SlideShare a Scribd company logo
1 of 13
Download to read offline
vILP – CPP – Using WinSCP_v1.1
November 7 , 2014
Confidentiality Statement
This document contains confidential information of Tata Consultancy Services Limited,
which is provided for the sole purpose of permitting the recipient to evaluate the proposal
submitted herewith. In consideration of receipt of this document, the recipient agrees to
maintain such information in confidence and to not reproduce or otherwise disclose this
information to any person outside the group directly responsible for evaluation of its
contents, except that there is no obligation to maintain the confidentiality of any information
which was known to the recipient prior to receipt of such information from Tata Consultancy
Services Limited, or becomes publicly known through no fault of recipient, or is received
without obligation of confidentiality from a third party owing no obligation of
confidentiality to Tata Consultancy Services Limited.
Tata Code of Conduct
We, in our dealings, are self-regulated by a Code of Conduct as enshrined in the Tata Code
of Conduct. We request your support in helping us adhere to the Code in letter and spirit. We
request that any violation or potential violation of the Code by any person be promptly
brought to the notice of the Local Ethics Counselor or the Principal Ethics Counselor or the
CEO of TCS. All communication received in this regard will be treated and kept as
confidential.
Table of Content
COURSE 1: USAGE OF WinSCP.........................................................................................................................................5
1.1 Introduction to WinSCP ........................................................................................................................................5
1.2 How to use WinSCP ..............................................................................................................................................5
Step II : Logging in to Server....................................................................................................................................5
1.3 Downloading files from Remote Server.................................................................................................................9
1.4 Uploading files to Remote Server........................................................................................................................11
1.5 Saving sessions for future use..............................................................................................................................12
COURSE 1: USAGE OF WinSCP
1.1 Introduction to WinSCP
WinSCP (Windows Secure CoPy) is a popular , free and open-source Secure File Transfer
application (SFTP) for Windows computers .It is used to transfer files securely between remote
server and local computer and vice verse. It includes support for SCP file transfers, and has the
ability to create secure tunnels via SSH. Secure FTP (SFTP) is similar to FTP, but with SFTP the
entire session is encrypted, so that passwords are never sent in the clear text , and are therefore
much less vulnerable to interception. That is ,for transferring files securely, we can use Secure
copy or SCP protocol, it uses Secure Shell (SSH), which encrypts the content before transferring
data over network. It runs over TCP port 22 by default.
1.2 How to use WinSCP
Step I : Start WinSCP
To start with double click on WinSCP icon in the desktop or select it from Programs Group . The
first screen will look as below
Step II : Logging in to Server
Enter IP address of the server in Host Name field.
Unix login userid in the User name field
TCS Internal vILP – CPP - Using WinSCP
Unix login Password in Password field
Choose the protocol ( SFTP/ SCP / FTP)
For example
1) Host name used : 172.26.132.40 (For Ahmedabad centre)
2) User name used : 390119
3) Password used : ********
3) Protocol selected : SCP
After logging in successfully, the following window will appear.
TCS Internal vILP – CPP - Using WinSCP
The left panel displays the content in local machine and Right panel displays the content in
remote server.
Step III : Select/Navigate to working directory
1. We can select the working directory in both Local as well as remote machine from the drop
down menu.
2. Tool bar can be used to navigate to desired folder
TCS Internal vILP – CPP - Using WinSCP
Step IV : Transferring content
Content can be transferred in two way
A . Downloading : Transferring content from Remote server to Local machine
B . Uploading : Transferring content from Local machine to Remote server
TCS Internal vILP – CPP - Using WinSCP
1.3 Downloading files from Remote Server
Following Steps to perform for Downloading file/Directory from Server
Step - A1 : Select the file to transfer in the Remote pane,
Step - A2 : Right click → Select Copy or move option
TCS Internal vILP – CPP - Using WinSCP
Step - A3 : Select the destination folder in the local machine(can be changed by selecting
Browse button )
You will find file moving/coping to local machine
TCS Internal vILP – CPP - Using WinSCP
Step - A4 : The file Unix_Recap.txt copied to desktop.
1.4 Uploading files to Remote Server
Step - B1 : Select the file to copy in Local machine(Left) pane.
Step - B2 : Drag it and drop it to the remote pane desired location.
TCS Internal vILP – CPP - Using WinSCP
Step - B3 : Select the desired location from drop down list and select copy
The file is copied.
1.5 Saving sessions for future use
All the session information can be saved for future use and faster access.
The information can be saved are :
>> Server IP
>> User name,
>> Password(Not recommended)
>> Communication protocol
TCS Internal vILP – CPP - Using WinSCP
After entering all above information click save button.
Thank You ----- Happy Learning
TCS Internal vILP – CPP - Using WinSCP

More Related Content

What's hot

Server configuration
Server configurationServer configuration
Server configurationAisha Talat
 
The Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksThe Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksAcquia
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Suzanne Aldrich
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer ProtocolVinh Nguyen
 
Area25 Learning DS1
Area25 Learning DS1Area25 Learning DS1
Area25 Learning DS1Ali Hamieh
 

What's hot (9)

Server configuration
Server configurationServer configuration
Server configuration
 
The Anatomy of DDoS Attacks
The Anatomy of DDoS AttacksThe Anatomy of DDoS Attacks
The Anatomy of DDoS Attacks
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
DDoS Attack
DDoS AttackDDoS Attack
DDoS Attack
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Area25 Learning DS1
Area25 Learning DS1Area25 Learning DS1
Area25 Learning DS1
 

Viewers also liked

электролаборатория ооо энергосервис
электролаборатория ооо энергосервисэлектролаборатория ооо энергосервис
электролаборатория ооо энергосервисРасаев Дамир
 
Curtislubeplus fsc-8000_
Curtislubeplus  fsc-8000_Curtislubeplus  fsc-8000_
Curtislubeplus fsc-8000_cesar16405893
 
S_Hariharan_profile_26052016
S_Hariharan_profile_26052016S_Hariharan_profile_26052016
S_Hariharan_profile_26052016Hariharan S
 
Spiciest Food in the World - Not for the Faint Hearted
Spiciest Food in the World -  Not for the Faint Hearted Spiciest Food in the World -  Not for the Faint Hearted
Spiciest Food in the World - Not for the Faint Hearted Fritzjames Stephen
 
Digital Media Presence- Goibibo
Digital Media Presence- GoibiboDigital Media Presence- Goibibo
Digital Media Presence- GoibiboVaibhav Belwariar
 
kagami_comput2016_04
kagami_comput2016_04kagami_comput2016_04
kagami_comput2016_04swkagami
 

Viewers also liked (8)

Integrales impropias
Integrales impropiasIntegrales impropias
Integrales impropias
 
электролаборатория ооо энергосервис
электролаборатория ооо энергосервисэлектролаборатория ооо энергосервис
электролаборатория ооо энергосервис
 
Ap2a
Ap2aAp2a
Ap2a
 
Curtislubeplus fsc-8000_
Curtislubeplus  fsc-8000_Curtislubeplus  fsc-8000_
Curtislubeplus fsc-8000_
 
S_Hariharan_profile_26052016
S_Hariharan_profile_26052016S_Hariharan_profile_26052016
S_Hariharan_profile_26052016
 
Spiciest Food in the World - Not for the Faint Hearted
Spiciest Food in the World -  Not for the Faint Hearted Spiciest Food in the World -  Not for the Faint Hearted
Spiciest Food in the World - Not for the Faint Hearted
 
Digital Media Presence- Goibibo
Digital Media Presence- GoibiboDigital Media Presence- Goibibo
Digital Media Presence- Goibibo
 
kagami_comput2016_04
kagami_comput2016_04kagami_comput2016_04
kagami_comput2016_04
 

Similar to 3_Use_of_WinSCP

Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdftrishacolsyn25353
 
香港六合彩
香港六合彩香港六合彩
香港六合彩csukxnr
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideSharemvtqyygx
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideSharedqxjlhfc
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩qiohms
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShareyqtvdsbl
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideSharemmfirkhw
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharecxrcpdu
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩skpkcd
 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)maunicmer
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiJeanmarieColbert3
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky
 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide Protect724manoj
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxJezer Arces
 

Similar to 3_Use_of_WinSCP (20)

Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdf
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideShare
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩
 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to bui
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
Network security
Network securityNetwork security
Network security
 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
File exchange
File exchangeFile exchange
File exchange
 

More from Gautam Raja

1_Editors_in_Unix
1_Editors_in_Unix1_Editors_in_Unix
1_Editors_in_UnixGautam Raja
 
5_Practice_Exercise_-_1
5_Practice_Exercise_-_15_Practice_Exercise_-_1
5_Practice_Exercise_-_1Gautam Raja
 
4_Unix_Command_Usage_-_3
4_Unix_Command_Usage_-_34_Unix_Command_Usage_-_3
4_Unix_Command_Usage_-_3Gautam Raja
 
3_Unix_Command_Usage_-_2
3_Unix_Command_Usage_-_23_Unix_Command_Usage_-_2
3_Unix_Command_Usage_-_2Gautam Raja
 
2_Unix_Command_Usage_-_1
2_Unix_Command_Usage_-_12_Unix_Command_Usage_-_1
2_Unix_Command_Usage_-_1Gautam Raja
 
1_Introduction_to_shell
1_Introduction_to_shell1_Introduction_to_shell
1_Introduction_to_shellGautam Raja
 
5_File_Handling_Commands__vi_editor_and_environment_variables
5_File_Handling_Commands__vi_editor_and_environment_variables5_File_Handling_Commands__vi_editor_and_environment_variables
5_File_Handling_Commands__vi_editor_and_environment_variablesGautam Raja
 
4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_CommandsGautam Raja
 
2_Connecting_to_Unix_Server
2_Connecting_to_Unix_Server2_Connecting_to_Unix_Server
2_Connecting_to_Unix_ServerGautam Raja
 
1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_CommandsGautam Raja
 

More from Gautam Raja (10)

1_Editors_in_Unix
1_Editors_in_Unix1_Editors_in_Unix
1_Editors_in_Unix
 
5_Practice_Exercise_-_1
5_Practice_Exercise_-_15_Practice_Exercise_-_1
5_Practice_Exercise_-_1
 
4_Unix_Command_Usage_-_3
4_Unix_Command_Usage_-_34_Unix_Command_Usage_-_3
4_Unix_Command_Usage_-_3
 
3_Unix_Command_Usage_-_2
3_Unix_Command_Usage_-_23_Unix_Command_Usage_-_2
3_Unix_Command_Usage_-_2
 
2_Unix_Command_Usage_-_1
2_Unix_Command_Usage_-_12_Unix_Command_Usage_-_1
2_Unix_Command_Usage_-_1
 
1_Introduction_to_shell
1_Introduction_to_shell1_Introduction_to_shell
1_Introduction_to_shell
 
5_File_Handling_Commands__vi_editor_and_environment_variables
5_File_Handling_Commands__vi_editor_and_environment_variables5_File_Handling_Commands__vi_editor_and_environment_variables
5_File_Handling_Commands__vi_editor_and_environment_variables
 
4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands4_Users_and_File_Permission_and_Directory_Commands
4_Users_and_File_Permission_and_Directory_Commands
 
2_Connecting_to_Unix_Server
2_Connecting_to_Unix_Server2_Connecting_to_Unix_Server
2_Connecting_to_Unix_Server
 
1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands
 

3_Use_of_WinSCP

  • 1. vILP – CPP – Using WinSCP_v1.1 November 7 , 2014
  • 2. Confidentiality Statement This document contains confidential information of Tata Consultancy Services Limited, which is provided for the sole purpose of permitting the recipient to evaluate the proposal submitted herewith. In consideration of receipt of this document, the recipient agrees to maintain such information in confidence and to not reproduce or otherwise disclose this information to any person outside the group directly responsible for evaluation of its contents, except that there is no obligation to maintain the confidentiality of any information which was known to the recipient prior to receipt of such information from Tata Consultancy Services Limited, or becomes publicly known through no fault of recipient, or is received without obligation of confidentiality from a third party owing no obligation of confidentiality to Tata Consultancy Services Limited. Tata Code of Conduct We, in our dealings, are self-regulated by a Code of Conduct as enshrined in the Tata Code of Conduct. We request your support in helping us adhere to the Code in letter and spirit. We request that any violation or potential violation of the Code by any person be promptly brought to the notice of the Local Ethics Counselor or the Principal Ethics Counselor or the CEO of TCS. All communication received in this regard will be treated and kept as confidential.
  • 3.
  • 4. Table of Content COURSE 1: USAGE OF WinSCP.........................................................................................................................................5 1.1 Introduction to WinSCP ........................................................................................................................................5 1.2 How to use WinSCP ..............................................................................................................................................5 Step II : Logging in to Server....................................................................................................................................5 1.3 Downloading files from Remote Server.................................................................................................................9 1.4 Uploading files to Remote Server........................................................................................................................11 1.5 Saving sessions for future use..............................................................................................................................12
  • 5. COURSE 1: USAGE OF WinSCP 1.1 Introduction to WinSCP WinSCP (Windows Secure CoPy) is a popular , free and open-source Secure File Transfer application (SFTP) for Windows computers .It is used to transfer files securely between remote server and local computer and vice verse. It includes support for SCP file transfers, and has the ability to create secure tunnels via SSH. Secure FTP (SFTP) is similar to FTP, but with SFTP the entire session is encrypted, so that passwords are never sent in the clear text , and are therefore much less vulnerable to interception. That is ,for transferring files securely, we can use Secure copy or SCP protocol, it uses Secure Shell (SSH), which encrypts the content before transferring data over network. It runs over TCP port 22 by default. 1.2 How to use WinSCP Step I : Start WinSCP To start with double click on WinSCP icon in the desktop or select it from Programs Group . The first screen will look as below Step II : Logging in to Server Enter IP address of the server in Host Name field. Unix login userid in the User name field TCS Internal vILP – CPP - Using WinSCP
  • 6. Unix login Password in Password field Choose the protocol ( SFTP/ SCP / FTP) For example 1) Host name used : 172.26.132.40 (For Ahmedabad centre) 2) User name used : 390119 3) Password used : ******** 3) Protocol selected : SCP After logging in successfully, the following window will appear. TCS Internal vILP – CPP - Using WinSCP
  • 7. The left panel displays the content in local machine and Right panel displays the content in remote server. Step III : Select/Navigate to working directory 1. We can select the working directory in both Local as well as remote machine from the drop down menu. 2. Tool bar can be used to navigate to desired folder TCS Internal vILP – CPP - Using WinSCP
  • 8. Step IV : Transferring content Content can be transferred in two way A . Downloading : Transferring content from Remote server to Local machine B . Uploading : Transferring content from Local machine to Remote server TCS Internal vILP – CPP - Using WinSCP
  • 9. 1.3 Downloading files from Remote Server Following Steps to perform for Downloading file/Directory from Server Step - A1 : Select the file to transfer in the Remote pane, Step - A2 : Right click → Select Copy or move option TCS Internal vILP – CPP - Using WinSCP
  • 10. Step - A3 : Select the destination folder in the local machine(can be changed by selecting Browse button ) You will find file moving/coping to local machine TCS Internal vILP – CPP - Using WinSCP
  • 11. Step - A4 : The file Unix_Recap.txt copied to desktop. 1.4 Uploading files to Remote Server Step - B1 : Select the file to copy in Local machine(Left) pane. Step - B2 : Drag it and drop it to the remote pane desired location. TCS Internal vILP – CPP - Using WinSCP
  • 12. Step - B3 : Select the desired location from drop down list and select copy The file is copied. 1.5 Saving sessions for future use All the session information can be saved for future use and faster access. The information can be saved are : >> Server IP >> User name, >> Password(Not recommended) >> Communication protocol TCS Internal vILP – CPP - Using WinSCP
  • 13. After entering all above information click save button. Thank You ----- Happy Learning TCS Internal vILP – CPP - Using WinSCP