Differences
This shows you the differences between the selected revisions of the page.
| 2004-12-15 | 2004-12-15 | ||
| no summary (martin) (hidden) | no summary (martin) (hidden) | ||
| Line 18: | Line 18: | ||
| ===== About this Guide ===== | ===== About this Guide ===== | ||
| ==== Terms and Conventions Used ==== | ==== Terms and Conventions Used ==== | ||
| + | |||
| ===== Awards and Commendations ===== | ===== Awards and Commendations ===== | ||
| + | |||
| ===== A word of warning ===== | ===== A word of warning ===== | ||
| As with any security or cryptographic product, there are a number | As with any security or cryptographic product, there are a number | ||
| Line 25: | Line 27: | ||
| of its operation and the concepts involved. Improper usage is often | of its operation and the concepts involved. Improper usage is often | ||
| insecure usage, so please be sure to read the manual completely. | insecure usage, so please be sure to read the manual completely. | ||
| + | |||
| ==== Host Security ==== | ==== Host Security ==== | ||
| The security of the computer running WinSCP is a serious | The security of the computer running WinSCP is a serious | ||