Toshibasupport

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 20 September 2010

HOW TO TRANSFER A FILE

Posted on 21:00 by Unknown
File Transfer Protocol
Transfer Protocol service (known as FTP in short) enables an Internet user to move a file from one computer another on the Internet. A file may contain any type of digital information - text document, image, artwork, sound, software, etc. Moving a file from a remote computer to ones own computer is known as downloading  the file, and moving a file from ones own computer to a remote computer is known as uploading the
Using FTP service, a file transfer takes place in following manner

1.A user executes the ftp Command on his/her local computer* specifying address of the remote
computer as a parameter
2.An FTP process running on user's computer (called FTP client process) establishes a connection with an FTP process running on remote computer (called FTP server process).
3.The system then asks the user to enter his/her login name and password on the remote computer to
ensure that the user is authorized to access the remote computer.
4.After successful login, desired file(s) are downloaded or uploaded by using get (for downloading) and put (for uploading) commands. User can also list directories, or move between directories of the remote computer, before deciding which file(s) to transfer

Notice that a user needs access rights for a remote computer to transfer files to/from it; With this almost impossible to provide access rights to the vast number of users on the Internet to a computer that' sharable information. The concept of anonymous FtP site is used to overcome this problem. An anon) site is a computer allowing a user to log in with a username of anonymous and a password that is user’s address. The user can then download files that have been stored on it for sharing. Such sites are called publicly accessible sites because any user on the Internet can access them..

Of  course. FTP service is also used for more secure file transfer operations'. In such cases, a user needs username and  password to access a particular computer. This is common; for example, for organizations to let only certain people access their computer
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Data Protection | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finest Way to Repair Windows Registry
    Comprehensive Manual on How to Repair Windows Registry One of the worst things that can happen to you when you are trying to use a computer ...
  • Make Faster And Faster Your PC Windows
    Fed up with your time-consuming PC-startup times? Well, previously in  my blog  i have review about  startup blaster , a software which can ...
  • How To Select A Good Domain Name
    If you already have a busy website and you like your domain there's no need to change it but as soon as you set up a new website or if y...
  • Samsung RF510-S01 Review
    Samsung RF510-S01 , They've energy and performance? Your laptop is here. Availability Samsung RF510. This is a 15.6-inch HD (1366 x 768)...
  • What Is PayPal?
    PayPal  www.paypal.com PayPal, a subsidiary of eBay, is the most popular online payment service - operating in over 190 markets. Unfortunate...
  • Top 8 Tips To Increase YOur Web Traffic From Yahoo
    Here I am writing 8 short, easiest and interesting tips for increasing your web traffic at once 1) Selecting your domain name is the most vi...
  • Hp 4520s Review
    The HP ProBook 4520s is in actuality only a little and method institution laptop computer that replaces the more mature 4510s from last year...
  • Get 100% Free keywords Suggestion Tools
    Keywords are simply the words that people use when they search the Web and keyword research and selection is essential in any online marketi...
  • Toshiba Support
    It was heavily raining that morning when I gave birth to my little baby girl who is 2 years now. I still remember that morning fondly, first...
  • Using BuddyPress plugins How To Forum Attach?
    A few people have asked recently for a list of the plugins installed on the  CUNY Academic Commons . In the spirit of  Joe’s post , here I t...

Categories

  • About Computer
  • About Internet
  • Antivirus
  • AVG Internet Security
  • Data Protection
  • E-mail service
  • Firewall protection guides
  • Forum Attachment
  • Free Web Hosting
  • Get Free Software
  • Health and Safety Issues in Use of Digital Media
  • Hy Phy
  • Identity Protection
  • Information Technology
  • Internet Elements
  • Internet Safety Guides
  • Internet Tips And Tricks
  • Keyloggers
  • Make Money From Website
  • Messenger
  • Mobile
  • Mommy Blogs.
  • News
  • Online Children Protection
  • Password Security Guide
  • PC Hacking
  • Promote your web/blog
  • Protect Your PC
  • Search Engine
  • Server Security
  • Software
  • Technical Information
  • Tips For More Traffic
  • USB Protection
  • Windows Protection

Blog Archive

  • ►  2012 (2)
    • ►  September (2)
  • ▼  2010 (410)
    • ►  December (10)
    • ►  October (23)
    • ▼  September (377)
      • 6 Dollar Paypal Money Method, As seen on Oprah and...
      • Your Business Website
      • How To Select A Good Domain Name
      • Bloger For Students Earning
      • Get Tips For Search Engine Optimization Guideline
      • 100 Tips To Get Traffic For Free
      • Get 6 Tips To Increase Your Web Traffic
      • Generate Free Internet Traffic On Your Blog
      • Get 3 Important Ways For More Traffic
      • Top 10 Ways To Get More Traffic
      • Top 25 Tips To Speed Up Your Windows XP
      • 10 Tips Online Security
      • Top 12 Tips To Make Your PC Virus Free
      • Make A Password Protected Folder
      • Anti Virus Security Guidelines
      • 9 Steps TO Run FIreFox Correctly
      • Top 7 Tips To Start Internet Explorer Correctly
      • Top 6 Tips For Firewall Security
      • Top 7 For Internet Explorer Security
      • Browser troublemaking Security Guidelines
      • Why Web Link Is Not Working Inside The E-mail?
      • My file is too large to be sent over email.
      • You receive an error when opening messages or send...
      • An attachment you received has been blocked.
      • What is server error on sending e-mail
      • E-mail Security Guidelines
      • Internet Connection Security Guides
      • Two Firewalls Can Work At Once
      • Here is some firewall installation tips that makes...
      • How To Turn On You Firewall
      • Firewall Security guideline
      • How RAM work well?
      • RAM Protection Guideline
      • New Types of RAMs
      • RAM Is Not Working
      • Protection Of RAM
      • Why PC Show Errors On Heavy Workload?
      • 6 Steps To Protect You PC From Virus
      • Protect your PC With Spyware
      • 4 Tips To Protect Your PC
      • 4 Steps To Increase Your Online Security
      • 3 Important Hotmail Security Features
      • 4 Ways That How Spammer Find Your E-mail Address
      • 6 Steps To Save Your E-mail Address From Spammers
      • Important Guideline For Firewall Optimization
      • Top 10 Tips To Protect Your Online Network
      • Three Steps To Speed Up Your Computer
      • Top 10 Tips To Protect Your PC Online
      • Internet Security Guidelines
      • Get Suggestion For Writing An Article
      • Get 100% Free Tips To Publish Tour Article
      • Secret Of Writing An Article For You Blog/Web
      • Get Some Important Tips About WordPress Blogroll G...
      • Get 26 Tips For More Traffic
      • Tips To Increase Your Web/blog Traffic
      • Top 8 Tips To Increase YOur Web Traffic From Yahoo
      • Learn how to setting up on a chair correctly
      • What should be light conditions while using computer
      • How To Watch At Your PC Monitor
      • How to protect your Health while using computer
      • In Which Position We Should Use Computer
      • Some Important Precusiones While Working On Computer
      • Install Windows Gadgets
      • Important Keyfinder For Windows Product Keys
      • A Useful Tip To Upgrade windows 98
      • Get Top 11 Windows 98 Product Key Code 100% Free
      • Descriptions Of Magical Jelly Bean Keyfinder v2.0.8
      • Get Tips To Find The Windows Administration Password
      • Change your windows password
      • Get Top 6 Free Windows Password Recovery Tools 100...
      • Get Top 11 c r a c k i n g t o o l s 100% free
      • Get Top 10 Password Crackers
      • Put Your Desired Size To Recycle bin
      • Get Tips For How To Quick Format Vs Default Format?
      • Turn On Your Num Lock Forever
      • Learn How To Hid An Icon
      • Run The Systeminfo Utility In Windows XP
      • Control All The Open Windows By Keyboard Shortcut ...
      • Save The energy Of Your Computer
      • Select Different Sounds For Different Windows Events
      • Change Icon Spacing In Windows XP
      • Start windows programs quickly with Run Command
      • A Trick To Change The Name Of Recycle Bin
      • Put Away Undesired Users From Shown Down Key
      • Put An Image On The Folder
      • Get Windows Vista Shortcut keys For 100% Free
      • Get Your Lost Files In Computer Without Using Any ...
      • Put Shortcut Keys To Your Internet Connection
      • How to Print a document faster and faster
      • If You Are Ready for SP2 Than Your PC Will Be Safe
      • Add www And .com Automatically To Your Address Bro...
      • What Are The Requirements To Install Windows Vista
      • Word Processing Software
      • What is APPLICATION SOFTWARE?
      • Picture Yourself Using Software
      • Taking a look at chutti.pk, Pakistan's first onlin...
      • What is Plimus and 2Checkout?
      • What Is AlertPay?
      • What Is Moneybookers?
      • What Is Payoneer?
Powered by Blogger.

About Me

Unknown
View my complete profile