Differences

This shows you the differences between the selected revisions of the page.

2006-03-20 2007-06-06
password storing (martin) no summary (67.163.93.71)
Line 1: Line 1:
====== A word of warning ====== ====== A word of warning ======
-As with any security or cryptographic product, there are a number +Like any security or cryptographic product, there are a number 
-of concerns that should be addressed. In order to use this product +of concerns that should be addressed. To use WinSCP securely, you should understand how the program works and the concepts involved. Improper usage is often
-securely, you should make an effort to obtain a thorough understanding +
-of its operation and the concepts involved. Improper usage is often+
insecure usage, so please be sure to read the manual completely. insecure usage, so please be sure to read the manual completely.
===== Host Security ===== ===== Host Security =====
The security of the computer running WinSCP is a serious The security of the computer running WinSCP is a serious
-concern. Trojan Horse and Backdoor programs can potentially be used to +concern. Trojan Horse and Backdoor programs can steal authentication credentials such as passwords and [[public_key#private|private keys]]
-steal authentication credentials such as passwords and [[public_key#private|private keys]]+
that have been stored or entered on the computer. Public computers that have been stored or entered on the computer. Public computers
-often have session monitoring software which may include key loggers, +often have session monitoring software--including key loggers--or other malicious software.
-or may have malicious software installed by a previous user.+
WinSCP can support "keyboard-interactive" authentication WinSCP can support "keyboard-interactive" authentication

Last modified: by 67.163.93.71