Differences
This shows you the differences between the selected revisions of the page.
| 2006-03-20 | 2007-06-06 | ||
| password storing (martin) | no summary (67.163.93.71) | ||
| Line 1: | Line 1: | ||
| ====== A word of warning ====== | ====== A word of warning ====== | ||
| - | As with any security or cryptographic product, there are a number | + | Like any security or cryptographic product, there are a number |
| - | of concerns that should be addressed. In order to use this product | + | of concerns that should be addressed. To use WinSCP securely, you should understand how the program works and the concepts involved. Improper usage is often |
| - | securely, you should make an effort to obtain a thorough understanding | + | |
| - | of its operation and the concepts involved. Improper usage is often | + | |
| insecure usage, so please be sure to read the manual completely. | insecure usage, so please be sure to read the manual completely. | ||
| ===== Host Security ===== | ===== Host Security ===== | ||
| The security of the computer running WinSCP is a serious | The security of the computer running WinSCP is a serious | ||
| - | concern. Trojan Horse and Backdoor programs can potentially be used to | + | concern. Trojan Horse and Backdoor programs can steal authentication credentials such as passwords and [[public_key#private|private keys]] |
| - | steal authentication credentials such as passwords and [[public_key#private|private keys]] | + | |
| that have been stored or entered on the computer. Public computers | that have been stored or entered on the computer. Public computers | ||
| - | often have session monitoring software which may include key loggers, | + | often have session monitoring software--including key loggers--or other malicious software. |
| - | or may have malicious software installed by a previous user. | + | |
| WinSCP can support "keyboard-interactive" authentication | WinSCP can support "keyboard-interactive" authentication | ||