Module 16: Some Other Tools in UNIX
|
|
|
- Ferdinand McLaughlin
- 10 years ago
- Views:
Transcription
1 Module 16: Some Other Tools in UNIX We have emphasized throughout that the philosophy of Unix is to provide - (a) a large number of simple tools and (b) methods to combine these tools in flexible ways. This applies to file compression, archiving, and transfer tools as well. One can combine these tools in innovative ways to get efficient customized services and achieve enhanced productivity. Usually, the use of these tools is required when user or system files need to be moved enblock between different hosts. In this module we shall discuss some tools that help in archiving and storing information efficiently. Efficient utilization of space requires that the information is stored in a compressed form. We discuss some of the facilities available in Unix for compression. Also, compressed files utilize available network bandwidth better for file transfers on the internet. Without compression, communicating postscript, graphics and images or other multimedia files would be very time consuming. One of the interesting tools we have included here is a profiler. A profiler helps in profiling programs for their performance. In program development it is very important to determine which segments of program are using what resources. We discuss a few program performance optimization strategies as well. We begin the module with a description of archiving tools available in the Unix environment Tar and Other Utilities In the past, archives were maintained on magnetic tapes. The command tar appropriately stands for the tape archiving command for historical reasons. These tapes used to be stacked away in large archival rooms. The tar command carries over to archiving files from a file system onto a hard disk. The command has a provision for a default virtual tape drive as well. As a user, we distribute our files within a directory structure. Now suppose we need to archive or copy an entire set of files within a directory subtree to another machine. In this situation the tar command comes in handy. It would also be very handy when one has to copy a large set of system files to another machine. Many of the newer applications are also installed using a copy from a set of archived files. The tar command has the following structure: PCP Bhatt/IISc, Bangalore M16/V1/June 04/1
2 tar options target source As an example suppose we wish to archive all the.c files under directory. /M/RAND and place these under directory. /T, we may give a command as follows: bhatt@se-0 [~/UPE] >>tar cvf./t/cfiles.tar./m/rand/*.c a./m/rand/dum.c 1K a./m/rand/main.c 1K a./m/rand/old_unif.c 1K a./m/rand/templet.c 4K a./m/rand/unif.c 1K We may now change to the directory T and give a ls command to see what we have there. bhatt@se-0 [T] >>ls ReadMe cfiles.tar The options used in tar command have the following interpretations: The option c suggests to create, v suggests to give a verbose description on what goes on, and f indicates that we wish a file to be created in a file system. An absence of f means it will be created in /etc/remt0 = or a tape. To see the table of contents within a tarred file use the t option as shown below: bhatt@se-0 [T] >>tar tvf cfiles.tar tar: blocksize = 18 -rw-r--r / Nov 30 15: /M/RAND/dum.c -rw-r--r / Nov 30 16: /M/RAND/main.c -rw-r--r / Nov 30 16: /M/RAND/old_unif.c -rw-r--r / Nov 29 11: /M/RAND/templet.c -rw-r--r / Oct 16 09: /M/RAND/unif.c To extract the files from the tarred set cfiles, we may use the x option as follows: tar xvf cfiles.tar This creates a directory M under T (M was the parent directory of RAND) under which RAND and files stood in the first place. In particular, tar has the following options: c: create an archive. r: append files at the rear end of an existing archive. t: list table of contents. PCP Bhatt/IISc, Bangalore M16/V1/June 04/2
3 x : extract individual contents f : file to be created within a file system f : write/read from standard output/input o : change file ownership v : verbose mode, give details of archive information Note that it is dangerous to tar the destination directory (i.e. take the archive of the destination directory) where we propose to locate the.tar file as this results in a recursive call. It begins to fill the file system disk which is clearly an error. The tar command is very useful in taking back-ups. It is also useful when people move - they can tar their files for porting between hosts Compression The need to compress arises from efficiency consideration. It is more efficient to store compressed information as the storage utilization is much better. Also, during network transfer of information one can utilize the bandwidth better. With enormous redundancy in coding of information, files generally use more bits than the minimum required to encode that information. Let us consider text files. The text files are ASCII files and use a 8 bit character code. If, however, one were to use a different coding scheme one may need fewer than 8 bits to encode. For instance, on using a frequency based encoding scheme like Huffman encoding, we would arrive at an average code length of 5 bits per character. In other words, if we compress the information, then we need to send fewer bits over the network. For transmission one may use a bit stream of compressed bits. As such tar, by itself, preserves the ASCII code and does not compress information. Unix provides a set of compression utilities which include a compress and a uuencode command. The command structure for the compress or uncompress command is as follows: compress options filename uncompress options filename On executing the compress command we will get file with a.z extension, i.e. with a file filename we get filename.z file. Upon executing uncompress command with filename.z as argument, we shall recover the original file filename. The example below shows a use of compress (also uncompress) command which results in a.z file. PCP Bhatt/IISc, Bangalore M16/V1/June 04/3
4 [T] >>cp cfiles.tar test; compress test; ls M ReadMe cfiles.tar test.z bhatt@se-0 [T] >>uncompress test.z; ls M ReadMe cfiles.tar test Another method of compression is to use the uuencode command. It is quite common to use a phrase like uuencode a file and then subsequently use uudecode to get the original file. Let us uuencode our test file. The example is shown below: bhatt@se-0 [T] >>uuencode test test > test.uu ; ls; rm test ; \ ls ; uudecode test.uu ; rm test.uu; ls ReadMe cfiles.tar test test.uu M ReadMe cfiles.tar test.uu M ReadMe cfiles.tar test Note that in using the uuencode command we have repeated the input file name in the argument list. This is because the command uses the second argument (repeated file name) as the first line in the compressed file. This helps to regenerate the file with the original name on using uudecode. Stating it another way, the first argument gives the input file name but the second argument helps to establish the file name in the output. One of the most common usages of the uuencode and uudecode is to send binary files. Internet expects users to employ ASCII format. Thus, to send a binary file it is best to uuencode it at the source and then uudecode it at the destination. The way to use uuencode/uudecode is as follows: uuencode my_tar.tar my_tar.tar > my_tar.uu There is another way to deal with internet-based exchanges. It is to use MIME (base 64) format. MIME as well as SMIME (secure MIME), are Internet Engineering Task Force defined formats. MIME is meant to communicate non-ascii characters over the net as attachments to a mail. Being a non-ascii file, it is ideally suited for transmission of post-script, graphics, images, audio or video files over the net. A software uudeview allows one to decode and view both MIME and uuencoded files. A uuencoded file must end with end without which the file is considered to end improperly. A program called uudeview is very useful to decode uuencoded files as well as files in the base 64 format. PCP Bhatt/IISc, Bangalore M16/V1/June 04/4
5 Zip and unzip: Various Unix flavors, as also MS environments, provide instructions to compress a file with the zip command. A compressed file may be later unzipped by using an unzip command. In GNU environment the corresponding commands are gzip (to compress) and gunzip (to uncompress). Below is a simple example which shows use of these commands: bhatt@se-0 [T] >>gzip test; ls; gunzip test.gz; ls; M ReadMe cfiles.tar test.gz M ReadMe cfiles.tar test In MS environment one may use.zip or PKZIP to compress and PKUNZIP to decompress the files. One of the best known compression schemes is the LZW compression scheme (the letters LZW stand for the initials of the two inventors and the one who refined the scheme). It was primarily designed for graphics and image files. It is used in the.gif format. A discussion on this scheme is beyond the scope of this book. Network file transfers: The most frequent mode of file transfers over the net is by using the file transfer protocol or FTP. To perform file-transfer from a host we use the following command. ftp <host-name> This command may be replaced by using an open command to establish a connection with the host for file transfer. One may first give the ftp command followed by open as shown below: ftp open <host-name> The first ftp command allows the user to be in the file transfer mode. The open arranges to open a connection to establish a session with a remote host. Corresponding to open we may use close command to close a currently open connection or FTP session. Most FTP protocols would leave the user in the FTP mode when a session with a remote host is closed. In that case a user may choose to initiate another FTP session immediately. This is useful when a user wishes to connect to several machines during a session. One may use the bye command to exit the FTP mode. Usually, the ftp ftp connects a user to the local server. PCP Bhatt/IISc, Bangalore M16/V1/June 04/5
6 With anonymous or guest logins, it is a good idea to input one's contact address as the password. A short prompt may be used sometimes to prompt the user. Below we show an example usage: user anonymous -address Binary files must be downloaded using the BINARY command. ASCII files too can be downloaded with binary mode enabled. FTP starts in ASCII by default. Most commonly used ftp commands are get and put. See the example usage of the get command. get <rfile> <lfile> This command gets the remote file named rfile and assigns it a local file name lfile. Within the FTP protocol, the hash command helps to see the progression of the ftp transfers. This is because of # displayed for every block transfer (uploaded or downloaded). A typical get command is shown below. ftp> hash ftp> binary ftp> get somefilename During multiple file downloads one may wish to unset interactivity (requiring a user to respond in y/n) by using the prompt command. It toggles on/off on use as shown in the example below: ftp> prompt ftp> mget filesfromadirectory The mget or mput commands offer a selection to determine which amongst the files need to be transferred. One may write shell scripts to use the ftp protocol command structure. This may be so written to avoid prompts for y/n which normally shows up for each file transfer under the mget or mput commands. Unlike tar, most ftp protocols do not support downloading files recursively from the subdirectories. However, this can be achieved in two steps. As a first step one may use the tar command to make an archive. Next, one can use the ftp command to effect the file transfer. Thus all the files under a directory can be transferred. In the example below, we additionally use compression on the tarred files. 1. Make a tar file: create xxx.tar file 2. Compress: generate xxx.tar.z file 3. Issue the ftp command: ftp PCP Bhatt/IISc, Bangalore M16/V1/June 04/6
7 Below we have an example of such a usage: 1. Step 1: $ tar -cf graphics.tar /pub/graphics This step takes all files in /pub/graphics and its subdirectories and creates a tar file named graphics.tar. 2. Step 2: $ compress graphics.tar This step will create graphics.tar.z file. 3. Step 3: uncompress graphics.tar.z to get graphics.tar 4. Step 4: tar gf graphics.tar will give file gf Image File Formats for Internet Applications With the emergence of the multimedia applications, it became imperative to offer services to handle a variety of file formats. In particular, we need to handle image files to support both still and dynamic images. Below we give some well known mutimedia file formats which may be used with images. File extension Usage AVI Audio visual interleave.dl Animated picture files (with.pict.mac extensions)..pcx and.bmp May be IBM PC image files.wpg A word perfect file..raw May be 24 bit RGB picture file. JPEG is a compression standard specification developed by the Joint Photographic Engineering Group. There are utilities that would permit viewing the images in the.jpg files. Most JPEG compressions are lossy compressions. Usage of.jpg files is very popular on internet because it achieves a very high compression. In spite of being lossy, jpeg compression invariably works quite well because it takes into account some weaknesses in human vision. In fact, it works quite adequately with 24-bit image representations. JPEG files are compressed using a quality factor from 1 to 100 with default being 55. When sending, or receiving,.jpg files, one should seek for quality factor of 55 and above to retain image quality at an acceptable level. The basic uuencoding scheme breaks groups of three 8-bit characters into four 6-bit patterns and then adds ASCII code 32 (a space) to each 6-bit character which in turn PCP Bhatt/IISc, Bangalore M16/V1/June 04/7
8 maps it on to the character which is finally transmitted. Sometimes spaces are transmitted as grave-accent (' ASCII 96). The xxencoding is newer and limits itself to 0-9, A-Z, a-z and +- only. In case a compressed file is uuencoded, uudecode may have to be followed by an unzip step. File sizes up to 100{300K are not uncommon for.gif files. Often UseNet files are delimited to 64k. A typical 640*480 VGA image may require transmission in multiple parts. Typical.gif file in Unix environment begins as follows: begin 640 image.gif 640 represents the access rights of file. Steps for getting a.gif or.jpg files may be as follows: 1. Step 1: Get all the parts of the image file as part files. 2. Step 2: Strip mail headers for each part-file. 3. Step 3: Concatenate all the parts to make one.uue file. 4. Step 4: uudecode to get a.gif/.jpg or.zip file. 5. Step 5: If it is a.zip file unzip it. 6. Step 6: If it is a.jpg file either use jpg image viewer like cview or, alternatively, use jpg2gif utility to get.gif file. 7. Step 7: View image from.gif file. On the internet several conversion utilities are available and can be downloaded Performance Analysis and Profiling One of the major needs in program development environments is to analyse and improve the performance of programs. For our examples here we assume c programs. One may use some obviously efficient steps to improve efficiency of code. In his book, The Art Of Computer System Performance Analysis, Raj Jain advocates the following: Optimize the common case. In other words, if the program has to choose amongst several operational paths, then that path which is taken most often must be made very efficient. Statements in this path must be chosen carefully and must be screened to be optimal. In case we need to test some conditions and choose amongst many alternative paths by using a sequence of if statements, then we should arrange these if statements such that the condition most likely to succeed is tested first, i.e. optimize the test sequence to hit the most likely path quickly. PCP Bhatt/IISc, Bangalore M16/V1/June 04/8
9 Within an if statement if there are a set of conditions that are ANDED, then choose the first condition which is most likely to fail. This provides the quickest exit strategy. If the data to be checked is in the form of arrays or tables, then put these in the order such that the most likely ones to be accessed are up front, i.e. these get checked first. Avoid file input and output as much as possible. Also, batch as much input, or output, as possible. For instance, suppose we need to process each line of data. In such a case, get the file first in memory to process it line-by-line rather than reading the line-by-line data from disk for each step of processing. In the loops make sure to pull out as much data as possible. In particular, values that do not change within the loop computations need not be within the loop. Steps To Analyze Performance Of c Programs: The following steps will walk us through the basic steps: 1. Compile with p option, the profiler option cc -p a.c (Additionally, use -o option for linked routines.) 2. Now run the program a.out. (This step results in a mon.out file in the directory) 3. Next see the profile by using prof command as follows: prof a.out (For more details the reader is advised to see the options in man pages for prof command.) The profiler gives an estimate of the time spent in each of the functions. Clearly, the functions that take a large percentage of time and are often used are the candidates for optimization. A sample program profile: First let us study the following program in c: #include <stdio.h> #include <ctype.h> int a1; int a2; add() /* adds two integers */ { PCP Bhatt/IISc, Bangalore M16/V1/June 04/9
10 int x; int i; for (i=1; i <=100000; i++) x = a1 + a2; return x; } main() { int k; a1 = 5; a2 = 2; for (k=1; k <= ; k++);; printf("the addition gives %d \n", add()); } Now let us see the way it has been profiled. bhatt@se-0 [P] >>cc -p a.c bhatt@se-0 [P] >>a.out The addition gives 7 bhatt@se-0 [P] >>ls ReadMe a.c a.out mon.out bhatt@se-0 [P] >>prof a.out %Time Seconds Cumsecs #Calls msec/call Name main add bhatt@se-0 [P] >> The table above lists the percentage time spent in a certain function, time in seconds, and the number of calls made, average milliseconds on calls and the name of the function activated. Another profiler is a gprof program. It additionally tries to find the number of iterated cycles in the program flow graph for function calls. Text Processing (Improving Performance): Most often computer programs at tempt text processing. One of the common strategies is the use a loop in the following way: PCP Bhatt/IISc, Bangalore M16/V1/June 04/10
11 1. Find the strlen (the length of the string). 2. Use a loop and do character-by-character scan to process data. What most users do not realize is that the strlen itself determines the string length by traversing the string and comparing each of the characters with null. Clearly, we can check in the loop if the character in the string array is null and process it if it is not. This can save a lot of processing time in a text processing program. Sometimes we are required to copy strings and use strcpy to do the task. If the architecture supports memory block copy, i.e. an instruction like memcpy then this is a preferred option as it is a block transfer instruction whereas strcpy copies byte-by-byte and is therefore very slow. PCP Bhatt/IISc, Bangalore M16/V1/June 04/11
File Transfer Protocol. What is Anonymous FTP? What is FTP?
File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
List of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN 1 Contents CONNECTIONS COMMUNICATION COMMAND PROCESSING
WS_FTP Professional 12
WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
The Einstein Depot server
The Einstein Depot server Have you ever needed a way to transfer large files to colleagues? Or allow a colleague to send large files to you? Do you need to transfer files that are too big to be sent as
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
UNIX: Introduction to TELNET and FTP on UNIX
Introduction to TELNET and FTP on UNIX SYNOPSIS This document is written with the novice user in mind. It describes the use of TCP/IP and FTP to transfer files to and from the UNIX operating system and
SendMIME Pro Installation & Users Guide
www.sendmime.com SendMIME Pro Installation & Users Guide Copyright 2002 SendMIME Software, All Rights Reserved. 6 Greer Street, Stittsville, Ontario Canada K2S 1H8 Phone: 613-831-4023 System Requirements
7 Why Use Perl for CGI?
7 Why Use Perl for CGI? Perl is the de facto standard for CGI programming for a number of reasons, but perhaps the most important are: Socket Support: Perl makes it easy to create programs that interface
1. Installation Instructions - Unix & Linux
Planning Your Installation 1. Installation Instructions - Unix & Linux There are two types of Gridgen installations: a First Time Installation and a Maintenance Release Installation. A First Time Installation
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation
Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation Objectives Outline the features of common compression utilities Compress and decompress
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
Integrating SNiFF+ with the Data Display Debugger (DDD)
1.1 1 of 5 Integrating SNiFF+ with the Data Display Debugger (DDD) 1. Introduction In this paper we will describe the integration of SNiFF+ with the Data Display Debugger (DDD). First we will start with
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Computing Service G72. File Transfer Using SCP, SFTP or FTP. many leaflets can be found at: http://www.cam.ac.uk/cs/docs
Computing Service G72 File Transfer Using SCP, SFTP or FTP many leaflets can be found at: http://www.cam.ac.uk/cs/docs 50 pence April 2003 Contents Introduction Servers and clients... 2 Comparison of FTP,
µtasker Document FTP Client
Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.
MAIL-2-TRACY USER GUIDE. This document replaces revision D of this document.
DESCRIPTION 1 (5) MAIL-2-TRACY USER GUIDE This document replaces revision D of this document. Abstract This document describes the use of MAIL-2-TRACY to transfer tracability data from Contract Manufacturers
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Outside In Image Export Technology SDK Quick Start Guide
Reference: 2009/02/06-8.3 Outside In Image Export Technology SDK Quick Start Guide This document provides an overview of the Outside In Image Export Software Developer s Kit (SDK). It includes download
Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
Basic File Recording
PART NUMBER: PUBLICATION DATE: 23. October 2015 Copyright 2014 2015 SightLine Applications, Inc. Hood River, OR All Rights Reserved Summary In addition to performing digital video stabilization, object
Week Overview. Running Live Linux Sending email from command line scp and sftp utilities
ULI101 Week 06a Week Overview Running Live Linux Sending email from command line scp and sftp utilities Live Linux Most major Linux distributions offer a Live version, which allows users to run the OS
Downloading Files using FTP
Downloading Files using FTP Transferring files to and from Barney or other server is done using the File Transfer Protocol, more commonly referred to as FTP. Using FTP, you can transfer files to and from
The Basics of FTP. Basic Order of Operations: Commands: FTP (File Transfer Protocol) allows a user to transfer files to/from a remote network site.
The Basics of FTP FTP (File Transfer Protocol) allows a user to transfer files to/from a remote network site. Topics: Basic Order of Operations Commands Example Screen Shots Basic Order of Operations:
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
HPCC - Hrothgar Getting Started User Guide
HPCC - Hrothgar Getting Started User Guide Transfer files High Performance Computing Center Texas Tech University HPCC - Hrothgar 2 Table of Contents Transferring files... 3 1.1 Transferring files using
An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project
An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project Michele G. Mandel, National Centers for Disease Control and Prevention, Atlanta, GA
FTP Manager. User Guide. July 2012. Welcome to AT&T Website Solutions SM
July 2012 FTP Manager User Guide Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain a successful
Moxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
emedny FTP Batch Dial-Up Number 866 488 3006 emedny SUN UNIX Server ftp 172.27.16.79
This document contains most of the information needed to submit FTP Batch transactions with emedny. It does not contain the unique FTP User ID/Password required to log in to the emedny SUN UNIX Server.
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Table of Contents Introduction Supporting Arguments of Sysaxftp File Transfer Commands File System Commands PGP Commands Other Using Commands
FTP Console Manual Table of Contents 1. Introduction... 1 1.1. Open Command Prompt... 2 1.2. Start Sysaxftp... 2 1.3. Connect to Server... 3 1.4. List the contents of directory... 4 1.5. Download and Upload
FTP Client Engine Library for Visual dbase. Programmer's Manual
FTP Client Engine Library for Visual dbase Programmer's Manual (FCE4DB) Version 3.3 May 6, 2014 This software is provided as-is. There are no warranties, expressed or implied. MarshallSoft Computing, Inc.
Security Correlation Server Backup and Recovery Guide
orrelog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server,
Managed File Transfer with Universal File Mover
Managed File Transfer with Universal File Mover Roger Lacroix [email protected] http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine
4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
Using SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00
VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...
Send Email TLM. Table of contents
Table of contents 1 Overview... 3 1.1 Overview...3 1.1.1 Introduction...3 1.1.2 Definitions... 3 1.1.3 Concepts... 3 1.1.4 Features...4 1.1.5 Requirements... 4 2 Warranty... 5 2.1 Terms of Use... 5 3 Configuration...6
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
Human Resources Installation Guide
Human Resources Installation Guide Installing HR i Index Copyright 2001 Jenzabar, Inc. You may print any part or the whole of this documentation to support installations of Jenzabar software. Where the
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
NERSP: Saving File Space and Reducing File Storage Charges
NERSP: Saving File Space and Reducing UFIT EI&O Document ID: D0100 Last Updated: 07/03/2002 This document describes methods of managing and conserving file storage space on CNS's NERSP UNIX system. These
Linux System Administration
System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most
1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
RECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 )
NAME recover browse and recover NetWorker files SYNOPSIS recover [-f] [-n] [-q] [-u] [-i {nnyyrr}] [-d destination] [-c client] [-t date] [-sserver] [dir] recover [-f] [-n] [-u] [-q] [-i {nnyyrr}] [-I
NS Series Programmable Terminal FTP Function
NS Series Programmable Terminal FTP Function Created by OMRON HMI Contents 1. FTP on the NS Series... 3 1.1. Intended Purpose... 3 1.2. Models... 3 2. External Interfaces... 3 2.1. Data Storage Location...
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
From the Ridiculous to the Sublime: Getting Files from There to Here
From the Ridiculous to the Sublime: Getting Files from There to Here Robert H. Upson - Virginia Community College System Gail M. Barnes - Southside Virginia Communhy College Tamara R. Fischell - Timely
Internet Services. Sadiq M. Sait, Ph.D
Internet Services Sadiq M. Sait, Ph.D [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1 What really
Quick Introduction to HPSS at NERSC
Quick Introduction to HPSS at NERSC Nick Balthaser NERSC Storage Systems Group [email protected] Joint Genome Institute, Walnut Creek, CA Feb 10, 2011 Agenda NERSC Archive Technologies Overview Use Cases
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
PageR Enterprise Monitored Objects - AS/400-5
PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users
balesio Native Format Optimization Technology (NFO)
balesio AG balesio Native Format Optimization Technology (NFO) White Paper Abstract balesio provides the industry s most advanced technology for unstructured data optimization, providing a fully system-independent
VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
UNIX (LINUX) PRACTICAL 1 INTRODUCTION
UNIX (LINUX) PRACTICAL 1 INTRODUCTION 1. CONNECTING TO UNIX (LOGGING ON) 2. FILES AND DIRECTORIES - Listing, viewing, copying, making. How your workspace is structured. 3. HELP! - How to get it. Is it
SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities
SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703)
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
StreamServe Persuasion SP4
StreamServe Persuasion SP4 Installation Guide Rev B StreamServe Persuasion SP4 Installation Guide Rev B 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No part of this document
SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities. Administrator's Guide
SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities Administrator's Guide 2 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670
Customer Tips. How to Upgrade, Patch or Clone Xerox Multifunction Devices. for the user. Purpose. Upgrade / Patch / Clone Process Overview
Xerox Multifunction Devices Customer Tips January 27, 2009 This document applies to the Xerox products indicated in the table below. For some products, it is assumed that your device is equipped with the
Automating FTP with the CP 443-1 IT
Automating FTP with the CP 443-1 IT Contents Page Introduction 2 FTP Basics with the SIMATIC NET CP 443-1 IT 3 CONFIGURATION 3 FTP SERVICES 6 FTP Server with the SIMATIC NET CP 443-1 IT 9 OVERVIEW 9 CONFIGURATION
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
PKZIP 6.0 Command Line Getting Started Manual
PKZIP 6.0 Command Line Getting Started Manual Copyright 2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
EXTENDED FILE SYSTEM FOR F-SERIES PLC
EXTENDED FILE SYSTEM FOR F-SERIES PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
File Transfer Protocol - FTP
File Transfer Protocol - FTP TCP/IP class 1 outline intro kinds of remote file access mechanisms ftp architecture/protocol traditional BSD ftp client ftp protocol command interface ftp trace (high-level)
ichip FTP Client Theory of Operation Version 1.32
ichip FTP Client Theory of Operation Version 1.32 November 2003 Introduction The FTP protocol is described in RFC 959. General FTP (File Transfer Protocol) is defined as a protocol for file transfer between
Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections
: the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS
AES Crypt User Guide
AES Crypt User Guide Publication Date: 2013-12-26 Original Author: Gary C. Kessler ([email protected]) Revision History Date Contributor Changes 2012-01-17 Gary C. Kessler First version 2013-03-03 Doug
Apache 2.0 Installation Guide
Apache 2.0 Installation Guide Ryan Spangler [email protected] http://ceut.uww.edu May 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002 Table of
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
FCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao [email protected] Fei Li Department of Computer Science
What is SOAP MTOM? How it works?
What is SOAP MTOM? SOAP Message Transmission Optimization Mechanism (MTOM) is the use of MIME to optimize the bitstream transmission of SOAP messages that contain significantly large base64binary elements.
If you examine a typical data exchange on the command connection between an FTP client and server, it would probably look something like this:
Overview The 1756-EWEB and 1768-EWEB modules implement an FTP server; this service allows users to upload custom pages to the device, as well as transfer files in a backup or restore operation. Many IT
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
