Archive for category FTP

>COMMON FTP ERROR CODES

>

 
Description
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK  where  is User-process data stream marker, and server’s equivalent marker.
120 Service ready in 
minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection.
225 Data connection open; no transfer in progress. bpftpserver-howto-networkshares-05-ftp_session
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed. Logged out if appropriate.
250 Requested file action okay, completed.
257 “PATHNAME” created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information
421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
425 Can’t open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken.
451 Requested action aborted. Local error in processing.
452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted. Page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

LiveJournal Tags: ,
del.icio.us Tags: ,
43 Things Tags: ,
Technorati Tags: ,,

Secure Computer: How burn bin file 2

Leave a comment

>COMMON FTP ERROR CODES

>

 
Description
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK  where  is User-process data stream marker, and server’s equivalent marker.
120 Service ready in 
minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection.
225 Data connection open; no transfer in progress. bpftpserver-howto-networkshares-05-ftp_session
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed. Logged out if appropriate.
250 Requested file action okay, completed.
257 “PATHNAME” created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information
421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
425 Can’t open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken.
451 Requested action aborted. Local error in processing.
452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted. Page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

LiveJournal Tags: ,
del.icio.us Tags: ,
43 Things Tags: ,
Technorati Tags: ,,

Secure Computer: How burn bin file 2

Leave a comment

Deep Proxy View

The exchange of information in Internet is made by the “client – server” model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.
What your browser transmits to a web-server:
  • a name and a version of an operating system
  • a name and a version of a browser
  • configuration of a browser (display resolution, color depth, java / java script support, …)
  • IP-address of a client , Other information
The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
  • a country where you are from
  • a city
  • your provider?s name and e-mail
  • your physical address
Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).
These are some environment variables:
  • REMOTE_ADDR ? IP address of a client
  • HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.
  • HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.
  • HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)
  • HTTP_USER_AGENT ? so called “a user?s agent”. For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.
  • HTTP_HOST ? is a web server?s name
This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, …). Their quantity can depend on settings of both a server and a client.
These are examples of variable values:
  • REMOTE_ADDR = 194.85.1.1
  • HTTP_ACCEPT_LANGUAGE = ru
  • HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
  • HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)
  • HTTP_X_FORWARDED_FOR = 194.115.5.5
Anonymity at work in Internet is determined by what environment variables “hide” from a web-server.
If a proxy server is not used, then environment variables look in the following way:
  • REMOTE_ADDR = your IP
  • HTTP_VIA = not determined
  • HTTP_X_FORWARDED_FOR = not determined
According to how environment variables “hided” by proxy servers, there are several types of proxies
Transparent Proxies
They do not hide information about your IP address:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = your IP
The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.
Anonymous Proxies
All proxy servers, that hide a client?s IP address in any way are called anonymous proxies
Simple Anonymous Proxies
These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = proxy IP
These proxies are the most widespread among other anonymous proxy servers.
Distorting Proxies
As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = random IP address
  • High Anonymity Proxies
These proxy servers are also called “high anonymity proxy”. In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = not determined
  • HTTP_X_FORWARDED_FOR = not determined
That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.
Summary
Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

Leave a comment

>Deep Proxy View

>

The exchange of information in Internet is made by the “client – server” model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.
What your browser transmits to a web-server:
  • a name and a version of an operating system
  • a name and a version of a browser
  • configuration of a browser (display resolution, color depth, java / java script support, …)
  • IP-address of a client , Other information
The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
  • a country where you are from
  • a city
  • your provider?s name and e-mail
  • your physical address
Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).
These are some environment variables:
  • REMOTE_ADDR ? IP address of a client
  • HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.
  • HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.
  • HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)
  • HTTP_USER_AGENT ? so called “a user?s agent”. For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.
  • HTTP_HOST ? is a web server?s name
This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, …). Their quantity can depend on settings of both a server and a client.
These are examples of variable values:
  • REMOTE_ADDR = 194.85.1.1
  • HTTP_ACCEPT_LANGUAGE = ru
  • HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
  • HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)
  • HTTP_X_FORWARDED_FOR = 194.115.5.5
Anonymity at work in Internet is determined by what environment variables “hide” from a web-server.
If a proxy server is not used, then environment variables look in the following way:
  • REMOTE_ADDR = your IP
  • HTTP_VIA = not determined
  • HTTP_X_FORWARDED_FOR = not determined
According to how environment variables “hided” by proxy servers, there are several types of proxies
Transparent Proxies
They do not hide information about your IP address:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = your IP
The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.
Anonymous Proxies
All proxy servers, that hide a client?s IP address in any way are called anonymous proxies
Simple Anonymous Proxies
These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = proxy IP
These proxies are the most widespread among other anonymous proxy servers.
Distorting Proxies
As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = proxy IP
  • HTTP_X_FORWARDED_FOR = random IP address
  • High Anonymity Proxies
These proxy servers are also called “high anonymity proxy”. In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:
  • REMOTE_ADDR = proxy IP
  • HTTP_VIA = not determined
  • HTTP_X_FORWARDED_FOR = not determined
That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.
Summary
Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

Leave a comment

FTP

More about FTP
Time and mind needed so keep trying . So first of all , find out if your IP(Internet Protocol) is static (not changing) or dynamic (change every time you log in).To check (do ) first consider the fact if you have a dial up modem. If you do, chances are about 99% out of 100% that your IP is dynamic. To make it static, just go to place like HTTP://WWW.MYFTP.ORG/ to register for a static IP address.
Then you need to get your IP. This can be
Going to Start -> Run -> winipcfg or http://www.ask.com and asking ‘What is my IP?
After doing so, you’ll need to download an FTP server client. I’d recommend G6 FTP server, Serv-U FTP or Bulletproof v2.15 all three of which are extremely reliable , and the norm of the FTP world.
You can download from www.liaokai.com search the above software at here upgrade version available.
Step by Step instruction for G6 FTP server
  • Setup -> General
  • type in your port # (default is 21)(recommend something unique or something a bit larger(ex:3069).This sets the amount of simultaneous maximu users on your sever at once performing actions- the more on at once , the slower the connection ).
  • Then
  • Launch with Windows
  • Activate FTP server on Start up
  • Put into tray on start up
  • Allow multiple instances
  • Show “ Loading….” Status at Start up
  • Scan drives at start up
  • Confirm Exit.
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option.
  • From here, click the ‘options’ text on the left column.
To protect your server, you should check ‘login check’ and ‘password check’, ‘Show relative path (a must!)’, and any other options you feel you’ll need.
  • After doing so, click the ‘advanced’ text in the left column. You should then leave the buffer size on the default (unless of course you know what you’re doing ), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it’s up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much ‘effort’ will go into making your server run smoothly.
  • Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click ‘Log Options’ from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click ‘Screen’ in the top column. You should then check off ‘Log successful logins’, and all of the options in the client directry, except ‘Log directory changes’. After doing so, click ‘Ok’ in the bottom left corner.
You will then have to go into ‘Setup -> User Accounts’ (or ctrl & u). From here, you should click on the right most column, and right click. Choose ‘Add’, and choose the username(s) you would like people to have access to.
  • After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the ‘Home IP’ directory, (if you registered with a static server, check ‘All IP Homes’. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose ‘Add’.
  • From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options ‘Read’, ‘List’, and ‘Subdirs’, unless of course you know what you’re doing . After doing so, make an ‘upload’ folder in the directory, and choose to ‘add’ this folder seperately to the center column. Choose ‘write’, ‘append’, ‘make’, ‘list’, and ‘subdirs’. This will allow them to upload only to specific folders (your upload folder).
  • Now click on ‘Miscellaneous’ from the left column. Choose ‘enable account’, your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you’d like to have. Now click ‘Ok’.
**Requested**
  • From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
    Post your ftp info, like this:
-> 213.10.93.141 (or something else, such as: ‘f*p://example.getmyip.com’)
-> User: *** (The username of the client)
-> Pass: *** (The password)
-> Port: *** (The port number you chose)
So make a FTP and join the FTP section
Listing The Contents Of A Ftp:
  • Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
    1. Put in the IP of the server. Do not put “ftp://” or a “/” because it will not work if you do so.
    2. Put in the port. If the port is the default number, 21, you do not have to enter it.
    3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
    4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
    5. Click “Take the List!”
    6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.
    • If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
    • If you get this error message:
    StatusCode = 550
    LastResponse was : ‘Unable to open local file test-ftp’
    Error = 550 (Unable to open local file test-ftp)
    Error = Unable to open local file test-ftp = 550
    Close and restart FTP Content Maker, then try again.
    Error messages:
    • 110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server’s equivalent marker (note the spaces between markers and “=”).
    • 120 Service ready in nnn minutes
    • 125 Data connection already open; transfer starting.
    • 150 File status okay; about to open data connection.
    • 200 Command okay.
    • 202 Command not implemented, superfluous at this site.
    • 211 System status, or system help reply.
    • 212 Directory status.
    • 213 File status.
    • 214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
    • 215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
    • 220 Service ready for new user.
    • 221 Service closing control connection. Logged out if appropriate.
    • 225 Data connection open; no transfer in progress.
    • 226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
    • 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
    • 230 User logged in, proceed.
    • 250 Requested file action okay, completed.
    • 257 “PATHNAME” created.
    • 331 User name okay, need password.
    • 332 Need account for login.
    • 350 Requested file action pending further information.
    • 421 Too many users logged to the same account
    • 425 Can’t open data connection.
    • 426 Connection closed; transfer aborted.
    • 450 Requested file action not taken. File unavailable (e.g., file busy).
    • 451 Requested action aborted: local error in processing.
    • 452 Requested action not taken. Insufficient storage space in system.
    • 500 Syntax error, command unrecognized. This may include errors such as command line too long.
    • 501 Syntax error in parameters or arguments.
    • 502 Command not implemented.
    • 503 Bad sequence of commands.
    • 504 Command not implemented for that parameter.
    • 530 Not logged in.
    • 532 Need account for storing files.
    • 550 Requested action not taken. File unavailable (e.g., file not found, no access).
    • 551 Requested action aborted: page type unknown.
    • 552 Requested file action aborted. Exceeded storage allocation (for current directory or data set).
    • 553 Requested action not taken. File name not allowed.

    Leave a comment

    >FTP

    >

    More about FTP
    Time and mind needed so keep trying . So first of all , find out if your IP(Internet Protocol) is static (not changing) or dynamic (change every time you log in).To check (do ) first consider the fact if you have a dial up modem. If you do, chances are about 99% out of 100% that your IP is dynamic. To make it static, just go to place like HTTP://WWW.MYFTP.ORG/ to register for a static IP address.
    Then you need to get your IP. This can be
    Going to Start -> Run -> winipcfg or http://www.ask.com and asking ‘What is my IP?
    After doing so, you’ll need to download an FTP server client. I’d recommend G6 FTP server, Serv-U FTP or Bulletproof v2.15 all three of which are extremely reliable , and the norm of the FTP world.
    You can download from www.liaokai.com search the above software at here upgrade version available.
    Step by Step instruction for G6 FTP server
    • Setup -> General
    • type in your port # (default is 21)(recommend something unique or something a bit larger(ex:3069).This sets the amount of simultaneous maximu users on your sever at once performing actions- the more on at once , the slower the connection ).
    • Then
    • Launch with Windows
    • Activate FTP server on Start up
    • Put into tray on start up
    • Allow multiple instances
    • Show “ Loading….” Status at Start up
    • Scan drives at start up
    • Confirm Exit.
    You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option.
    • From here, click the ‘options’ text on the left column.
    To protect your server, you should check ‘login check’ and ‘password check’, ‘Show relative path (a must!)’, and any other options you feel you’ll need.
    • After doing so, click the ‘advanced’ text in the left column. You should then leave the buffer size on the default (unless of course you know what you’re doing ), and then allow the type of ftp you want.
    Uploading and downloading is usually good, but it’s up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much ‘effort’ will go into making your server run smoothly.
    • Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click ‘Log Options’ from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
    But, if you would like to see what is going on with the lowest possible space taken, click ‘Screen’ in the top column. You should then check off ‘Log successful logins’, and all of the options in the client directry, except ‘Log directory changes’. After doing so, click ‘Ok’ in the bottom left corner.
    You will then have to go into ‘Setup -> User Accounts’ (or ctrl & u). From here, you should click on the right most column, and right click. Choose ‘Add’, and choose the username(s) you would like people to have access to.
    • After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the ‘Home IP’ directory, (if you registered with a static server, check ‘All IP Homes’. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose ‘Add’.
    • From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options ‘Read’, ‘List’, and ‘Subdirs’, unless of course you know what you’re doing . After doing so, make an ‘upload’ folder in the directory, and choose to ‘add’ this folder seperately to the center column. Choose ‘write’, ‘append’, ‘make’, ‘list’, and ‘subdirs’. This will allow them to upload only to specific folders (your upload folder).
    • Now click on ‘Miscellaneous’ from the left column. Choose ‘enable account’, your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you’d like to have. Now click ‘Ok’.
    **Requested**
    • From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
      Post your ftp info, like this:
    -> 213.10.93.141 (or something else, such as: ‘f*p://example.getmyip.com’)
    -> User: *** (The username of the client)
    -> Pass: *** (The password)
    -> Port: *** (The port number you chose)
    So make a FTP and join the FTP section
    Listing The Contents Of A Ftp:
    • Listing the content of a FTP is very simple.
    You will need FTP Content Maker, which can be downloaded from here:
    ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
      1. Put in the IP of the server. Do not put “ftp://” or a “/” because it will not work if you do so.
      2. Put in the port. If the port is the default number, 21, you do not have to enter it.
      3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
      4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
      5. Click “Take the List!”
      6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.
      • If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
      • If you get this error message:
      StatusCode = 550
      LastResponse was : ‘Unable to open local file test-ftp’
      Error = 550 (Unable to open local file test-ftp)
      Error = Unable to open local file test-ftp = 550
      Close and restart FTP Content Maker, then try again.
      Error messages:
      • 110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server’s equivalent marker (note the spaces between markers and “=”).
      • 120 Service ready in nnn minutes
      • 125 Data connection already open; transfer starting.
      • 150 File status okay; about to open data connection.
      • 200 Command okay.
      • 202 Command not implemented, superfluous at this site.
      • 211 System status, or system help reply.
      • 212 Directory status.
      • 213 File status.
      • 214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
      • 215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
      • 220 Service ready for new user.
      • 221 Service closing control connection. Logged out if appropriate.
      • 225 Data connection open; no transfer in progress.
      • 226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
      • 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
      • 230 User logged in, proceed.
      • 250 Requested file action okay, completed.
      • 257 “PATHNAME” created.
      • 331 User name okay, need password.
      • 332 Need account for login.
      • 350 Requested file action pending further information.
      • 421 Too many users logged to the same account
      • 425 Can’t open data connection.
      • 426 Connection closed; transfer aborted.
      • 450 Requested file action not taken. File unavailable (e.g., file busy).
      • 451 Requested action aborted: local error in processing.
      • 452 Requested action not taken. Insufficient storage space in system.
      • 500 Syntax error, command unrecognized. This may include errors such as command line too long.
      • 501 Syntax error in parameters or arguments.
      • 502 Command not implemented.
      • 503 Bad sequence of commands.
      • 504 Command not implemented for that parameter.
      • 530 Not logged in.
      • 532 Need account for storing files.
      • 550 Requested action not taken. File unavailable (e.g., file not found, no access).
      • 551 Requested action aborted: page type unknown.
      • 552 Requested file action aborted. Exceeded storage allocation (for current directory or data set).
      • 553 Requested action not taken. File name not allowed.

      Leave a comment

      Internet Fact

      Internet Fact
        An Internet user has access to a wide variety of services like ,Electronic mail,file transfer etc. No one know exactly how many computers are connected to the Internet. It is certain,however, that these number in the millions. No one is in the charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating application on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows is owned by private companies.
        All computers on the Internet communicate with one another using the Transmission control Protocol/Internet Protocol suite,abbreviated to TCP/IP. Computers on the Internet use a Client/server architecture. This means that the remote server machine provides files and services to the user’s local client machine. The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
        Here The Components Of The Internet
      • The World Wide Web (abbreviated as the WEB or WWW) is a system of Internet severs that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the web like (e-mail,FTP,telnet,Usenet news etc).
      • The world wide web has its own protocol Ex : Hyper Text Transfer Protocol, or HTTP. The world wide web provides a single interface for accessing all these protocols. The web is the fastest -growing components of the Internet.
      • The operation of the web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the web,words or graphics may serve as links to other documents,images, video, and sound. links may or may not follow a logical path, as each connection is programmed by the creator of the source document.
      • Producing hypertext for the web is accomplished by creating documents with a language called HyperText Markup language,or HTML. With HTML,tags are placed within the text to accomplish formatting,visual features such as font size, italic and bold, and the creation of hypertext link.
      • The world wide web consists of files called pager of home pages, containing links to documents and resources throughout the internet.
      • The web provides a vast array of experiences including multimedia presentations,real time collaboration,interactive pages, radio and television broadcasts, and the automatic “push” of information to a client computer.
      • Programming languages such as Java,JavaScript,Visual Basic,Cold Fusion And XML are extending the capabilities of the web. A growing amount of information on the web is sever dynamically form content stored in database. The web is therefore not a fixed entity. But one that is in a constant state of development and flux.
      • E-MAIL
      • Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
      • A powerful aspect of e-mail is the option to send electronic files to a person’s e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
      • TELNET
      • Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (LOCIS.LOC.GOV) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
      • Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
      • With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
      • FTP
      • FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
      • If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
      • FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as Ftp Find, located at /HTTP://WWW.FTPFIND.COM/. This option is easiest because you do not need to know FTP program commands.
      • E-MAIL DISCUSSION GROUPS
      • One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
      • A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /HTTP://TILE.NET/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
      • Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
      • USENET NEWS
      • Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
      • Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
      • There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
      • The Usenet news feed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
      • FAQ, RFC, FYI
      • FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at HTTP://WWW.FAQS.ORG/.
      • RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.
      • FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.
      • Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.
      • CHAT & INSTANT MESSENGING
      • Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the “chat room” to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.
      • Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.
      • A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online’s Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.
      • Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.
      • MUD/MUSH/MOO/MUCK/DUM/MUSE
      • MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

      Leave a comment

      >Internet Fact

      >

      Internet Fact
        An Internet user has access to a wide variety of services like ,Electronic mail,file transfer etc. No one know exactly how many computers are connected to the Internet. It is certain,however, that these number in the millions. No one is in the charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating application on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows is owned by private companies.
        All computers on the Internet communicate with one another using the Transmission control Protocol/Internet Protocol suite,abbreviated to TCP/IP. Computers on the Internet use a Client/server architecture. This means that the remote server machine provides files and services to the user’s local client machine. The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
        Here The Components Of The Internet
      • The World Wide Web (abbreviated as the WEB or WWW) is a system of Internet severs that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the web like (e-mail,FTP,telnet,Usenet news etc).
      • The world wide web has its own protocol Ex : Hyper Text Transfer Protocol, or HTTP. The world wide web provides a single interface for accessing all these protocols. The web is the fastest -growing components of the Internet.
      • The operation of the web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the web,words or graphics may serve as links to other documents,images, video, and sound. links may or may not follow a logical path, as each connection is programmed by the creator of the source document.
      • Producing hypertext for the web is accomplished by creating documents with a language called HyperText Markup language,or HTML. With HTML,tags are placed within the text to accomplish formatting,visual features such as font size, italic and bold, and the creation of hypertext link.
      • The world wide web consists of files called pager of home pages, containing links to documents and resources throughout the internet.
      • The web provides a vast array of experiences including multimedia presentations,real time collaboration,interactive pages, radio and television broadcasts, and the automatic “push” of information to a client computer.
      • Programming languages such as Java,JavaScript,Visual Basic,Cold Fusion And XML are extending the capabilities of the web. A growing amount of information on the web is sever dynamically form content stored in database. The web is therefore not a fixed entity. But one that is in a constant state of development and flux.
      • E-MAIL
      • Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
      • A powerful aspect of e-mail is the option to send electronic files to a person’s e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
      • TELNET
      • Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (LOCIS.LOC.GOV) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
      • Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
      • With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
      • FTP
      • FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
      • If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
      • FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as Ftp Find, located at /HTTP://WWW.FTPFIND.COM/. This option is easiest because you do not need to know FTP program commands.
      • E-MAIL DISCUSSION GROUPS
      • One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
      • A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /HTTP://TILE.NET/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
      • Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
      • USENET NEWS
      • Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
      • Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
      • There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
      • The Usenet news feed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
      • FAQ, RFC, FYI
      • FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at HTTP://WWW.FAQS.ORG/.
      • RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.
      • FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.
      • Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.
      • CHAT & INSTANT MESSENGING
      • Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the “chat room” to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.
      • Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.
      • A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online’s Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.
      • Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.
      • MUD/MUSH/MOO/MUCK/DUM/MUSE
      • MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

      Leave a comment