Solved

FTP push

Posted on 2002-04-26
5
3,515 Views
Last Modified: 2013-12-19
I need more information about how a ftp push works. I have a company that wants to do a ftp push but I am a little confused on what that is going to do and how. Please help
0
Comment
Question by:kladd
5 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 100 total points
Comment Utility
This document describes in great detail about FTP. The major theme is an anonymous FTP server, but you would most likely be setting up a secure ftp server with specific username/password protection. There are many FTP server products from free to almost free, to minor cost. It all depends on your server OS, and how secure you want it to be.

http://www.landfield.com/wu-ftpd/docs/anonymous-ftp-faq.html

Basicaly, you will just be setting up an FTP server, restricting access to it, and the other company will simply "put" their files onto your server. They can use some automated scripts to "push" the files to you, but it will be the same thing as a "put".

WU-FTPD is one of the most-used for server and client.
http://www.wu-ftpd.org/wu-ftpd-faq.html

WS-FTP Pro is a good commercial package.
http://www.ipswitch.com/Products/WS_FTP/
0
 
LVL 13

Expert Comment

by:hstiles
Comment Utility
Or you could use IIS4 or 5, which is free.  If you're just installing the FTP Server component, it'll be less insecure than a full-blown installation of IIS with the WWW publishing services and SMTP connector.
0
 

Expert Comment

by:CleanupPing
Comment Utility
kladd:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now