logo
ssh
 

SSH ActiveX

Secure Shell (SSH) is a protocol to log into another computer over a network, to execute commands in a remote machine. It provides strong authentication and secure communications over unsecure channels. It is intended as a replacement for rlogin, rsh, and rcp.

 

SCP ActiveX

MySCP is a COM object which provides simlpe interface to copy files between Windows and Linux/Unix systems over a secure encrypted channel.You can use it with any language which supports the Microsoft COM technolgy.

 

XP_CRYPT

Easy-to-use, affordable, and effective security solution for encrypting column and row data within the MSSQL Server, MSDE and Oracle .

Click Here for Free Trial

 

SQL Shield

SQL Shield is a tool for MSSQL Server which effectively encrypts T-SQL code.
You can hide and protect your intellectual property from being viewed by everyone.
All MS SQL code decryptors simply fail to work!

   MYSCP Online Help Prev Next
What is MySCP
License
Properties
AbsentKeyPolicy
Compression
DifferentKeyPolicy
Error
Status
Timeout
Events
OnAbsentFingerprint
OnAuthorization
OnConnect
OnDifferentFingerprint
OnDisconnect
OnProcessFile
OnError
Methods
DisconnectNow
ReceiveFile
SendFile
WaitForComplete
**

MySCP

What is this ?

If you need to transfer files to or from your web site securely, you will want to use Secure Copy - also known as SCP. SCP uses encryption similar to SSH (Secure Shell) to encrypt data between the client and server. This ensures that no one can intercept and view the data transmitted.

In most situations such as when authentication is required (i.e. whenever you are asked for your password), SCP should always be used as opposed to FTP to transfer files. Regular FTP sends your uniq name, password, and other information across the network in clear text format. This makes it very easy for others to detect your information, and use it to do sinister things to your account and the network.

This level of security can be extremely important if you are transferring mission critical data such as Credit Card records, client information, digital assets, or other critical and sensitive data.

This HTML Help has been published using the chm2web software.