When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of FTP commands - Wikipedia

    en.wikipedia.org/wiki/List_of_FTP_commands

    Enter long passive mode. MDTM RFC 3659 Return the last-modified time of a specified file. MFCT The 'MFMT', 'MFCT', and 'MFF' Command Extensions for FTP: Modify the creation time of a file. MFF The 'MFMT', 'MFCT', and 'MFF' Command Extensions for FTP: Modify fact (the last modification time, creation time, UNIX group/owner/mode of a file). MFMT

  3. File Transfer Protocol - Wikipedia

    en.wikipedia.org/wiki/File_Transfer_Protocol

    Illustration of starting a passive connection using port 21. FTP may run in active or passive mode, which determines how the data connection is established. [9] (This sense of "mode" is different from that of the MODE command in the FTP protocol.) In active mode, the client starts listening for incoming data connections from the server on port M.

  4. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    As promiscuous mode can be used in a malicious way to capture private data in transit on a network, computer security professionals might be interested in detecting network devices that are in promiscuous mode. In promiscuous mode, some software might send responses to frames even though they were addressed to another machine.

  5. Wikipedia:Reference desk/Archives/Computing/2008 December 9

    en.wikipedia.org/wiki/Wikipedia:Reference_desk/...

    1.1 FTP Passive Mode behind NAT. 4 comments. 1.2 Defeating Rhapsody. 11 comments. 1.3 sending big files. 4 comments. 1.4 Website. 10 comments. 1.5 Need to automate ...

  6. List of FTP server return codes - Wikipedia

    en.wikipedia.org/wiki/List_of_FTP_server_return...

    FTP server return codes always have three digits, and each digit has a special meaning. [1] The first digit denotes whether the response is good, bad or incomplete: Range

  7. Comparison of file transfer protocols - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_file...

    Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command port", at which they receive commands from the client. Similarly, the encryption scheme indicated in the "Encryption" column applies to transmitted data only, and not to the authentication system.

  8. FTPS - Wikipedia

    en.wikipedia.org/wiki/FTPS

    Two separate methods were developed to invoke client security for use with FTP clients: Implicit and Explicit.While the implicit method requires that a Transport Layer Security is established from the beginning of the connection, which in turn breaks the compatibility with non-FTPS-aware clients and servers, the explicit method uses standard FTP protocol commands and replies in order to ...

  9. CrushFTP Server - Wikipedia

    en.wikipedia.org/wiki/CrushFTP_Server

    Initial versions were FTP only. There were no connection restrictions in version 1.x. CrushFTP 2.x brought about virtual directories in a sense, while CrushFTP 3.x [3] brought about a full virtual file system. It supported the ability to merge and mangle several file systems together regardless if they were from local folders, or another FTP site.