Your browser does not allow storing cookies. We recommend enabling them.


Transfer and Queue Tabs

At the bottom of the Tectia File Transfer view, there are two tabs: Transfer and Queue. See Figure 5.1.

The Transfer tab displays a list of files that have already been transferred between the local and remote computers.

The Queue tab can be used to create a customized list of files that will be uploded or downloaded at a later stage. You can use the mouse to drag and drop files to the Queue tab, where they will wait for a separate transfer command.

After logging in to a remote host, right-clicking the Queue page opens a shortcut menu with the following options:

  • Add for adding selected files to the queue, right-click on the Queue page and select .

    The Edit Transfer Queue dialog appears. Click New above the list area to type in the path to a new file to be transferred, or click the ellipsis button (...) to browse to the files.

  • To edit the target locations of the queued files, select a file to edit, right-click the Queue page and select Edit.

    The Edit Transfer Queue dialog opens, allowing you to type in a new destination directory for the file. You can also click the ellipsis button (...) to browse to the destination directory.

    You can use the Edit option for several files at the same time, but the direction of the transfer (upload or download) must be the same for all of the files.

  • To delete files from the queue, select the files, right-click the Queue page and select Remove.

  • To transfer single files, select them, right-click the Queue page and select Transfer.

  • To transfer all the queued files, right-click the Queue page and select Transfer All.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more