There is no 'safest' way of doing this. FTP is one of the easiest protocols to circumvent. Simply put, your FTP username and password are always transmitted (together with any data you are transmitting) in the clear. They are not encrypted in any way. Therefore, an attacker is able to monitor ('sniff') your FTP transactions and retrieve your username and password. With this they can gain access to your data. I do not recommend you use a remote FTP site for storing important files.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Alternatives I would recommend are:
Dig Deeper on Linux system security best practices
Related Q&A from James Turnbull
A user wants to implement OSSEC on a Windows server because he has no server side Linux operating system.continue reading
Solaris 10 Trusted Extensions and SELinux are best suited to different system requirements and administrator skill sets. Our security expert explains...continue reading
Configuring spam filters Spamassassin and dspam together in the email server Postfix is easy with the resources listed by our security expert.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.