Your browser does not allow storing cookies. We recommend enabling them.
Examples of Use
This Appendix gives examples of file transfer, debugging, and key distribution with SSH Tectia Server for IBM z/OS.
Note: In the example commands in this chapter, the backslash character (
\) at the end of a line denotes that the command should be entered on a single line (without the backslash character).
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Want to see how PrivX can help your organisation? Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps