TASK 1
Definition of FTP
File Transfer Protocol (FTP) is a standard Internet protocol for exchanging files between computers using TCP/IP connections efficiently and reliability.
FTP works in the same way as HTTP//: for transferring web pages from a server to a browser in that it uses client-server architecture and user authentication is required using a username and password.
References:
Definition of FTPS (also known as FTPES, FTP-SSL, S-FTP and FTP Secure)
FTPS is a collective terminology that encompasses the various methodologies in which FTP software performs secure file transfers. Each method involves the use of a SSL/TLS layer below the standard FTP protocol to encrypt the control and/or data channels to improve transmission security.
References:
1. https://www.wise-ftp.com/documentation/webhelp/html/what_is_FTPS_en.htm
Definition of HTTP (also known as Hypertext Transfer Protocol)
HTTP is a set of rules that run above the TCP/IP protocols for transferring files (whether text, sound, graphics, video or multimedia) over the internet. Immediately a web browser is accessed, indirect use is made of HTTP.Servers all contain a HTTP daemon, software designed to accept and process HTTP requests upon their arrival. Web browsers are the HTTP clients responsible for initiating and transmitting requests to servers. When file requests are forwarded from the browser, by either submitting a URL or activating a hypertext link, the HTTP daemon in the destination server receives the request and returns the requested file(s).
References:
Definition of HTTPS (also known as HTTP over SSL or HTTP Secure
HTTPS is the use of either Transport Layer Security (TLS) or Secure Socket Layer (SSL) as a sub-layer of regular HTTP application layering. HTTPS encrypts and decrypts client requests and data received from the Web server in satisfaction of the initial requests. Unless a different port is specified, HTTPS uses port 443 instead of HTTP port 80 in its communications with the TCP/IP lower layer.
The use of X.509 digital certificates are supported by HTTPS and SSL protocols, from the server, so that if necessary a client can authenticate the sender.
References:
Definition of FTP Client
References:
Definition of FTP server (also known as an FTP site)
An FTP server is a computer which has a file transfer protocol (FTP) address, requires a TCP/IP network for functioning and is dedicated to receiving FTP requests form FTP clients to facilitate the exchange of files over internet.
References:
Definition of File Compression
Compression is the process by which a reduction in the total number of bits needed to represent specific data is achieved.
Compression is performed by an algorithm which shrinks the size of the data. For example, an algorithm may represent the specific data as a string of 0s and 1s, and substitute it with a smaller string of 0s and 1s by using a dictionary for the conversion between the two data forms. Alternatively, test compression can be as simple as removing all unnecessary characters.
Compressing data can decrease network bandwidth costs, improve the speed of data transfer and reduce data storage requirements .
Reference:
1. http://www.webopedia.com/TERM/D/data_compression.html
Definition of Decompression
Decompression is the process of reversing compressed data, by using appropriate software, to expand the compressed file back into its original form for user access.
Reference:
1. http://smallbusiness.chron.com/file-compression-decompression-930.html
Definition of Encryption
Encryption is the transformation of data into an unrecognisable cipher (sequence) used to protect sensitive information from unauthorized access. Encryption can be applied to files, storage devices and electronically transferred data.
Encrypted files are usually password protected or require a private key to be accessed.
Reference:
1. http://http://searchsecurity.techtarget.com/definition/data-encryption-decryption-IC
Definition of Decryption
Decryption is the process of transforming encrypted data back into its original form, for access by authorised personnel.
Reference:
1. http://http://searchsecurity.techtarget.com/definition/data-encryption-decryption-IC
Definition of Auto-detect
Auto-detection is an automatic recognition of a item, state or situation and whether they are stable or changing. An operating system, for example will automatically review computer hardware, to determine what is installed on the computer and automatically configure the kernel to support the new hardware accordingly.
Reference:
1. https://en.wikipedia.org/wiki/Autodetection
Definition of ASCII Mode
An ASCII file is a binary file that consists of code that represents English characters as numbers, assigning each letter a number from 0 to 127. For example, the ASCII code for uppercase V is 86. Most computers use ASCII code to represent text, which makes it possible to transfer data between computers.
ASCII mode (as opposed to binary mode) is used for the transmission of plain text files (such as .txt, .html, .htm, .cgi), etc). ASCII mode handles the conversion of file characters based upon the operating system used on the receiving client (particularly relevant if operating systems differs between computers) and better provides for the correct interpretation of control and hidden end of line characters, as these differ in meaning across various platforms.
Reference:
1. https://en.wikipedia.org/wiki/ASCII
2. http://mingersoft.com/blog/2011/01/ftp-and-the-difference-between-ascii-and-binary-modes/
Definition of Binary Mode.
Binary code is a method of defining values by using different combinations of the binary digits 1 and 0 to represent a letter, numerical digit or other character to achieve programming functions or computer data transmission. Binary mode is used for binary code instructions in the transmission of non ASCII data files including images, multi-media files, etc, between computers.
Reference:
1. www.computerhope.com/jargon/b/binary.htm
2. https://www.techopedia.com/definition/17052/binary-code
Definition of Active Mode
“Passive” or “Active” mode refer to the two connection methods available when connecting to an FTP server. Active mode enhances transmission security, while Passive mode needs less configuration changes on the Client’s side.
In Active mode the Client computer uses an Arbitrary Port (say Command Port 50921) to connect to the Server’s Command Port 21 to establish a connection. The Server then establishes the connection from its Data Port 20 to the client computer on another randomly chosen port (say Data Port 5722).
Reference:
1. http://www.serverintellect.com/support/ftp/ftp-active-passive-diff/
Definition of Passive Mode.
Following from above, in Passive mode the Client computer uses an Arbitrary Port (say Command Port 50921) to connect to the Server’s Command Port 21 to establish a connection. The Client computer, using a random port, then proceeds to establishes the connection on the Server using a random Server Data Port. Once the connection is established file transfer, Port 21 is open and kept open until it is connected from your computer. This makes the server vulnerable to hackers who can transfer malicious code to the server while the port is open.
Reference:
1. http://www.serverintellect.com/support/ftp/ftp-active-passive-diff/
Compare and contrast (3) different FTP client software applications:
|
CoffeeCup FTP Free |
WS_FTP |
FileZilla |
|
|
Protocols supported and Security |
Operates with HTTP or HTTPS and other protocols, including SFTP, FTPS Registered version offers an encryption setting to protect FTP data in |
Highly secure and efficient: encrypting files using SSL/ FTPS, SSH or
|
Allows FTP HTTP/1.1, SOCKS5 and FTP-Proxy supported. |
|
Computer / FTP Management features |
Local and remote interfaces provided for a concise overview of the file
|
Performs Transfers large Establishes Inbuilt Deletion Scheduler Additional Ability to open several hard drive locations for file management. |
Synchronized directory for browsing and remote |
|
Interface |
Drag & Drop Interface |
Drag & Drop Interface |
class=”MsoNormal”>Drag & Drop Interface |
|
Other Features |
An option is available to direct uploads to a temporary file and Errors are shown in plain, concise language making the process of site Broken or incomplete FTP transfers can be resumed. Bookmarking |
Ability to work on several websites at once Software is self-contained, eliminating the need for an |
Network configuration wizard Resume and transfer for files larger than 4GB The browsing of FTP sites mid-transfer. Allows bookmarks, filename filters and remote file editing Transfer speeds can be automatically adjusted by the client Simultaneous Language Limited Bookmarking |
|
Platform |
Windows |
Windows |
Windows, Mac or Linux |
|
Upload Modes |
Binary, |
Modes available |
Modes available |
|
Cost |
Free |
Depending on selected features. Best feature selection |
Free |
|
Cons |
Scheduling The free |
Cost |
Difficult to install |
Reference:
1. http://www.coffeecup.com/free-ftp/
2. https://ws-ftp.en.softonic.com/
3. http://ftp.ipswitch.com/ipswitch/manuals/wsftp60.pdf
4. http://www.raakesh.com/ws_ftp-review
5. https://www.g2crowd.com/survey_responses/filezilla-review-97071
6. http://www.techradar.com/news/the-best-free-ftp-client
B – FPT Tasks
Task 1
– How to move, copy, cut, paste, create new, zip, unzip (extract) files and folders
Get a copy of the sample website from your Project Theory or HTML class
Project Title: ADA Architects

Zip the application and copy it onto your local drive (C:\temp)

ADA Coding.7s is the zipped application and copied it onto local drive C:\Temp

Unzip the application ready for FTP.
Task 2
– How to connect to FTP server
Obtain the following FTP account information from your instructor:
Host name: 203.35.30.16
User ID: STUD011
Port: 21
Initiate FTP client program and locate the local site (C:\ temp)

Enter Host name, User ID, Password, Port number and connect to the FTP server.

Task 3
– How to configure FTP Client Application In FTP Client Application
Change the Transfer Type to Auto then

Upload the website from the local site to the remote site

Task 4
– How to move, copy, cut, paste, create new, files and folders
Create a new folder on the local site [\Products].

Rename the new folder as [ \Product].

Remove [\ Product].

Create a new folder on the remote site [\Products].

Rename it to [\Product] then Remove [\Product].

Task 5
– How to confirm website functionality
Test and verify the website operation in an Internet browser (Internet Explorer, Google Chrome or Mozilla Firefox). For example:
Confirm that your site displays correctly.
All website pages were tested and found to correctly open in IE, Chrome and Mozilla. Two screenshots from the website are included below.


Download the final working website from the remote site into the local site (C:\ YourFirst – LastName).

The final working website from the remote site into the local site (C:\ James-Boian).
Task 6 – How to scan, detect, monitor system for malware, viruses
Run virus check and confirm the downloaded files/folders are free from malware.

The downloaded files from the server were loaded into the James-Boian directory as directed above. This directory was then scanned with Malwarebytes anti-virus scanner.

The scan showed the downloaded virus to be malware free.
Compress / uncompress the folder.

The compressed folder (James-Boian.rar) appears as the last file in the image above.

The decompressed folder (James-Boian.rar) contents appear in the image above.