When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of FTP server return codes - Wikipedia

    en.wikipedia.org/wiki/List_of_FTP_server_return...

    Failed security check. 536: Data protection level not supported by security mechanism. 537: Command protection level not supported by security mechanism. 550: Requested action not taken. File unavailable (e.g., file not found, no access). 551: Requested action aborted. Page type unknown. 552: Requested file action aborted.

  3. List of FTP commands - Wikipedia

    en.wikipedia.org/wiki/List_of_FTP_commands

    Enter long passive mode. MDTM RFC 3659 Return the last-modified time of a specified file. MFCT The 'MFMT', 'MFCT', and 'MFF' Command Extensions for FTP: Modify the creation time of a file. MFF The 'MFMT', 'MFCT', and 'MFF' Command Extensions for FTP: Modify fact (the last modification time, creation time, UNIX group/owner/mode of a file). MFMT

  4. File Transfer Protocol - Wikipedia

    en.wikipedia.org/wiki/File_Transfer_Protocol

    Illustration of starting a passive connection using port 21. FTP may run in active or passive mode, which determines how the data connection is established. [9] (This sense of "mode" is different from that of the MODE command in the FTP protocol.) In active mode, the client starts listening for incoming data connections from the server on port M.

  5. File eXchange Protocol - Wikipedia

    en.wikipedia.org/wiki/File_eXchange_Protocol

    File eXchange Protocol (FXP or FXSP) is a method of data transfer which uses FTP to transfer data from one remote server to another (inter-server) without routing this data through the client's connection.

  6. FTPS - Wikipedia

    en.wikipedia.org/wiki/FTPS

    Two separate methods were developed to invoke client security for use with FTP clients: Implicit and Explicit.While the implicit method requires that a Transport Layer Security is established from the beginning of the connection, which in turn breaks the compatibility with non-FTPS-aware clients and servers, the explicit method uses standard FTP protocol commands and replies in order to ...

  7. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    In non-promiscuous mode, when a NIC receives a frame, it drops it unless the frame is addressed to that NIC's MAC address or is a broadcast or multicast addressed frame. In promiscuous mode, however, the NIC allows all frames through, thus allowing the computer to read frames intended for other machines or network devices.

  8. USS Pillsbury (DD-227) - Wikipedia

    en.wikipedia.org/wiki/USS_Pillsbury_(DD-227)

    USS Pillsbury (DD-227) was a Clemson-class destroyer of the United States Navy that served during World War II and the first of two ships named after John E ...

  9. Order No. 227 - Wikipedia

    en.wikipedia.org/wiki/Order_No._227

    Order No. 227 (Russian: Приказ № 227, romanized: Prikaz No. 227) was an order issued on 28 July 1942 by Joseph Stalin, who was acting as the People's Commissar of Defence. It is known for its line "Not a step back!" (Ни шагу назад!, Ni shagu nazad!), [1] which became the primary slogan of the Soviet press in summer 1942. [2]