Let's say we have a desktop application and a web application. The desktop application uploads files to the server using POST requests to the web application.
What are the possibilities (except using certificates and username/password) to find out that the POST request came from our desktop application and not from an attacker? In other words - how to make sure no one is using the upload script to flood the server with malicious files?