DEVELOPMENT OF A SECURE FILE TRANSFER PROTOCOL FOR AN ENTERPRISE AND CAMPUS NETWORK
|
|
- Merilyn Cobb
- 8 years ago
- Views:
Transcription
1 ADVANCES IN SCIENTIFIC AND TECHNOLOGICAL RESEARCH (ASTR) VOL. 1(2), pp , MAY 2014 REF NUMBER: ONLINE: Full Length Research DEVELOPMENT OF A SECURE FILE TRANSFER PROTOCOL FOR AN ENTERPRISE AND Akingbade Kayode Francis 1 and Adekanbi Gregory 2 1,2 Department of Electrical & Electronics Engineering The Federal University of Technology, Akure, Ondo State, Nigeria. Accepted: 23 MAY, ABSTRACT his paper presents a user friendly Secure File Transfer Protocol (SFTP) client application T that can be deployed in small or large scale enterprises or in a campus network for secure, reliable and efficient upload or retrieval of file from a remote destination server. The platform gives restricted access to users on the network and gives administrators full access to the server after being authenticated. The developed SFTP Client Application has functionalities and capabilities for executing various SFTP commands and related functions. The SFTP Client application is developed using C-Sharp programming language and Secure Shell (SSH) protocol to create secure channel between networked devices. The application has enhanced ability to connect securely to the central server. The proposed application can be deployed on different operating system and is cost effective. KEYWORDS: FTP, SFTP, TCP/IP, SSH, Server, Client *Corresponding Author. kfakingbade@futa.edu.ng T
2 INTRODUCTION The main activities that people use the Internet for is file transfer. This includes but not limited to data, music, video, software download and upload. Day in day out, Internet users download files from various websites and Webmasters upload files and web pages to their website. The File Transfer Protocol (FTP) is the most common technique for file transfer over the Internet. FTP is a standard network protocol used to transfer files reliably from one host to another over a Transmission Control Protocol/ Internet Protocol (TCP/IP) based network. [1].The FTP runs on the upper layers of the OSI model and uses the Transport Control Protocol (TCP) to transport the transferred files. The TCP is a connection-oriented protocol that resides at layer 4 of the OSI Model. It provides extensive error control and flow control to ensure that data is delivered successfully [2]. For file transfer to be successful via FTP, a client software/application needs to be in place, connected to a server application which listens to commands from the client. This client application is expected to run on individual computer which will be connected to the server via networks, be it Internet or Intranet [3,4,5]. The server is identified by a text name or an IP address. The remote user logs into the FTP server using a login name and password, which the server then authenticates. The legacy FTP protocol authentication details could be compromised through password sniffing attacks as it is being transmitted in plain text format. To address this problem, Secure File Transfer Protocol (SFTP) could be employed [6]. SECURE FILE TRANSFER PROTOCOL SFTP is an interactive file transfer protocol which performs all operations over the SSH transport layer and use for transferring files securely over the Internet. SFTP is a completely distinct file transfer protocol that is built on the Secure Shell (SSH) Protocol. This enables SFTP to provide secure and efficient file transfer over an SSH encrypted pipe or tunnel. This technology requires connection to a remote SSH/SFTP server on port 22 and also to perform a secure SSH v2 handshake with the remote server. Therefore, unlike the legacy FTP any other future communications would take place through the existing encrypted tunnel and there would be no need for establishment of new connections [7]. The major different between standard FTP and SFTP is that FTP is built on client-server architecture and utilizes separate control and data channels between the client and server. The use of different channels generates security issues because client and server would have no guarantee that there is not a man-in-themiddle attack after data connection has been established [7]. On the other hand, what SFTP does is to carry out the entire conversation over a single secured channel so that there will be assurance that there is no data hijack. In [6], security benefits of SSH protocol such as authentication, data encryption, and data integrity are explained. Also, explanation on how 128-bit encryption is used to send and receive data during a session to make transmission interception extremely difficult to decrypt is highlighted. METHODOLOGY This section aims at discussing the procedures used in the development of Client software using CSharp programming language. CSharp was designed for developing components in a fully object-oriented manner as part of the Microsoft.NET initiative. The codes are written and complied with Microsoft Visual Studio. Page 2 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
3 DESIGN OF THE FILE TRANSFER APPLICATION The design of the application entails the graphical arrangements of the events and tools on the interface which includes the buttons, the textboxes, combo boxes and list views as shown in fig.1 to fig.4. Figure 1: Button Figure 2: List View Figure 3: Label Page 3 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
4 Figure 4: Combo Box ALGORITHM This involves appropriate planning and structuring of the system architecture. Operation of the software is considered at this stage of development. Fig. 5 and fig. 6 depict the application architecture and algorithm respectively. Figure 5: Application Architecture Page 4 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
5 Figure 6: Application Algorithm/Flow Chart SERVER SIDE The server is the central point of the entire system. The planning for the server entails the software and the hardware planning. It is ensured that the server computer has enough processor speed and Random Access Memory (RAM) for efficiency in serving multiple clients at the same time. In this study, the server-side comprises the FILEZILLA server which helps to connect all users together. The FileZilla Server is a server that supports FTP and secures encrypted connections to the server. FileZilla supports SSL, the same level of encryption supported by the web browser, to protect data. It also supports on-the-fly data compression, which can improve the transfer rates. The major operation of the server is to authenticate users. Fig. 7 shows Filezilla activity log. Page 5 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
6 Figure 7: Filezilla activity log SOFTWARE DEVELOPMENT The Microsoft Visual Studio 2010 was the development tool used in writing the program for the file transfer software. The coding language used is CSharp.NET. This is one of the coding languages usable on the Visual Studio.NET platform. The Visual Studio is an interactive tool with a very user friendly coding interface. It has design and coding views to allow the programmer see the graphic interface as the code is being typed. The Visual Studio has debugging capabilities to check errors in written code and to ensure that the developed software does not unexpectedly crash. Fig. 8 illustrates Visual Studio Interface. Figure 8: Visual Studio Interface Page 6 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
7 WRITING CODES FOR THE SOFTWARE The C-sharp codes that power the application are written in Visual Studio Code Line Interface (CLI). The controls on the interface are controlled by the codes in the code-behind files. The software is coded using C- sharp object oriented classes and events as illustrated with the picture view in fig. 9. CODES Figure 9: Command Line Interface of Visual Studio The codes are divided into two, the design codes and the source codes. The Codes namespaceftp_project { partial class Form1 { /// <summary> /// Required designer variable. /// </summary> privatesystem.componentmodel.icontainer components = null; /// <summary> /// Clean up any resources being used. /// </summary> /// <param name="disposing">true if managed resources should be disposed; otherwise, false.</param> protected override void Dispose(bool disposing) { if (disposing && (components!= null)) { components.dispose(); } Page 7 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
8 base.dispose(disposing); } #region Windows Form Designer generated code /// <summary> /// Required method for Designer support - do not modify /// the contents of this method with the code editor. /// </summary> private void InitializeComponent() { this.components = new System.ComponentModel.Container(); System.ComponentModel.ComponentResourceManager resources = new System.ComponentModel.ComponentResourceManager(typeof(Form1)); this.tb_username = new System.Windows.Forms.TextBox(); this.tb_password = new System.Windows.Forms.TextBox(); this.label1 = new System.Windows.Forms.Label(); this.label2 = new System.Windows.Forms.Label(); this.btn_connect = new System.Windows.Forms.Button(); this.menustrip1 = new System.Windows.Forms.MenuStrip(); this.filetoolstripmenuitem = new System.Windows.Forms.ToolStripMenuItem(); this.edittoolstripmenuitem = new System.Windows.Forms.ToolStripMenuItem(); this.viewtoolstripmenuitem = new System.Windows.Forms.ToolStripMenuItem(); this.abouttoolstripmenuitem = new System.Windows.Forms.ToolStripMenuItem(); this.helptoolstripmenuitem = new System.Windows.Forms.ToolStripMenuItem(); this.splitcontainer1 = new System.Windows.Forms.SplitContainer(); this.combobox_local = new System.Windows.Forms.ComboBox(); this.toolstrip1 = new System.Windows.Forms.ToolStrip(); this.toolstripbtn_back = new System.Windows.Forms.ToolStripButton(); this.toolstripbtn_next = new System.Windows.Forms.ToolStripButton(); this.toolstripbutton4 = new System.Windows.Forms.ToolStripButton(); this.toolstripbtn_local_delete = new System.Windows.Forms.ToolStripButton(); this.listview_local = new System.Windows.Forms.ListView(); this.columnheader1 = ((System.Windows.Forms.ColumnHeader)(new this.columnheader2 = ((System.Windows.Forms.ColumnHeader)(new this.columnheader3 = ((System.Windows.Forms.ColumnHeader)(new this.columnheader4 = ((System.Windows.Forms.ColumnHeader)(new this.btn_download = new System.Windows.Forms.Button(); this.btn_upload = new System.Windows.Forms.Button(); this.combobox_server = new System.Windows.Forms.ComboBox(); this.listview_server = new System.Windows.Forms.ListView(); this.columnheader5 = ((System.Windows.Forms.ColumnHeader)(new Page 8 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
9 this.columnheader6 = ((System.Windows.Forms.ColumnHeader)(new this.columnheader7 = ((System.Windows.Forms.ColumnHeader)(new this.columnheader8 = ((System.Windows.Forms.ColumnHeader)(new this.toolstrip2 = new System.Windows.Forms.ToolStrip(); this.toolstripbtn_server_back = new System.Windows.Forms.ToolStripButton(); this.toolstripbtn_server_nxt = new System.Windows.Forms.ToolStripButton(); this.toolstripbtn_server_refresh = new System.Windows.Forms.ToolStripButton(); this.toolstripbtn_server_delete = new System.Windows.Forms.ToolStripButton(); this.make_directory = new System.Windows.Forms.ToolStripButton(); this.imagelist1 = new System.Windows.Forms.ImageList(this.components); this.tb_statusmsg = new System.Windows.Forms.TextBox(); this.groupbox1 = new System.Windows.Forms.GroupBox(); this.label_status = new System.Windows.Forms.Label(); this.progressbar_ftp = new System.Windows.Forms.ProgressBar(); this.button1 = new System.Windows.Forms.Button(); this.label3 = new System.Windows.Forms.Label(); this.groupbox2 = new System.Windows.Forms.GroupBox(); this.lb_online = new System.Windows.Forms.ListView(); this.label4 = new System.Windows.Forms.Label(); this.textbox3 = new System.Windows.Forms.TextBox(); this.tooltip1 = new System.Windows.Forms.ToolTip(this.components); this.menustrip1.suspendlayout(); ((System.ComponentModel.ISupportInitialize)(this.splitContainer1)).BeginInit(); this.splitcontainer1.panel1.suspendlayout(); this.splitcontainer1.panel2.suspendlayout(); this.splitcontainer1.suspendlayout(); this.toolstrip1.suspendlayout(); this.toolstrip2.suspendlayout(); this.groupbox1.suspendlayout(); this.groupbox2.suspendlayout(); this.suspendlayout(); DEBUGGING Debugging of codes is done after writing the software code. The Visual Studio 2010 debugger is used to check for errors in the code and the generated errors are located and resolved, indicated in fig.10. The software has to be error free for proper operation and to prevent periodic crashing of the application. Page 9 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
10 DEPLOYMENT OF THE SOFTWARE Figure 10: Error list on Visual Studio The installation package was built using the Click Once deployment feature of the Visual Studio This package contains the prerequisites as well as the installation files for the software to be installed on the destination PC. The two major prerequisites required for the installation of the software are Microsoft.NET Framework 4 Client Profile (x86 and x64) and Windows Installer 3.1. TESTS, RESULTS AND ANALYSIS CONNECTIVITY TEST The server is properly integrated into the network so that all users connected to the network would be able to have duplex communication with the server. To ensure and confirm effective connection, the IP address of the server is pinged from clients connected to the network and also from the server; IP addresses of clients are pinged. It is observed that there are replies from both side of the link that confirm connection to the other side of the network. Fig. 11 shows result of the ping at the client side while Fig. 12 shows result of the ping at the server side. Page 10 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
11 Figure 11: Pinging the server to ensure connection AUTHENTICATION TEST Figure 12: Filezilla Server Interface There is a login option in which users are required to login if they have an account on the server and an option is provided for anonymous login for users not having account, these users have restricted access. Login cannot be successful if wrong username or password is entered, a dialog box is shown with the error message Username or Password incorrect, Please check and try again. Fig. 13 shows an authentication Error Dialog Box. Once the right username and password is entered, access is granted and the server drive is populated in the list box. Page 11 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
12 Figure 13: Authentication Error Dialog Box UPLOAD AND DOWNLOAD TESTS Before the upload / download can be successful, a file needs to be selected on the local / server drive panel, after which the upload or download button can be clicked; this copies the selected file on the active directory in the server /local drive panel as the case may be. The file transfer status is as shown in fig. 14. With the help of SSH, during an SFTP session where data needs to be transferred between the client and server, the client will just sends an OPEN command to the server along with the name of the file to be transferred. After the file has been transferred, using the existing connection the client will send a CLOSE command to the server. Since the entire file transfer was completed over an existing secure channel, both client and server can be assured that there is no man-in-the-middle attack. Figure 14: Upload and Download Notification Page 12 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
13 CONCLUSION In this paper, a user friendly Secure File Transfer Protocol (SFTP) client application that can be deployed in medium or large scale enterprises or in a campus network for secure, reliable and efficient upload or retrieve file from remote destination server is presented. The SFTP Client application is developed using C-Sharp programming language on Secure Shell (SSH) protocol to create secure channel between networked devices. The application has enhanced ability to connect securely to the central server and this can be deployed on different operating system platform and is cost effective. REFERENCES [1] Forouzan BA TCP/IP; Protocol suite. 1 st Edition, New Delhi, India, Tata Mcgraw-Hill publishing company limited. [2]Clark MP (2003). Data Networks IP and the Internet. 1st ed. West Sussex, England: John Wiley & Sons Ltd. [3] 2006 South River Technologies FTP The File Transfer Protocol [4] Rakheja MG. Performance analysis of ANESAT Protocol for FTP,FTP generic, VBR and CBR over SatelliteCommunication.International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. Vol. 1, Issue 5, November pp [5] Dean, Tamara (2010). Network+ Guide to Networks.Delmar. pp [6] Krishna M, Jamwal P, Chaitanya KRS, Kumar BV. Secure File Multi Transfer Protocol DesignJournal of Software Engineering and Applications, 2011, 4, pp [7]2010 South River Technologies SFTP: The Secure File Transfer Protocol [8] Alizar B, Gabhane P, Gampawar V and Naraswani A File Transfer Protocol Client: By Using Multithreading. BIOINFO Computer Engineering.Volume 2, Issue 1, 2012, pp Page 13 ENTERPRISE AND By Akingbade Kayode Francis 1 and Adekanbi Gregory 2
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationDSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
More information1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationSecure File Multi Transfer Protocol Design
Journal of Software Engineering and Applications, 2011, 4, 311-315 doi:10.4236/jsea.2011.45034 Published Online May 2011 (http://www.scirp.org/journal/jsea) 311 Murali Krishna, Pradeep Jamwal, K. S. R.
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationMy FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationWWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP Table OF Contents WWA FTP AND SFTP CONNECTION GUIDE... 3 What is FTP:... 3 What is SFTP:... 3 Connection to WWA VIA FTP:... 4 FTP
More informationSecuring Ship-to-Shore Data Flow
Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationDirectory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationTELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationSysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationEasy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationII. Implementation and Service Information
II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationConnecting to the School of Computing Servers and Transferring Files
Connecting to the School of Computing Servers and Transferring Files Connecting This document will provide instructions on how to connect to the School of Computing s server. Connect Using a Mac or Linux
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationUnderstanding Secure Shell Host Keys
Understanding Secure Shell Host Keys White Paper 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Understanding Host Keys Think about the last time you faxed personal
More informationUser Guide. WS_FTP Server
WS_FTP Server Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?... 1 System requirements for WS_FTP Server... 2 WS_FTP Server... 2 Ipswitch Notification Server... 4 WS_FTP Server Manager...
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More information1 Documentation Accessibility
Oracle Database Client Quick Installation Guide 10g Release 1 (10.1.0.2.0) for Windows Part No. B13691-01 March 2004 This guide describes how to quickly install Oracle Database Client on Windows systems.
More informationWritten by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4
Increasing Network Security Introduction Network and data security has been a growing concern in many organizations. With the emergence of wireless networking, security preemptives have been primarily
More informationEvolution from FTP to Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationWS_FTP Server. User Guide
WS_FTP Server User Guide Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?...1 System requirements for WS_FTP Server...1 How FTP works...3 How SSH works...3 Activating WS_FTP Server for
More informationSystems Programming & Scripting
Systems Programming & Scripting Lecture 6: C# GUI Development Systems Prog. & Script. - Heriot Watt Univ 1 Blank Form Systems Prog. & Script. - Heriot Watt Univ 2 First Form Code using System; using System.Drawing;
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationSecuring Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by DrNathan@teamhackaday.com If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
More informationInstructions for Setup and Connecting to Department of Education Secure FTP(SFTP) server January 23, 2013
Instructions for Setup and Connecting to Department of Education Secure FTP(SFTP) server January 23, 2013 Download the Filezilla program at: http://sourceforge.net/projects/filezilla/files/filezilla_client/3.5.1/filezilla_3.5.1_win32-
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
More informationSecurity Solutions for HIPAA Compliance Issues 1
:6B)73 6HFXULW\6ROXWLRQVIRU +,3$$&RPSOLDQFH +RZ:6B)73&DQ+HOS +,3$$7KH+HDOWK,QVXUDQFH3RUWDELOLW\DQG $FFRXQWDELOLW\$FWRIZDVHQDFWHGWR HVWDEOLVKJXLGHOLQHVZLWKLQWKHKHDOWKFDUHLQGXVWU\ WRHQVXUHWKHSULYDF\RISDWLHQWVDQGWKHSK\VLFDO
More informationUpgrade your Software
Video server software From time to time software upgrades are issued for the video servers. These are posted on our website www.ad-networkvideo.com or on the product CD and consist of two parts, the application
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationUsing the ECM VPN with Windows 7
Using the ECM VPN with Windows 7 ECM IT has set up a VPN server to provide an enhanced service to ECM staff and students. This document shows you how to set up a connection on a Windows computer once your
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationPre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
More informationQuick Start Guide. Hosting Your Domain
Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents
More information9 Headless Systems & Remote Management
9 Headless Systems & Remote Management Headless support is a key feature of XPe. Since the nature of the XP operating system is to have a graphical interface, designing an XPe headless device involves
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationIntroduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
More informationNAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
More informationAradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
More informationAsta Powerproject Enterprise
Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700
More informationSecure File Transfer Protocol User Guide
Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationObtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff:
AJRR Secure FTP Site Usage www.ajrr-registry.net port 22 Contacts: Randolph Meinzer meinzer@ajrr.net Steve Hamada hamada@ajrr.net 6300 North River Road Rosemont, IL 60018 p: 847-292-0530 f: 847-292-0531
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationFile Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationCanon WFT-E1 (A) Wireless File Transmitter. Network Support Guide
1 Canon WFT-E1 (A) Wireless File Transmitter Network Support Guide Windows XP - Infrastructure Wireless Mode Connection 2 Setting up the WFT-E1A on Windows XP Home or Professional Infrastructure Wireless
More informationUser Guide. WS_FTP Server
WS_FTP Server Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?... 1 System requirements for WS_FTP Server... 2 WS_FTP Server... 2 Ipswitch Notification Server... 3 WS_FTP Server Manager...
More informationS-911 Bracelet Locator Protocol 1.0 Analyzer. User Manual
Document No.: Document Type: 220-SD-002 (V1.1) Software Design Document S-911 Bracelet Locator Protocol 1.0 Analyzer User Manual Version 1.1 Jan 12, 2011 Copyright 2011 Laipac Technology Inc. Release History
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationChakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
More informationFile Transfer Protocol (FTP) & SSH
http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.
More informationKnowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database? Date: January 11th, 2011 Last Update: January 21st, 2013 (see Section 2, C, 4) Problem: You want to create
More information10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationNetwork Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationImplementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationWS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationGENERAL FILE TRANSFER GUIDELINES
GENERAL FILE TRANSFER GUIDELINES EMSTARS extracts (the XML files containing patient care records) will be transferred to the FDOH Secure Server at intervals defined in the EMSTARS Business Rules (available
More informationInstall FileZilla Client. Connecting to an FTP server
Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support
More informationUploading files to a web server using SSH Secure Shell 3.2.9
Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationGuide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC The ITC has tested several SFTP client programs for submitting digital data to the ITC. These include
More informationSFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org
SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.
More informationUploading files to FTP server
V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications
More informationAdministering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationWeb Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
More informationSecret Server Installation Windows Server 2012
Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning
More informationAdministering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
More informationAd Hoc (Temporary) Accounts Instructions
DLG/PDV SFTP Server Instructions 1. Ad Hoc (Temporary) Accounts. 2. LeadsGen (Permanent) Accounts. 3. Manually configuring SFTP Clients (WinSCP & FileZilla). 4. Uploading files into SFTP server. 5. Frequently
More informationRemote Logging. Tanveer Brohi(14cs28)
Remote Logging Tanveer Brohi(14cs28) 1 Contents Introduction TELNET SSH Advantages and Disadvantages Conclusion References 2 Introduction What is remote logging? Remote logging is the capability to access
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More information