Using scp2
Hummingbird scp2 (Secure Copy) is a command line program used to secure file transfers over a network using the SSH2 protocol. Two methods of authentication are supported: password and public key.
The following information is also available from the scp2 usage information (scp2 –h):
scp2 usage:
Notes on selected options:
-B Batch mode is used for scripting file transfers. With this option, scp2 cannot stop execution for any reason. Therefore, all authentication information must be present on the command line or the transfer will fail.
-g fingerprint Scp2 uses the keys you create in Connectivity Secure Shell. You can view the value of the fingerprint in the Key Information dialog box accessible from the User Keys pane in the Connectivity Secure Shell Console.
-m mask This is the 3-number file permission mask. The first number corresponds to the owner of the file (you), the second corresponds to groups you might have created, and the third is for the general public. Each of the three numbers ranges from 0 to 7 and correspond to a bit-style flag-addition for [Read, Write, Execute], Read being in the most significant binary position, its value is 4, Write=2, and Execute=1. Thus, adding up the values gives full permission =7. Turning them all off means no permissions are given =0.
-r When the source is a directory, use this option to copy its subtrees.
--SKA Scp2 is considered the client to an SSH2 server. When connecting to this server, the server sends its certificate to scp2. This allows scp2 to determine if it’s safe to connect to this server. The server key action is an issue only when a server’s key is not already added to Connectivity Secure Shell’s Server Key store. What to do with this new server key is up to the user. The values are:
0—for prompting the user with the server certificate fingerprint
1—for connect and adding the key without prompting
2—for connecting without adding the key
3—for deny connection if the key is not already found in the store
If you choose to connect without being prompted for a server key, you will not have the opportunity to authenticate the server you are connecting to. Your safest option is to be prompted so that you can verify the server certificate's fingerprint.
--tracefile file Creates 2 files. One is for the FTP protocol trace events, and one for the SSH2 protocol events. Both protocols are used in Hummingbird Scp2.