?
Solved

plain old ftp server for linux needed

Posted on 2006-06-29
1
Medium Priority
?
302 Views
Last Modified: 2010-03-18

I am a old Linux box (RH 5.1) and I need to have ftp server setup for it.
But I don't need and can not install any of the latest secure servers.
Any one knows how can I find just a basic ftpd server?
Thanks

Ze
0
Comment
Question by:zzhang2006
1 Comment
 
LVL 27

Accepted Solution

by:
Nopius earned 200 total points
ID: 17015427
In RH 5.1 it was wu-ftpd-2.4.2b18-2.1 shipped with the server. It's NOT SECURE and has huge security bugs.

If you like to install it, just get an RPM package, you may get it here:
http://rpm2html.osmirror.nl/redhat-archive/updates/5.1/en/os/i386/wu-ftpd-2.4.2b18-2.1.i386.html

or direct RPM link: http://redhat-archive.osmirror.nl/updates/5.1/en/os/i386/wu-ftpd-2.4.2b18-2.1.i386.rpm
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month13 days, 23 hours left to enroll

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question