ftp

Custom charset encoding in filenames when using FTP

FTP is often used to transfer files from one server to another or to create a backup of a website. In most cases, copying all the required files works just fine. Problems might occur though, if some of the filenames use an unexpected charset encoding. When downloading and re-uploading such a file, the filename will be broken and the website won’t be able to serve it anymore. How can you ensure, to always download files with their correct charset encoding?

Changing the timout in the php-files manually

I realized that I wasn't able to log in in any way. But this was seeming a problem of some older versions of Joomla. They allow you to enter any value you want as timeout but if you enter a too high value you will be not able to log in again. Fortunatelly I could access all the source files of the CMS via FTP and I also had the access-data like username and password and so I could change the timout value to another one in two source files in which it is neccessary: the index2.php and the index3.php file. You can find that solution in the troubleshooting-section in the Online-Book "Joomla!" from http://www.galileocomputing.de.

Automatic upload - Eclipse - FTP server

Eclipse is an IDE for implementation of applications in different programming languages. During the programing of an PHP web application it must be first deployed to the server in order to run it. It is possible to configure Eclipse to run a PHP program on local server, but sometimes it is necessary to implement the program locally and run it on a remote web server (because of the tweaking of the application or other reasons). We want to make the process of uploading of the PHP files to the appropriate folder on the remote FTP server automatic. The particular file should be uploaded after each save on the local disk.

easy to use backup tool for linux

Create an incremental backup of a debian-linux server with an easy to use tool. The backup-server is reachable via ftp and sftp. The backup should be encrypted and compressed to be space and bandwidth efficient. There should be an easy way to either restore parts of the backup or the full system after a failure.

How to secure your wireless network?

<p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Wireless networking has become very popular in the last couple of years. The necessary hardware is widely availabe and relatively easy to install and configure. With wireless network users can connect to Internet from every part of the house without any cable necessary which makes thier life much easier. This technology brings meny benefits but it has to be properly secured to prevent many serious risks and dangers if left wide open.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">In best case, intruder only uses the victim's broadband connection to surf the web and download content. It can slow down Internet or network access for the victim and couse additional cost it the ISP meters used bandwith and charges for actual usage.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">An unauthorized user could abuse the connection for hacking, launching DoS attack or distributing illegal material.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Through wireless network, intruder can access victim's private network. He can access confidential data such as financial data, tax records, development information&hellip; By employing a sniffer an intruder can even sniff email of FTP user names and passwords and use information to gain unauthorized access to email accounts or web services without the victim's knowledge. </span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">What is also important, one does not have to be a programmer or network specialist to discover and gain unauthorized access to wireless network. <span style="mso-spacerun: yes;">&nbsp;</span></span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Considering all of the possible attacks, it's clearly that every wireless network has to be secured in order to avoid problems. </span></span></span></p>
Subscribe to ftp