How to Securely Copy Files in Linux | scp Command
Last Updated :
11 Jul, 2025
Secure file transfer is a crucial part of Linux systems administration. Whether moving sensitive files between local machines or transferring data between servers, or you need to move backup files to a remote server, fetch logs from a hosted machine, or sync directories across multiple systems, scp
command is useful,
.
In this article, we’ll cover everything you need to know about how to securely copy files in Linux using the SCP command. We'll explain the command syntax, the most commonly used options, practical examples, and troubleshooting tips to ensure you can use SCP to its full potential.
What is the Secure Copy Protocol (SCP)
SCP (Secure Copy Protocol) allows users to securely transfer files between systems. Because it uses SSH, all transferred data is encrypted, making it a safe choice for transmitting sensitive files.
It's a command-line tool that allows transferring files securely between hosts over a network built on the SSH proabout how to securely copy files in Linux using the SCP command. We'll explaitocol that encrypts data during the transfer to protect it from potential interception. Whether copying files from your local machine to a remote server or transferring files from one Linux machine to another, SCP ensures that the process is safe and fast.
Syntax of scp Command in Linux
The SCP command is used to copy files between local and remote systems securely.
Syntax
scp [options] [[user@]host1:]source_file_or_directory ... [[user@]host2:]destination
In this syntax:
options
: These are various options that modify the behavior of the SCP command, such as -i
for specifying an identity file, -l
for limiting bandwidth, -o
for specifying SSH options, -P
for specifying a custom SSH port, and -S
for specifying a program to use for the encrypted connection.[[user@]host1:]source_file_or_directory
: This represents the source file or directory. It can be local or on a remote machine specified by user@host1:
....
: This indicates that you can specify multiple source files or directories.[[user@]host2:]destination
: This is the destination where the files or directories will be copied. It can be local or on a remote machine specified by user@host2:
.
Example:
To copy a file named file.tx from your local machine to a remote server:
scp file.txt [email protected]:/home/username/
In this example:
- file.txt is the local file
- [email protected] is the remote server and user
- /home/username/ is the destination directory on the remote server.
Commonly Used SCP Commands in Linux
These are some of the most commonly used Options in scp Command in Linux:
options | Description |
---|
-P | port: Specifies the port to connect on the remote host. |
---|
-p | Preserves modification times, access times, and modes from the original file. |
---|
-q | Disables the progress meter. |
---|
-r | Recursively copy entire directories. |
---|
-s | Name of program to use for the encrypted connection. The program must understand ssh(1) options. |
---|
Example:
To copy a directory recursively with SCP:
scp -r /path/to/local/directory [email protected]:/home/username/
How to Securely Copy Files from Local to Remote Machine
Syntax:
scp [file_name] remoteuser@remotehost:/remote/directory
Here,
- file_name = The name of the file that needs to be copied.
- remoteuser =The username of the remote host.
- remotehost = The IP address or hostname of the remote host.
- /remote/directory = The directory where the file should be copied on the remote machine.
For example: If we want to copy a file name "test.txt" from local system to a
- "remoteuser" = "Jayesh"
- "remotehost" = "10.143.90.2"
- "/remote/directory" = "/home/jayesh"
Syntax:
scp test.txt [email protected]:/home/jayesh
copied file from local system to remote systemTo Verify: Use `ls` command in the location we copied file.
File that we have copiedHow to Securely Copy Files From Remote Machine to Local Machine
To copy a file from a remote machine to your local system, you just reverse the source and destination, let's check out the syntax below:
Syntax:
scp user@remotehost:/home/user/file_name
Here,
- "user" = username of remote system.
- "remotehost" = IP address (or hostname) of remote system.
- "/home/user/file_name" = path of file that has to be copied.
- "." = this means that we are copying that file in current location in local system.
For Example: If we have
- "user" = jayesh
- "remotehost" = 10.143.90.2
- "home/user/file_name" = home/jayesh/test1.txt
Syntax:
scp [email protected]:/home/jayesh/test1.txt
copied file from remote system to local system using scpTo verify: use dir (in windows cmd)
test1.txt successfully copied-P Option in scp Command
It is used to Securely Copy File to a Remote Machine on a Non-Standard SSH Port and specify the port to connect on the remote host. It is useful when our SSH server is listening on a non-standard port.
Syntax:
scp -P port source_file user@hostname:destination_file
For Example:
If we want to copy a file "test2.txt" from local machine to a remote machine with IP address "10.143.90.2" on port 2222 , user = "jayesh" and location = "/home/jayesh/".
By default, the scp uses ssh over port 22 for transferring the files. Changing the port might be necessary if the designated port 22 is not open on the remote host.
Syntax:
scp -P 2222 test2.txt [email protected]:/home/jayesh/
copying file from local system to remote using -P option in scpTo Verify: Use `ls` command in remote system in the location we have copied the file.
test2.txt successfully copied-p Option in scp Command
This option is used when we want the original metadata of the file that has been transferred. Basically, it preserves modification time, access time, and modes from the original file.
Syntax:
scp -p source_file user@hostname:destination_file
For Example: If we want to copy a file "test3.txt" from local machine to a remote machine with IP address "10.143.90.2", user = "jayesh" and location = "/home/jayesh/"
Syntax:
scp -p test3.txt [email protected]:/home/jayesh/
copying file from local system to remote using -p option in scp-q Option in scp Command
It Securely Copy File with Quiet Mode - Disabling Progress Meter .This option hides the progress of the file transfer on the terminal.
Syntax:
scp -q source_file user@hostname:destination_file
For Example: If we want to copy a file "test4.txt" from local machine to a remote machine with IP address "10.143.90.2", user = "jayesh" and location = "/home/jayesh/"
Syntax:
scp -q test4.txt [email protected]:/home/jayesh/
As we can see there is no progress shown To Verify: Use `ls` command in remote system in the location we have copied the file.
test4.txt successfully copied-r Option in scp Command
This option is used when we want to copy an entire directory and its contents. Which basically means copying entire directory recursively.
Syntax:
scp -r Directory_name user@hostname:destination_file
For Example: If we want to copy a Directory content name "new" from local machine to a remote machine with IP address "10.143.90.2", user = "jayesh" and location = "/home/jayesh/new1/"
Syntax:
scp -r new [email protected]:/home/jayesh/new1/
copying entire directory and its file recursively using `-r` in scpTo Verify: Use `ls` command in remote system in the location we have copied the file.
new directory successfully copied.SCP vs SFTP vs Rsync
Whether it’s quick file transfers, synchronizing folders, or browsing remote directories, tools like SCP, SFTP, and Rsync each have their strengths.
Feature/Aspect | SCP (Secure Copy) | SFTP (SSH File Transfer Protocol) | Rsync (Remote Sync) |
---|
Use Case | Best for quick and secure one-time file transfers | Ideal for browsing files interactively on remote servers | Perfect for syncing directories and handling large datasets |
Speed | Fast, especially for single files | Slower than SCP due to session management overhead | Very fast with large or repeated transfers (uses delta copy) |
Encryption | Yes – uses SSH | Yes – uses SSH | Yes – uses SSH or can work over RSH |
Supports Resume | Not supported | Supported | Supported |
Interactive File Browsing | Not available | Supported | Not available |
Directory Synchronization | Not supported | Limited support | Fully supported |
Compression Support | Available with -C flag | Not built-in | Available with -z option |
Availability | Available on all Linux distributions | Available on all Linux distributions | Pre-installed on most Linux systems |
Command Syntax | scp file user@remote:/path | sftp user@remote then use put or get commands | rsync -avz file user@remote:/path |
Ease of Use | Simple for one-time tasks | Easier for interactive use | More complex but highly powerful |
Real-Time Sync | Not supported | Not supported | Supported |
Resource Usage | Moderate | Moderate | Low, with efficient data usage |
How to Improve the Security of SCP File Transfer
You must follow these practices to ensure that you're performing a secure file transfer using the SCP:
- Ensure to use a strong and unique SSH key to authenticate file transfers.
- Always ensure that you're transferring files to a trusted remote hosts by checking its fingerprints.
- Ensure that you're using a non-default SSH port (if possible) to prevent from any attacks.
- Cross verify that you're only transferring files to directories with limited access.
Troubleshooting While Copying Files in Linux: SCP Command
While performing this action, there are certain challenges that you might face, let's address them for better clarity:
1. Permission Denied Error
If such issue persists, ensure that all the permissions to read/write to both source and destination (or directories) are coreect. Here's how you can check it:
transferring
2. Issue While Transferring Files
Check if the source file exists and is accessible, also ensure to have sufficient storage disk space on the remote server so that the files can be stored.
3. Connection Timeout
Ensure that the remote server is onlinr and reachable and in case of custom SSH port, always make sure that you're using the correct port. You may verify it by using the -P option.
Conclusion
scp is possibly the easiest yet most effective secure file transfer tool for Linux. It is constructed atop SSH and encrypts all credentials and data, making it safer from cyber attacks and interception of files. Coping files from a laptop to a distant server, creating backups of project directories, or handling files between cloud instances, SCP efficiently and securely gets the task completed.
Unlike graphical file transfer programs, scp provides you complete control from the command line so that you can automate operations, tailor transfer behavior, and safely manage files without third-party utilities. Its straightforward syntax, availability system-wide, and support for SSH keys make it perfect for everyday file handling.
Similar Reads
Linux/Unix Tutorial Linux is one of the most widely used open-source operating systems. It's fast, secure, stable, and powers everything from smartphones and servers to cloud platforms and IoT devices. Linux is especially popular among developers, system administrators, and DevOps professionals.Linux is:A Unix-like OS
10 min read
Getting Started with Linux
What is Linux Operating SystemLinux is based on the UNIX operating system. UNIX is a powerful, multi-user, multitasking operating system originally developed in the 1970s at AT&T Bell Labs. It laid the foundation for many modern operating systems, including Linux.Linux is free and open-source, accessible to everyone.Its sour
10 min read
LINUX Full Form - Lovable Intellect Not Using XPLINUX stands for Lovable Intellect Not Using XP. Linux was developed by Linus Torvalds and named after him. Linux is an open-source and community-developed operating system for computers, servers, mainframes, mobile devices, and embedded devices. Linux receives requests from system programs and it r
2 min read
Difference between Linux and WindowsLinux: Linux could be a free and open supply OS supported operating system standards. It provides programming interface still as programme compatible with operating system primarily based systems and provides giant selection applications. A UNIX operating system additionally contains several several
7 min read
What are Linux Distributions ?A Linux distribution, often shortened to âdistro,â is a packaged version of Linux that comes with the Linux kernel plus a collection of software and utilities that make the OS functional and user-friendly. Some distros are optimized for business environments, offering tools for productivity and ente
8 min read
Difference between Unix and LinuxUnix was created in the 1970s by Ken Thompson and Dennis Ritchie at Bell Labs. Dennis Ritchie was also the creator of the C programming language. Originally a command-line operating system, Unix has evolved to support graphical interfaces (GUI) as well. It became popular in universities, enterprises
5 min read
Installation with Linux
How to Install Arch Linux in VirtualBox?Installing Arch Linux on a virtual machine is an excellent way to experience this powerful and flexible Linux distribution without affecting your main system. If you're looking to install Arch Linux in VirtualBox, this guide will take you through the process step-by-step. Arch Linux is known for its
7 min read
Fedora Linux Operating SystemFedora Linux is a free and open-source operating system based on the Linux kernel and was developed by the community-supported Fedora Project. It is known for its fast release cycle, which keeps the operating system up to date with the latest software and technologies.What is the Fedora Linux Operat
12 min read
How to install Ubuntu on VirtualBox?Installing Ubuntu on VirtualBox is a great way to experience the powerful features of this popular Linux distribution without altering your main operating system. Whether youâre a developer, a student, or simply curious about Linux, setting up Ubuntu on VirtualBox allows you to test and explore in a
6 min read
How to Install Linux Mint?Linux Mint is the second-largest Linux-based distro used in the world. Linux Mint is a community-driven Linux distribution based on Ubuntu which itself is based on Debian and bundled with a variety of free and open-source applications. So here we discuss the installation of Linux mint. Installation
3 min read
How to Install Kali Linux on Windows?Kali Linux is an open-source Linux distribution based on Debian, designed for sophisticated penetration testing and security auditing. Kali Linux includes hundreds of tools for diverse information security activities such as penetration testing, security research, computer forensics, and reverse eng
2 min read
How to Install Linux on Windows PowerShell Subsystem?There are several ways to Install a Linux subsystem on your Windows PC Powershell Environment. It is good for learners, but it is recommended using original Linux OS if you are a developer as the Subsystem lacks the pre-installed Linux tools. Before we begin installing a Linux subsystem, we need to
2 min read
How to Find openSUSE Linux Version?openSUSE is well known for its GNU/Linux-based operating systems, mainly Tumbleweed, a tested rolling release, and Leap, a distribution with Long-Term-Support(LTS). MicroOS and Kubic are new transactional, self-contained distributions for use as desktop or container runtime. Here we figure out which
2 min read
How to Install CentOSCentOS is a popular open-source Linux distribution aimed at servers and provides compatibility with Red Hat's RPM package manager. It is built with the goal of providing a stable operating system that provided great compatibility with the upstream RHEL (Red hat enterprise Linux) CentOS is therefore
2 min read
Linux Commands
Linux CommandsLinux commands are essential for controlling and managing the system through the terminal. This terminal is similar to the command prompt in Windows. Itâs important to note that Linux/Unix commands are case-sensitive. These commands are used for tasks like file handling, process management, user adm
15+ min read
Essential Unix CommandsUnix commands are a set of commands that are used to interact with the Unix operating system. Unix is a powerful, multi-user, multi-tasking operating system that was developed in the 1960s by Bell Labs. Unix commands are entered at the command prompt in a terminal window, and they allow users to per
7 min read
How to Find a File in Linux | Find CommandThe find command in Linux is used to search for files and directories based on name, type, size, date, or other conditions. It scans the specified directory and its sub directories to locate files matching the given criteria.find command uses are:Search based on modification time (e.g., files edited
9 min read
Linux File System
Linux File SystemA file system is a structured method of storing and managing dataâincluding files, directories, and metadataâon your machine. Think of it like a library. If thousands of books were scattered around, finding one would be hard. But in an organized structure, like labeled shelves, locating a book becom
12 min read
Linux File Hierarchy StructureThe Linux File Hierarchy Structure or the Filesystem Hierarchy Standard (FHS) defines the directory structure and directory contents in Unix-like operating systems. It is maintained by the Linux Foundation. In the FHS, all files and directories appear under the root directory /, even if they are sto
6 min read
Linux Directory StructureIn Linux, everything is treated as a file even if it is a normal file, a directory, or even a device such as a printer or keyboard. All the directories and files are stored under one root directory which is represented by a forward slash /. The Linux directory layout follows the Filesystem Hierarchy
6 min read
Linux Kernel
Linux KernelLinux Kernel is the heart of Linux operating systems. It is an open-source (source code that can be used by anyone freely) software that is most popular and widely used in the industry as well as on a personal use basis. Who created Linux and why? Linux was created by Linus Torvalds in 1991 as a hob
4 min read
Kernel in Operating SystemA kernel is the core part of an operating system. It acts as a bridge between software applications and the hardware of a computer. The kernel manages system resources, such as the CPU, memory and devices, ensuring everything works together smoothly and efficiently. It handles tasks like running pro
9 min read
How Linux Kernel Boots?Many processes are running in the background when we press the system's power button. It is very important to learn the Linux boot process to understand the workings of any operating system. Knowing how the kernel boots is a must to solve the booting error. It is a very interesting topic to learn, l
11 min read
Difference between Operating System and KernelIn the world of computing, two terms that are frequently mentioned are Operating System (OS) and Kernel. In this article, we will explore the key differences between the OS and the Kernel, their functions, and how they work together to manage hardware and software.What is an Operating System?An Oper
3 min read
Linux Kernel Module Programming: Hello World ProgramKernel modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. Custom codes can be added to Linux kernels via two methods. The basic way is to add the code to the kernel source tree and
7 min read
Linux Loadable Kernel ModuleIf you want to add code to a Linux kit, the basic way to do that is to add source files to the kernel source tree and assemble the kernel. In fact, the process of setting up the kernel consists mainly of selecting which files to upload to the kernel will be merged. But you can also add code to the L
7 min read
Loadable Kernel Module - Linux Device Driver DevelopmentFor Linux device drivers, we can use only two languages: Assembler and C. Assembler implements the main parts of the Linux kernel, while C implements the architecture-dependent parts. Uploaded kernel modules are often referred to as kernel modules or modules, but those are misleading names because t
4 min read
Linux Networking Tools
Network configuration and troubleshooting commands in LinuxComputers are often connected to each other on a network. They send requests to each other in the form of packets that travel from the host to the destination. Linux provides various commands from network configuration and troubleshooting. Network Configuration and Troubleshooting Commands in Linux
5 min read
How to configure network interfaces in CentOS?A network interface is a link between a computer and another network(Private or Public). The network interface is basically a card which is known as NIC or Network Interface Card, this does not necessarily have to be in a physical form instead, it can be inbuilt into the software. If we take the exa
5 min read
Command-Line Tools and Utilities For Network Management in LinuxIf you are thinking of becoming a system administrator, or you are already a system admin, then this article is for you.As a system admin, your daily routine will include configuring, maintaining, troubleshooting, monitoring, securing networks, and managing servers within data centers. Network confi
8 min read
Linux - Network Monitoring ToolsNetwork monitoring is using a system (hardware or software) that continuously observes your network and the data flows through it, depending on how the monitoring solution actually functions and informs the network administrator. We can keep a check on all the activities of our network easily. While
4 min read
Linux Process
Linux Firewall
Shell Scripting & Bash Scripting
Introduction to Linux Shell and Shell ScriptingWhenever we use any modern operating system like Linux, macOS, or Windows we are indirectly interacting with a shell, the program that interprets and executes our commands. While running Ubuntu, Linux Mint, or any other Linux distribution, we are interacting with the shell by using the terminal. In
8 min read
What is Terminal, Console, Shell and Kernel?Understanding the terms terminal, console, shell, and kernel is crucial for anyone working with computers or learning about operating systems. These concepts are key components of how we interact with our devices and software. The terminal is a text-based interface used to interact with the computer
5 min read
How to Create a Shell Script in linuxShell is an interface of the operating system. It accepts commands from users and interprets them to the operating system. If you want to run a bunch of commands together, you can do so by creating a shell script. Shell scripts are very useful if you need to do a task routinely, like taking a backup
7 min read
Shell Scripting - Different types of VariablesThe shell is a command-line interpreter for Linux and Unix systems. It provides an interface between the user and the kernel and executes commands. A sequence of commands can be written in a file for execution in the shell. It is called shell scripting. It helps to automate tasks in Linux. Scripting
4 min read
Bash Scripting - Introduction to Bash and Bash ScriptingBash is a command-line interpreter or Unix Shell and it is widely used in GNU/Linux Operating System. It is written by Brian Jhan Fox. It is used as a default login shell for most Linux distributions. Scripting is used to automate the execution of the tasks so that humans do not need to perform them
12 min read
Bash Script - Define Bash Variables and its typesVariables are an important aspect of any programming language. Without variables, you will not be able to store any required data. With the help of variables, data is stored at a particular memory address and then it can be accessed as well as modified when required. In other words, variables let yo
12 min read
Shell Scripting - Shell VariablesA shell variable is a character string in a shell that stores some value. It could be an integer, filename, string, or some shell command itself. Basically, it is a pointer to the actual data stored in memory. We have a few rules that have to be followed while writing variables in the script (which
6 min read
Bash Script - Difference between Bash Script and Shell ScriptIn computer programming, a script is defined as a sequence of instructions that is executed by another program. A shell is a command-line interpreter of Linux which provides an interface between the user and the kernel system and executes a sequence of instructions called commands. A shell is capabl
4 min read
Shell Scripting - Difference between Korn Shell and Bash shellKorn Shell: Korn Shell or KSH was developed by a person named David Korn, which attempts to integrate the features of other shells like C shell, Bourne Shell, etc. Korn Shell allows developers to generate and create new shell commands whenever it is required. Korn shell was developed a long year bac
3 min read
Shell Scripting - Interactive and Non-Interactive ShellA shell gives us an interface to the Unix system. While using an operating system, we indirectly interact with the shell. On Linux distribution systems, each time we use a terminal, we interact with the shell. The job of the shell is to interpret or analyze the Unix commands given by users. A shell
3 min read
Shell Script to Show the Difference Between echo â$SHELLâ and echo â$SHELLâIn shell scripting and Linux, the echo command is used to display text on the terminal or console. When used with the $SHELL variable, which contains the path of the current user's shell program, the output of the echo command can be different depending on whether the variable is enclosed in single
4 min read