SSH (SCP) Send Files from Windows to Your Linux Box

Not all of us have the luxury of working both at home and at work on a UNIX based system. However that doesn't mean you can't transfer files safely and securely between the two systems.

Due to a firewall, I'm unable to use FTP on a non-standard port, from my work, however I am able to use SSH to connect to my home computer.

There are many different clients for Windows based systems for SSH connections, however I am fond of PuTTy myself. This document will give you a very brief overview of how to send files from your Windows PC, from a command prompt, to your UNIX style server.

Once you have installed the PuTTy Client (full package not just the putty.exe), open a command prompt on your Windows PC (start menu > run > cmd).

You.re putty client may not be in your path, so change directory to where the program is installed, or copy the 'pscp' executable to your c: for ease of use.

Pscp is the SCP client that comes with the PuTTy package. Normally SCP is used for transferring files securely between UNIX based systems, but it's been ported over with the windows based clients.

The following is an example of how to transfer a file using pscp:

C:pscp -l yourname C:PicturesPictures*.jpg
my.server.com:/home/yourname/tmp/

This will transfer all the jpg files from the Pictures directory one at a time to your server. After you hit enter the server should ask you for your password on that system before it continues. There are many additional options for you to use that will help you make things a bit quicker, like the recursive option, so all subdirectories will get moved also.

Some of the more important options are as follows:

-P 1234 Specifies port 1234 is open for SSH

-l yourname Specifies the username you want to login with

-r Specifies recursive transfer of all subdirectories

-v Specifies verbose mode

-q Specifies quiet mode, and will not display the little statistics bar during the transfer

-C Specifies compress is enabled

-pw yourpass Specifies your password, if you do not use this, it will prompt you instead.

This pretty much covers the basics of transferring files from windows to unix via SCP.

Ken Dennis
ken.dennis@gmail.com
ken.dennis@gmail.com

move in cleaning service Mundelein ..
In The News:

Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.

Microsoft Great Plains Accounting/ERP Implementation ? Finance Industry Customization Example

Microsoft Business Solutions Great Plains is very generic accounting application... Read More

Introduction To ISDN, Part III: PAP

Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More

Managing Stress in the Computer Industry - Five Steps to a Stress-free Life

It would be easy to think, like most people apparently... Read More

Popular Fleet Maintenance Programs

Some companies that are in need of fleet management may... Read More

Chinese Input - Step by Step Instruction on How to Input Chinese Characters in English Windows XP

Enabling Chinese input is quick and easy, there are only... Read More

IT Department Skills to Support Microsoft Great Plains and Microsoft CRM

Microsoft Great Plains as ERP and Microsoft CRM as... Read More

Review on QuarkXpress 6.0

After almost two decades of existence, Quark has become the... Read More

Online PowerPoint Presentation ? Convert PowerPoint to Flash

Although we don't know whether Microsoft ever envisioned such a... Read More

Linux vs Windows Operating Systems

With so many Microsoft Windows related viruses, errors, and other... Read More

Databases ? How We Love to Hate Them!

You've finally created databases that you can actually use to... Read More

5 Easy File Management Tips in Microsoft Word

How many steps does it take you to locate and... Read More

Microsoft Great Plains Integrations ? Retail Management Sample

Microsoft Business Solutions is emerging as very attractive vendor for... Read More

Antivirus Software ? Get The Bugs Before They Get You!

You turn on your computer, and it doesn't look quite... Read More

Seven Reasons Why a Hosted Inventory Management Solution Might Be Right For Your Organization

Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More

Microsoft CRM Modification ? Overview for IT Specialist

Microsoft CRM is now on the scene and it is... Read More

Microsoft Great Plains Remote Support - Overview

Microsoft Great Plains is now standard mid-market ERP application, serving... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Enterprise Resource Planning Overview

ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More

Imagine if Everyone Working In Your Office Was In Synch?

Microsoft-Outlook is a pretty amazing program. So much more than... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

How the Firefox: How to... Manual Helped Me

A few months back I really got sick of my... Read More

Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur

I started using PIP (Picture It Publishing) Platinum 2002 right... Read More

Software Piracy - Global Increase

Pirated software is on the increase and now accounts for... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

insured cleaning company Highland Park ..