Preview

FTP Security:

Good Essays
Open Document
Open Document
866 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FTP Security:
FTP Security – An Overview

Sharing files over the Internet can be challenging especially when there are many of them and their size can be in the Gigabytes. Some options are the many flavors of messengers the most popular being Yahoo or MSN. This however could be a tedious process because each would have to be done one at a time and most of our customers simply would not stand for this type of manual, time intensive process. Another option is to use email but that option can be slow and many system administrators limit the size of one 's mailbox to a size that would make this option prohibitive. Remote desktop software is an option but that typically has slow performance. What is the solution? Why FTP, of course!
What is FTP? FTP is an acronym for File Transfer Protocol. The sole purpose of FTP is to serve as a way to transfer data files, or any files for that matter, over a network connection or over the Internet.
In the native form, FTP is similar to Hypertext Transfer Protocol (HTTP). To host a FTP sites one needs a server to host the data available for download as well as a repository to hold the information being uploaded. Clients log on to the server, using the correct log on information and software designed to enable these types of file transfers.
When using HTTP, one will use Internet Explorer, or an alternative Web Browser like Netscape or Mozilla. Alternatively when using FTP, a FTP client software like Bulletproof FTP, WSFTP, or CuteFTP is used. FTP is the most commonly used protocol for file transfers over the Internet, but unlike HTTP which is generally a one way transfer of data, FTP provides a means of allowing clients to upload files as well as download them, and is considerably easier to set up and maintain (www.pcstats.com, 2006).
With native FTP the system can only process username and password information in plain text. FTP is not the only protocol that sends everything in a clear text format. POP, IMAP, and Jabber are a



References: Pcstats.com (2006). Beginners Guides: Setting up a FTP Server in WinXP. Retrieved on August 3, 2006 from http://www.pcstats.com/articleview.cfm?articleid=1491&page=1 Shea, Lisa (2006). ASP Site. Retrieved on August 2, 2006 from http://www.bellaonline.com/articles/art2352.asp

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 7 Exercise 1

    • 580 Words
    • 3 Pages

    FTTH- the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide unprecedented high-speed Internet access.…

    • 580 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, we need to shut down the FTP server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    You might see that there is no FTP access using file explorer with Windows 10 and IE 11. Even if you enable FTP access by file explorer through the advanced options for internet, you will see that although the files and directories will be listed, you are unable to make changes. You might see the same issue even if you have permissions from the owner of the HTTP sites to open the sites in Windows explorer.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fibre Channel Protocol (FCP) The protocol that Fibre Channel storage area networks use to transmit SCSI traffic between devices.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What directory enables you to use a web site to publish files located anywhere on the network?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    HTTP: Hypertext Transfer Protocol, The protocol used by web browsers and web servers to define the format of URLs (web addresses) and the messages used to exchange web objects.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Historically is was user to provide access to a remote host through the use of a command-line interface. This protocol will run on the computer and create a connection to the server on the network. Commands can then be entered through the Telnet application and it will then be executed as it the user entered them directly onto the server console. This will enable the user to control the server and then communicate this with other servers on the network. In order to start a Telnet session, the user would have to log in to a server by entering a valid username and password.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    3. What is the source IP address of the FTP client workstation and FTP server?…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP Wrappers is a Linux/UNIX security mechanism that will deny or allow access to TCP services. We can prevent unauthorized access to our vsftp server using TCP Wrappers. TCP Wrappers consists of two files located in the /etc directory. The hosts.deny file prevents certain users from accessing TCP services while the hosts.allow authorizes users to access TCP services.…

    • 182 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    1. Both Wireshark and NetWitness Investigator can be used for packet capture and analysis. Which…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    9) Which of the following is a content sharing technique in which the sender does not have any control or record of changes made to the shared content?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    C) FTP (File transfer protocol) - is a standard way of gathering files between computers on the Internet over IP/TCP…

    • 474 Words
    • 2 Pages
    Good Essays