Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Phantom Protocol Configuration File Post 302935291 by Azrael on Saturday 14th of February 2015 11:28:09 AM
Old 02-14-2015
I believe that is a different protocol or software. That git hub link says "Command Protocol" and when I cloned it the folder was called "phantom.wiki". From what I could tell the files inside were for making php web applications that also use the phantom protocol.
 

8 More Discussions You Might Find Interesting

1. Programming

File transfer using Zmodem protocol

can anybody guide me how do i initiate file transfer over modem using zmodem protocol... (0 Replies)
Discussion started by: borntorock
0 Replies

2. Shell Programming and Scripting

Error transferring large file using sftp protocol

Hello All, I am not able to transfer large file completely (more than 60 MB) through automated SFTP script. It transfers only the partial file (approximately 55 MB) and it stops. I use "expect" command to transfer file in a automatic mode through script. The file transfer rate i get is around... (0 Replies)
Discussion started by: prashant.patel
0 Replies

3. AIX

I created a phantom file now i can't delete it?

Ok, somehow i've managed to create two .ksh files with the same name. Impossible i know but somehow i did it by mistake... I was actually copying a file and renaming it as something else but as i was typing the copy name i hit the delete key by mistake and got the ^? characters in the file name... (9 Replies)
Discussion started by: Jazmania
9 Replies

4. AIX

w shows phantom user

Hi When i use "w" command, It list some users with "-" command. That means these use already logout,but still in the system somewhere, no process but list under the "w" and "who" command.How can i get rid of these user. Can anybody help me out.thanks a lot xiko (2 Replies)
Discussion started by: xiko
2 Replies

5. Shell Programming and Scripting

Secure File Transfer Protocol

Hi, Is there any protocol other than SFTP to transfer the file using secured connection SSH. ? Regards, Arthik (2 Replies)
Discussion started by: arthikbabu
2 Replies

6. HP-UX

SFTP Protocol: How to transfer the file in PC Format

Hi, We are facing issue with files transfered using SFTP in Hp-UX. The transfered files are in Unix Format. That is, file format as UNIX (LF) instead of a PC format (CR & LF). How can we achieve file transfers as PC format using SFTP? Your help and input will be highly appreciated. ... (2 Replies)
Discussion started by: brap45
2 Replies

7. UNIX for Dummies Questions & Answers

How do i transfer file using ftp protocol in Linux.

Hi , I want to transfer file using ftp protocol . I m using following linux distribution. LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch Distributor ID: OracleVMserver Description: Oracle VM server release 2.2.0 Release: 2.2.0 Codename: ... (5 Replies)
Discussion started by: pinga123
5 Replies

8. Programming

Serial file transfer protocol / checksums

Hello ppl, I'm working on a windows program simulating an existing Unix program, the program is a firmware downloader, it sends a binary firmware file through the serial port (rs232) to a Set-Top Box running under unix system too, as i'm a poor unix user and not a unix programmer i choosed the... (10 Replies)
Discussion started by: nidal
10 Replies
SECSH(5)							    Lsh Manuals 							  SECSH(5)

NAME
secsh - the Secure Shell protocol DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components: The Transport layer protocol This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User authentication protocol This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server. The Connection protocol This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels. IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist. The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]). The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License. REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998 [SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998 [SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998 [SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998 [SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995 TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd. AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8) LSH
JANUARY 1999 SECSH(5)
All times are GMT -4. The time now is 05:07 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy