1. FTP (File Transfer Protocol)

FTP (File Transfer Protocol) is an internet protocol that runs within the application layer which is the standard for transferring computer files between machines in an internetwork. FTP or protocol Transmission Control Protocol (TCP) for data communication between clients and servers, so that between these two components a communication session will be made before data transfer begins.

FTP uses a standard authentication method, which uses the User name and password sent and is not encrypted. Registered users can use their username and password to access or download and upload the file they want. Generally, users register have full access to how many directories, so they can file, load directories and even delete files.FTP SSH

Users who have not registered can also use the anonymous login method, which is by using an anonymous username & password that is filled in by using an e-mail address. An FTP server is accessed using the Universal Resource Identifier (URI) using the format ftp: // servername. FTP clients can contact the FTP server by opening the URI.

The purpose of the FTP server is as follows:

  1. To share data.
  2. To provide indirect or implicit remote computers.
  3. To provide a storage place for the User.
  4. To provide reliable and efficient data carriers.
  5. FTP is actually an unsafe way to transfer files because the file is transferred without going  through encryption first but through clear text. The text method used for data transfer is the ASCII format or binary format.FTP SSH
By default, FTP uses the ASCII method to transfer data. Because the delivery is without encryption, the username, password, data that is transferred as well as commands sent can be audited by people using a protocol analyzer (Sniffer). The solution used is to use SFTP (SSH FTP), which is FTP based on SSH or using FTPS (FTP over SSL) so that data is sent there first.FTP SSH

 2. SSH (Sucure Shell)

SSH is a network protocol that allows the exchange of data securely between two computers. SSH can be used to control a computer remotely sending files, creating an encrypted Tunnel and others. This protocol has advantages over similar protocols such as Telnet, FTP, Danrsh, because SSH has its own Authentication, Authorization, and Extraction system.

Thus the security of a communication session through SSH assistance is more assured. SSH is safer compared to similar protocols, but the SSH protocol looks vulnerable to certain types of attacks. In general, this attack is shown in the first version of SSH (SSH-1) which does have a weaker security level than the second version of SSH (SSH-2). One attack on the first version of SSH was the attack on MAN IN THE MIDDLE during a key exchange.

Protocol SSH and the algorithms used in both SSH versions, then attacks that occur on SSH and how SSH handles them. To improve security on the SSH protocol, it can be done by using a cryptographic card for activation.

FTP SSH Download :
FTP Server
Free Download
FTP Client
Free Download
SSH Server
Free Download
SSH Client
Free Download

 3. TELNET (Tele Network)

TELNET (Tele Network) is a terminal that can be used to access resources that are on the server computer, as for how to access the server computer we can use several tools that have been provided by mass (putty, winscp, winftp, etc.). Or you can also use the terminal provided by Windows.

TELNET (Tele Network) means Remote login that can occur on the internet because of the service from the TELNET protocol. By telnet, it allows us to access other computers remotely via the internet. In easy language we can give orders to other computers both in making files, editing, deleting, and executing a command only through a computer in front of our table.

Telnet can be used on UNIX-based machines and very rarely Telnet applications on Windows NT / 2000 based machines. Telnet uses 2 programs one is client (telnet), and server (telnetd). What happens is that there are two programs running, namely the client software that is run on the computer that requests the service and the server software that is run by the computer that produces the service.

Tasks From the client on TELNET are:

  1. Make the TCP Network conception with the server.
  2. Receive input from the user.
  3. Reformat the iputan from the user then change it in the form of a standard format and send it to the server.
  4. Accept output from server in standard format
  5. Change the output format to be displayed on the layer.

 Tasks From the server on TELNET are:

1. To inform network software that the computer is ready to accept connections
2. Waiting for information in the form of a standard format
3. implement the request
4. send the results back to the client in the form of a standard format
5. Waiting for the next request

The telnet program can allow your internet host computer to become a terminal from other host computers on the internet. If by FTP, FTP SSH ,you can only open the connection to transfer files. While telnet allows you to log in as a user on a remote computer and run an internet service program provided by the computer. Telnet provides direct connection / access services to various services on the internet.

In most cases the command that needs to be known is the command used by Host Long Distance. The host probably runs UNIX even though we can also find other operating systems on the Host server such as UMS or Windows NT. If the menu is not available, it is better to observe the available help files. To end a Telnet session type Quit or Exit on some systems using Bye or Off. When using Windows depending on the program used, for example, FTP SSH, Win Tel, just click on the program icon in question.

Telnet can be used to access several facilities on the internet. These facilities include:

1. Library (library)
2. Data base
3. Super computer users
4. special machine users that are on certain machines
The application from Telnet is:
1. Windows
2. FreeDSB Unix
3. Linux FTP SSH

Incoming Search Terms :