[ Synopsis ]
[ Description ]
[ Options ]
[ Authors ]
[ Derivation ]
[ See also ]
scp - secure copy
scp [-prvC] [-P port] [-c cipher] [-i identity]
Scp copies files between hosts on a network. It uses ssh
for data transfer, and uses the same authentication and
provides the same security as ssh. Unlike rcp, ssh will
ask for passwords or passphrases if they are needed for
Any file name may contain a host and user specification to
indicate that the file is to be copied to/from that host.
Copies between two remote hosts are permitted.
Tatu Ylönen <email@example.com>;
- -c cipher
Selects the cipher to use for encrypting the data
transfer. This option is directly passed to ssh.
- -i identity_file
Selects the file from which the identity (private
key) for RSA authentication is read. This option is
directly passed to ssh.
- Preserves modification times, access times, and
modes from the original file.
- Recursively copy entire directories.
- Verbose mode.
Causes scp and ssh to print debugging
messages about their progress. This is helpful in
debugging connection, authentication, and configura
- Selects batch mode (prevents asking for passwords or
- Compression enable. Passes the -C flag to ssh to
- -P port
Specifies the port to connect to on the remote host.
Note that this option is written with a capital P,
because -p is already reserved for preserving the
times and modes of the file in rcp.
OS/2 adaptation by Hans-Michael Stahl <firstname.lastname@example.org>
Scp is based on the rcp program in BSD source code from
the Regents of the University of California.
Last update: 13 January 1997 by email@example.com