Differences
This shows you the differences between the selected revisions of the page.
2006-03-20 | 2007-06-06 | ||
password storing (martin) | no summary (67.163.93.71) | ||
Line 1: | Line 1: | ||
====== A word of warning ====== | ====== A word of warning ====== | ||
- | As with any security or cryptographic product, there are a number | + | Like any security or cryptographic product, there are a number |
- | of concerns that should be addressed. In order to use this product | + | of concerns that should be addressed. To use WinSCP securely, you should understand how the program works and the concepts involved. Improper usage is often |
- | securely, you should make an effort to obtain a thorough understanding | + | |
- | of its operation and the concepts involved. Improper usage is often | + | |
insecure usage, so please be sure to read the manual completely. | insecure usage, so please be sure to read the manual completely. | ||
===== Host Security ===== | ===== Host Security ===== | ||
The security of the computer running WinSCP is a serious | The security of the computer running WinSCP is a serious | ||
- | concern. Trojan Horse and Backdoor programs can potentially be used to | + | concern. Trojan Horse and Backdoor programs can steal authentication credentials such as passwords and [[public_key#private|private keys]] |
- | steal authentication credentials such as passwords and [[public_key#private|private keys]] | + | |
that have been stored or entered on the computer. Public computers | that have been stored or entered on the computer. Public computers | ||
- | often have session monitoring software which may include key loggers, | + | often have session monitoring software--including key loggers--or other malicious software. |
- | or may have malicious software installed by a previous user. | + | |
WinSCP can support "keyboard-interactive" authentication | WinSCP can support "keyboard-interactive" authentication |