|-V||Show version information and exit.|
|-pgpfp||Display the fingerprints of the PuTTY PGP Master Keys and exit, to aid in verifying new files released by the PuTTY team.|
|-ls||Remote directory listing.|
|-p||Preserve file attributes.|
|-q||Quiet, dont show statistics.|
|-r||Copy directories recursively.|
|-unsafe||Allow server-side wildcards (DANGEROUS).|
|-v||Show verbose messages.|
|-load session||Load settings from saved session.|
|-P port||Connect to port port.|
|-l user||Set remote username to user.|
|-batch||Disable interactive prompts.|
|-pw password||Set remote password to password. CAUTION: this will likely make the password visible to other users of the local machine (via commands such as w).|
|-1||Force use of SSH protocol version 1.|
|-2||Force use of SSH protocol version 2.|
|-C||Enable SSH compression.|
|-i path||Private key file for user authentication.|
Specify an acceptable host public key. This option may be specified multiple times; each key can be either a fingerprint (99:aa:bb:...) or a base64-encoded blob in OpenSSHs one-line format.
Specifying this option overrides automated host key management; only the key(s) specified on the command-line will be accepted (unless a saved session also overrides host keys, in which case those will be added to), and the host key cache will not be written.
|-scp||Force use of SCP protocol.|
|-sftp||Force use of SFTP protocol.|
These options make pscp log protocol details to a file. (Some of these may be sensitive, although by default an effort is made to suppress obvious passwords.)
-sshlog logs decoded SSH packets and other events (those that -v would print). -sshrawlog additionally logs the raw encrypted packet data.
For more information on pscp its probably best to go and look at the manual on the PuTTY web page:
This man page isnt terribly complete. See the above web link for better documentation.
|PuTTY tool suite||PSCP (1)||2004(hy03(hy24|