusion of research presented last week at Black Hat Europe by IOActive's Fernando Arnaboldi. As Arnaboldi wrote in his ...

and more »

GeekWire

Tempered Networks raises another $7M for 'identity-defined networking' cybersecurity software
GeekWire
Founded in 2014, Tempered Networks originally focused on IoT security, but today its flagship product is networking infrastructure software that also acts as a layer of security. Its point-and-click “identity-based networking” architecture is based on ...

and more »

Midland Daily News

Midland County updates financial software
Midland Daily News
Midland County is purchasing financial software to replace out-of-date software currently in use. County commissioners recently unanimously approved spending $368,185 with Bellefeuil, Szur and Associations (BS&A) for various software programs, data ...


512tech.com

Planview expands its software offerings with another acquisition
512tech.com
Austin software maker Planview is expanding its project management offerings with the acquisition of a Tennessee-based company, the company said Monday. Financial terms of the deal were not disclosed. Planview sells software that helps companies map ...

and more »

Wall Street Journal

Software Firm Settles US Security Probe Over Its Links to Russia
Wall Street Journal
A telecom software company has agreed to resolve a criminal investigation of its use of uncleared Russian nationals working in Russia on a U.S. defense project by implementing a security plan that American officials hope will serve as a new industry ...


NBC 5 Dallas-Fort Worth

Dallas Fire-Rescue Using New Dispatch Software - NBC 5 Dallas ...
NBC 5 Dallas-Fort Worth
Dallas Fire-Rescue dispatchers are using a new software system that puts a priority on emergency calls.

and more »

DigitalSpy.com

Hidden software on HP laptops discovered that tracks what you type
DigitalSpy.com
Hardware manufacturer HP has been found to have a major security flaw in its laptops, dating back to 2012. The company's devices use Synaptics Touchpad software, and security researcher Michael Myng discovered an exploit in the code while looking for a ...
Hundreds of HP laptop models found to have hidden keylogging softwareRT
HP laptops found to have hidden keyloggerBBC News
Your laptop could be recording EVERYTHING you type: Sinister keylogging software that lets hackers spy on users is ...Daily Mail
htxt.africa
all 75 news articles »
Google News

Tools for Customizing Great Plains

Microsoft Business Solutions ? Great Plains has captured the US... Read More

The Death of Windows

I have always regretted how Microsoft price gouges and rips... Read More

Microsoft and Webmasters

Does Microsoft care for WebmastersIt's always been a problem with... Read More

Three Steps To Windows Safety Heaven

Now there are Three Steps To Heaven Just listen and... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Pros and Cons of Using FREE Software in Your Business

Itâ??s easy to understand why you might be drawn to... Read More

Dreamweaver vs FrontPage

There are two major WYSIWYG(What You See Is What You... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Microsoft Great Plains Food Processing ? Implementation & Customization Highlights

Microsoft Great Plains might be considered as ERP platform to... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

There are certain pluses and minuses in both cases and... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

Basic Tips and tricks for Windows XP

Running Applications in Compatibility Mode With Windows XP, you can... Read More

It?s Back!! WordPerfect?s Amazing Comeback

Have you noticed WordPerfect is gearing up for a comeback... Read More

Keeping Track

One of the things we can be as certain of... Read More

Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More

Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

IT Department Skills to Support Microsoft Great Plains and Microsoft CRM

Microsoft Great Plains as ERP and Microsoft CRM as... Read More

Off The Record - Tips For Picking Recording Software

Need software to record your voice, streaming audio or musical... Read More

Software Tools To Help Your Business Sell More

Sales are all about leverage, because there is only so... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

The End of Spyware?

The US House of Representatives has recently passed the "Spy... Read More

Cisco Certification: Introduction To ISDN, Part IV

In part III of this ISDN primer, we learned that... Read More

Software Review: Xsitepro Total Site Management Software

It's not very often I get excited about a software... Read More