What is FTP?
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet.
Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP(Transmission Control Protocol)/IP protocols.
Very briefly, FTP (File Transfer Protocol) is used to transfer programs or other information from one computer to another.
This simple tool will let you do many things: download software, upload your own web pages, transfer information between your home and work machines, and more.
FTP uses the port no 21 on your computer.
What is Anonymous FTP???
Anonymous FTP is used to download software from computers where you do not have your personal account.
If you are accessing internet from a local service provider, you may use anonymous FTP to get recommended software, help files, or other handy information.
Publicly available files are easily accessed using anonymous FTP.
Uses of FTP:
As a user, you can use FTP with a simple command line interface (for example, from the Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user interface.
Your Web browser can also make FTP requests to download programs you select from a Web page.
For example, If you've ever clicked on a link to download the newest version of your favorite web browser, then you may have already used anonymous FTP.
Downloading files with your web browser is certainly the easiest way to use FTP, although it does have its limitations.
When do you need a Separate FTP??
You need a seperate program for FTP, if you want to download all the files in a given directory. A good FTP client makes this much easier.
You will also need it for uploading and downloading files from your personal directory( while making your own webpage).
How does it help hackers??
Hackers can create their own FTP accounts to log the information of their victims secretly.
Remote installation keyloggers are the best example for this. The data stolen by the keyloggers will be sent to the hacker via FTP and email. FTP can carry large amount of data too.
About the author: This is a guest post by ANUSHA MANNE who is interested in new technologies and wants to share knowledge with my blog readers. Usually writes articles related to latest technologies at Techie Talk
Hope you liked it. If you have any doubts or suggestions, leave a comment.
No comments:
Post a Comment