What is FTP-Know The Basics
What is FTP?
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet.
Like
the Hypertext Transfer Protocol (HTTP), which transfers displayable Web
pages and related files, and the Simple Mail Transfer Protocol (SMTP),
which transfers e-mail, FTP is an application protocol that uses the
Internet's TCP(Transmission Control Protocol)/IP protocols.
Very briefly, FTP (File Transfer Protocol) is used to transfer programs or other information from one computer to another.
This
simple tool will let you do many things: download software, upload your
own web pages, transfer information between your home and work
machines, and more.
FTP uses the port no 21 on your computer.
What is Anonymous FTP???
Anonymous FTP is used to download software from computers where you do not have your personal account.
If
you are accessing internet from a local service provider, you may use
anonymous FTP to get recommended software, help files, or other handy
information.
Publicly available files are easily accessed using anonymous FTP.
Uses of FTP:
As
a user, you can use FTP with a simple command line interface (for
example, from the Windows MS-DOS Prompt window) or with a commercial
program that offers a graphical user interface.
Your Web browser can also make FTP requests to download programs you select from a Web page.
For
example, If you've ever clicked on a link to download the newest
version of your favorite web browser, then you may have already used
anonymous FTP.
Downloading files with your web browser is certainly the easiest way to use FTP, although it does have its limitations.
When do you need a Separate FTP??
You
need a seperate program for FTP, if you want to download all the files
in a given directory. A good FTP client makes this much easier.
You will also need it for uploading and downloading files from your personal directory( while making your own webpage).
How does it help hackers??
Hackers can create their own FTP accounts to log the information of their victims secretly.
Remote
installation keyloggers are the best example for this. The data stolen
by the keyloggers will be sent to the hacker via FTP and email. FTP can
carry large amount of data too.
About the author: This is a guest post by ANUSHA MANNE who is interested in new technologies and wants to share knowledge with my blog readers. Usually writes articles related to latest technologies at Techie Talk
Its not by me its by some guest named ANUSHA MANNE.
ReplyDeleteThanks to her.