UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘ Problems in SAN In the
γ€€γ€€
1) past two years, the concept of SAN has gradually become popular. SAN can replace the server-based storage mode, and the performance is more superior. However, to this day, interoperability is still the main problem in the implementation process. SAN itself lacks standards, especially in management. Although Fibre Channel (Fibre Channel) technical standards do exist, various manufacturers have different interpretations, so the interoperability problem is like a sandstorm, and it is unexpected.
γ€€γ€€
2) Some SAN vendors set standards through organizations such as SNIA. Others are investing heavily in building interoperability labs to test before launching the SAN. Another way is to outsource SAN. Although SAN vendors have made progress in solving interoperability issues, experts still recommend users to use outsourcing instead of building SANs themselves.

πŸ¦‘ Key features of NAS

1) γ€€γ€€The NAS solution is usually configured as a file service device, and the workstation or server performs file access through network protocols (such as TCP / IP) and applications (such as network file system NFS or common Internet file system CIFS). Most NAS connections are made between workstation clients and NAS file sharing devices. These connections rely on the enterprise's network infrastructure to function properly.
γ€€γ€€
2) In order to improve system performance and uninterrupted user access, NAS uses specialized operating systems for network file access. These operating systems support both standard file access and corresponding network protocols.
γ€€γ€€
3) NAS makes file access operations faster and easier to add file storage capacity to infrastructure. Because NAS focuses on file services rather than the actual file system implementation, NAS devices are often self-contained and relatively easy to deploy.
γ€€γ€€
4) Data transmission is mainly performed between the NAS device and the client. The large amount of data transmitted on LAN / WAN today is divided into many small data blocks. The transmission process needs to occupy processor resources to interrupt and re-access the data stream. If the processing of data packets consumes too much processor resources, applications running on the same server will be affected. Since network congestion affects the performance of NAS, one of its performance limitations is the ability of the network to transmit data.
γ€€γ€€
5) The scalability of NAS storage is also limited by the size of the device. It is very easy to add another device, but it is not easy to access the content in the network environment like the data on a machine, because NAS devices usually have unique network identifiers. Due to these limitations, data backup in the NAS environment is not centralized, so it is limited to the use of directly connected devices (such as dedicated tape drives or tape libraries) or network-based strategies. Dedicated LAN for backup.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Differences between NAS and DAS full by undercode :

γ€€γ€€> As a new storage technology, NAS has advantages that traditional direct connection cannot match. Table 1 makes a simple comparison between these two methods.

πŸ¦‘ Table 1 Comparison of NAS and DAS
γ€€
> γ€€Network-attached storage (NAS)
γ€€γ€€enables access to network files through centralized management of the file system.
γ€€
1) γ€€Users can share file systems and view shared data.
γ€€γ€€
2) The combination of specialized file servers and storage technologies provides highly reliable data for network access.
γ€€γ€€
3) Directly connected storage (DAS)
γ€€γ€€can only be accessed through the host to which it is connected.

4) γ€€γ€€Each host manages its own file system, but cannot share data with other hosts.
γ€€γ€€
5)You can only rely on the storage device itself to provide highly reliable data to the host.

πŸ¦‘ Technical characteristics of
γ€€γ€€
1) NAS NAS provides an efficient, cost-effective solution for enterprise environments that access and share large amounts of file system data. Data integration reduces management requirements and overhead, and centralized network file servers and storage environmentsβ€”including hardware and softwareβ€”ensure reliable data access and high data availability. It can be said that NAS provides a powerful comprehensive mechanism.
γ€€γ€€
2) NAS technology can meet specific user needs. For example, when some enterprises need to cope with the problem of rapid data growth, or solve the system limitations caused by independent working environments, they can adopt a new generation of NAS technology and use centralized network file access mechanisms and sharing to solve these problems. In order to reduce the cost of system management and improve the function of data backup and recovery.

πŸ¦‘ The main advantage of
γ€€γ€€
1) NAS is that NAS is suitable for users who need to transfer file data to multiple clients through the network. NAS devices can work well in environments where data must be transmitted over long distances.
γ€€γ€€
2) In addition, NAS devices are very easy to deploy, allowing NAS hosts, clients, and other devices to be widely distributed throughout the enterprise's network environment. After properly configured, NAS can provide reliable file-level data integration, because file locking is handled by the device itself. Although its deployment is very simple, enterprises still need to ensure that an appropriate level of file security is provided during the NAS device configuration process.

πŸ¦‘ Benefits of
γ€€γ€€
1) NAS NAS is used in efficient file sharing tasks, such as NFS in UNIX and CIFS in Windows NT, where network-based file-level locking provides advanced concurrent access protection. NAS devices can be optimized to send file information to multiple clients with file-level protection.
γ€€γ€€
2) In some cases, companies can deploy NAS solutions for database applications to a limited extent. These situations are generally limited to the following applications: large amounts of data access are read-only; the database is small; the logical volumes to be accessed are few; the required performance is not high. Under these circumstances, NAS solutions help reduce the user's total cost of ownership.

πŸ¦‘Two complementary technologies
γ€€γ€€
1) Although there are differences between them, SAN and NAS are two complementary storage technologies. For example, SANs are excellent in data block transmission and scalability, and can effectively manage devices. Enterprises can benefit from applying SANs to mission-critical applications, storage centralization, backup recovery, and high-availability computing.
γ€€γ€€
2) Compared with SAN, NAS supports file sharing between multiple peer clients. NAS clients can access shared files anywhere in the enterprise. Because there are fewer logical volumes for file access in the NAS environment and the response time requirements are not very high, the performance and distance requirements are relatively low.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Table 2 Comparison of key features of SAN and NAS
γ€€γ€€SAN NAS full by undercode



γ€€1) γ€€protocol Fibre Channel Fibre Channel-to-SCSI TCP / IP
γ€€γ€€Applications * Mission critical, transaction-based database application processing * File sharing in NFS and CIFS
γ€€γ€€* Centralized data backup * Long-distance transmission of small data

2) blocks
γ€€γ€€* Disaster recovery * Limited read-only database access
γ€€γ€€* Centralized storage
γ€€γ€€advantages * High availability * Less distance restrictions
γ€€γ€€* Reliability of data transmission * Simplified sharing capacity of

3) additional files
γ€€γ€€* Reduced far network traffic * Easy to deploy and manage
γ€€γ€€* Flexible configuration
γ€€γ€€* High performance
γ€€γ€€* High scalability
γ€€γ€€* Centralized management

4) γ€€γ€€of many original between NAS and SAN The difference began to disappear. For example, NAS devices are gradually adopting SAN to solve problems related to storage expansion and backup and recovery. Although these two technologies are similar, NAS cannot provide the full commercial advantages that SAN brings. However, compared with traditional server-attached storage, whether it is SAN or NAS technology can reduce the user's total cost of ownership, and can provide a better return on investment.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Storage backup-the difference between SAN, NAS, DAS and its architecture FULL GUIDE WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fresh Premium Proxies daily :

1m 57s ago 91.226.5.245 49576 Elite Ukraine 1/0 499ms
2m 28s ago 61.91.61.110 80 Elite Thailand 1/0 453ms
2m 43s ago 95.143.220.5 45939 Elite Russia 5/3 341ms
2m 51s ago 95.71.125.50 49882 Elite Russia 282/260 126ms
2m 51s ago 46.241.120.230 32412 Elite Russia 1/0 1000ms
2m 51s ago 94.247.241.70 53640 Elite Russia 7/3 82ms
2m 52s ago 84.53.247.204 53281 Elite Russia 1/0 255ms
2m 52s ago 109.74.143.45 36529 Elite Russia 1/0 577ms
2m 58s ago 200.186.54.17 58855 Elite Brazil 1/0 328ms
3m 13s ago 50.246.120.125 8080 Elite United States 1/0 823ms
3m 42s ago 103.240.206.152 55740 Elite India 1/0 436ms
3m 59s ago 177.72.72.217 54468 Elite Brazil 1/0 378ms
4m 13s ago 189.14.193.242 53281 Elite Brazil 1/0 307ms
4m 14s ago 202.83.121.90 80 Elite Indonesia 1/0 495ms
4m 18s ago 36.89.129.183 38992 Elite Indonesia 3/2 819ms
4m 22s ago 203.173.92.254 53080 Elite Indonesia 3/1 163ms
4m 23s ago 111.92.164.242 33571 Elite Indonesia 3/2 702ms
4m 34s ago 122.248.45.35 53281 Elite Indonesia 2/1 156ms
4m 36s ago 117.54.13.174 34190 Elite Indonesia 1/0 1000ms
4m 54s ago 91.194.42.51 80 Elite Romania 5/2 960ms
5m 14s ago 41.190.147.158 40218 Elite Mauritius 2/1 981ms
5m 18s ago 200.54.194.13 53281 Elite Chile 1/0 292ms
5m 28s ago 41.72.203.66 40231 Elite Mauritius 3/2 277ms
5m 30s ago 45.76.43.163 8080 Elite United States 2798/945 42ms
5m 31s ago 212.200.246.24 80 Elite Serbia 1/0 414ms

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ ftp service-wu-ftpd server configuration full by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ftp service-wu-ftpd server configuration manualwu-ftpd server
instagram.com/undercodeTesting

1) In many network applications, FTP (File Transfer porotocol) has a very important position. A very important resource in the Internet is software resources. Most of the various software resources are placed in the FTP server. It can be said that FTP and WEB services account for almost 80% of the entire Internet application.

2) The FTP service can be divided into two types according to the different service objects: one is the system FTP server, which only allows legal users on the system; the other is the anonymous FTP server, Anonymous FTP Server, which can be used by anyone to log in to Go to the FTP server to get the file.


πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Select and install the FTP server software.

If you selected "ftpd" when selecting the startup process when installing the Linux system, after installing the Linux system, it has installed a default FTP server to the system. Got it. We can already use it to realize the function of the system FTP server.

2) We just need to make some personalized settings according to our needs on this basis.

3) example Washington University FTP is used in most of the Linux distributions, it is a well-known FTP server software, generally referred to as wu-ftp. It is powerful and can run well on many UNIX operating systems, such as: IBM AIX, FreeBSD, HP-UX, NeXTstep, Dynix, SunOS, Solaris, etc.

4) Therefore, more than half of FTP servers on the Internet have adopted it. wu-ftp has many powerful functions, which are very suitable for the management requirements of the FTP server with large throughput
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘starting ftp config :


1) Can compress or decompress files automatically while users download files;

2) Can set different access restrictions on machines on different networks;

3) Can record file upload and download times;

4) Can display Relevant information during transmission is convenient for users to understand the current transmission dynamics;

5) The maximum number of connections can be set, which improves efficiency and effectively controls the load.
πŸ¦‘ Second, the composition ftp config :

of wu-ftp After installing wu-ftp, you will see the following five executable files in the / bin directory:

1) ftpd FTP server program
ftpshut Used to close the FTP server program
ftpcount Show the current number of people online
ftpwho View the current FTP The connection status of the server
ckconfig Check whether the FTP server settings are correct.

2) In addition to these executable files, it also generates seven configuration files under the / etc and / var directories:

/ etc / ftpusers
/ etc / ftpaccess
/ var / run / ftp .pids
/ etc / ftpconversions
/ var / log / xferlog
/ etc / ftpgroups
/ etc / ftphosts

3) After wu-ftp is installed in the system, a special user ftp will be created, and a ftpd directory will be created under the / home directory. When logging in as anonymous, it will be automatically located in this directory. Several subdirectories are usually created under this directory.

/ home / ftpd / bin stores some executable files for FTP users
/ home / ftpd / etc stores some configuration files for FTP users
/ home / ftpd / pub stores information for downloads
/ home / ftpd / incoming stores space for uploading information

πŸ¦‘ wu-ftp configuration

1) View, modify /etc/inetd.conf file
/etc/inetd.conf file is the configuration file of inetd, the super server of LINUX system. It is responsible for listening to multiple TCP / IP ports. When it receives the request, it derives a corresponding server based on the configuration file. By using a super server, other services can be derived only when needed, thereby greatly saving system resources. The wu-ftp uses the inetd super server to monitor requests. When the super server inetd receives the FTP request from the client, it opens an FTP service process according to the configuration file. So if we want to use wu-ftp, we must confirm that there is a sentence in the inetd.conf configuration file of the super server inetd:

2) ftp stream tcp nowait root / usr / sbin / tcpd wu.ftpd

so that when the super server receives the FTP request At that time, a wu-ftp FTP service process can be derived. (Note: To confirm whether there is such a line, you can use the Find command to confirm the contents of the file:

CAT /etc/inetd.conf | grep the FTP

. If not, then manually added or modified manually

3) wu-ftpd command options
wu -ftpd is the service process of wu-ftp. It can be executed with or without parameters. The following is a brief introduction to the execution parameters of wu-ftpd.
-d When the FTP server fails, the error will be entered into the system syslog;
-l Put the FTP client connection into the system syslog every time;
-t Set the FTP client connection to cut off the connection in a few minutes without operation;
-a Make wu-ftp use the setting of / etc / ftpaccess;
-A make wu-ftp does not use the setting of / etc / ftpaccess;
-L records the program executed after the FTP client is connected in the system syslog;
-I records the log of the FTP client upload file in / usr / adm. In the xferlog file;
-o Record the log of the file downloaded by the FTP client in the / usr / adm / xferlog file.
By understanding the above parameters, we recommend to draw the line when the system is installed above the default configuration was changed:

the FTP Stream tcp nowait root / usr / sbin / tcpd wu.ftpd the -I -a


4) provide automatic compression, decompression Function
If you want the FTP server to have automatic compression and decompression functions, you must first copy some command files such as tar, gzip, gunzip, compress, and uncompress to the / home / ftpd / bin directory.

5) About the settings of / etc / ftpaccess
This configuration file is the most important configuration file on the FTP server. It is directly related to whether your FTP server can work normally, and there are many permissions settings. The following is a typical configuration example.
loginfails 3
class local real *
class remote anonymous guest *
limit remote 100 Any /etc/ftpd/toomany.msg
message /etc/ftpd/welcome.msg login
compress yes local remote
tar yes local remote
private yes
passwd-check rfc822 warn
log commands real
log transfer anonymous guest inbound outbound
log transfer real inbound
shutdown /etc/ftpd/shut.msg
delete no anonymous, guest
overwrite no anonymous, guest
rename no anonymous
chmod no anonymous, guest
umask no anonymous
upload / home / ftpd * no
upload / home / ftpd / bin no
upload / home / ftpd / etc no
upload / home / ftpd / pub yes real 0644 dirs
upload / home / ftpd / incoming yes real guest anonymous 0644 dirs
alias in / incoming
email guest@xxx.net
email guest@yyy.net
deny * .com.tw /etc/ftpd/deny.msg

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁



πŸ¦‘Below we explain sentence by sentence, and give the meaning of each setting, so that everyone can bypass the category, In order to make reasonable settings according to the specific situation of your own FTP server.


1) Format: loginfails [Number of times]
Function: Set the number of times the user is allowed to enter the wrong password when logging in to the FTP server.
Example: loginfails 3: The connection is cut off if the password is entered incorrectly three times.

2) Format: class [class name] [real / guest / anonymous] [IP address]
Function: The function of this command sets the type of user on the FTP server. It can also restrict the client's IP address, allowing access to certain IP addresses or all IP addresses. The users on the FTP server can be basically divided into the following three categories:
real users with legal accounts on the FTP server;
guest anonymous users with records;
anonymous anonymous user
instances with the lowest authority : class local real *: define a name It is a local class, which contains real users who log in anywhere (* represents all IP addresses).
class remote anonymous guest *: Define a class called remote, which contains anonymous users and guest users who log in anywhere.

3) Format: limit [category] [number of people] [time] [file name]
Function: The function of this command is to set the upper limit of the specified number of people allowed to connect in the specified category within the specified time. When the maximum number of people is reached, the content of the specified file is displayed.
Example: limit remote 100 Any /etc/ftpd/toomany.msg: At any time, when the number of remote users reaches 100, the new connection will no longer be allowed. When the 101st client wants to connect, connect Will fail and present the contents of the file /etc/ftpd/toomany.msg like a user.

4) Format: message [file name] [command]
Function: When the user executes the specified command, the system displays the specified file content.
Example: message /etc/ftpd/welcome.msg login: When the user executes the login command, that is, when logging in to the FTP server, the system will display the contents of the file /etc/ftpd/welcome.msg.

5) Format: compress [yes / no] [category]
function: set which category of users can use the compress (compression) function.
Example: compress yes local remote: allows users in both local and remote categories to use the compress function.

6) Format: tar [yes / no] [category]
function: set which category of users can use the tar (archive) function.
Example: tar yes local remote: allows both local and remote users to use the tar function.

7) Format: private [yes / no]
Function: Set whether to support group access to files.
Example: private yes: support group access to files.

8) Format: passwd-check [none / trivial / rfc822] [enforce / warn]
Function: Set the password usage for anonymous users anonymous.
none means no password verification, any password can be logged in;
trival means that as long as the entered password contains the character "@", you can log in;
rfc822 means that the password must comply with the E-Mail format specified in RFC822 to log in;
enfore means input If the password does not conform to the format specified above, you will not be allowed to log in;

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ warn means that when the password does not meet the requirements, only a warning message will appear, and you can still log in:

> Example: passwd-check rfc822 warn: I hope to be able to get the E-Mail as a password, but if not, log in is allowed.

9) Format: log command [real / guest / anonymous]
Function: Set which user's operation after logging is recorded in the file / usr / adm / xferlog.
Example: log command real: When a real user logs in, his operation is recorded. Because other users have lower permissions, the operation will not cause too much security risks, so generally only need to record the operation of the real user.

10) Format: log transfers [real / guest / anonymous] [inbound / outbound]
Function: Set which users' upload (inbound) and download (outbound) operations do logs.
Example: log transfer anonymous guest inbound outbound: For anonymous users to pay more attention to their file operations, so no matter uploading or downloading are recorded.
log transfer real inbound: For legitimate users, only his upload record is recorded.

11) Format: shutdown [file name]
Function: The time when the FTP server is shut down can be set in the file specified later. When the set time is up, you cannot log in to the FTP server. To recover, only delete this file. This file must be generated by the command / bin / ftpshut.
Example: shutdown /etc/ftpd/shut.msg

12) Format: delete [yes / no] [real / anonymous / guest]
Function: Set whether to allow the specified user to delete files using the delete command. The default is allow.
Example: delete no anonymous, guest: In order to better manage the FTP server, under normal circumstances, we do not allow anonymous users to execute the delete command.

13) Format: overwrite [yes / no] [real / anonymous / guest]
Function: Set whether to allow the specified user to overwrite the file with the same name. The default is allow.
Example: overwrite no anonymous, guest: In order to better manage the FTP server, under normal circumstances, we do not allow anonymous users to overwrite files with the same name.

14) Format: rename [yes / no] [real / anonymous / guest]
Function: Set whether to allow the specified user to rename the file using the rename command. The default is allow.
Example: delete no anonymous: In order to better manage the FTP server, under normal circumstances, we do not allow anonymous users to execute the rename command to change the file name. Anonymous users with records are appropriately relaxed to allow them to use the rename command.

15) Format: chmod [yes / no] [real / anonymous / guest]
Function: Set whether to allow specified users to change file permissions using chmod command. The default is allow.
Example: delete no anonymous, guest: In order to better manage the FTP server, in general, we do not allow anonymous users to execute the chmod command to change file permissions.

16) Format: umask [yes / no] [real / anonymous / guest]
Function: Set whether to allow the specified user to use the umask command. The default is allow.
Example: delete no anonymous: In order to better manage the FTP server, under normal circumstances, we do not allow anonymous users to execute the umask command.

17) Format: upload [root directory] [upload directory] [yes / no] [user] [permissions] [dirs / nodirs]
Function: make more detailed settings for directories that can be uploaded.
Example: upload / home / ftpd * no: indicates that uploading is not allowed under the subdirectory / home / ftpd;
upload / home / ftpd / bin no: indicates that uploading is not allowed under the subdirectory / home / ftpd / bin;
upload / home / ftpd / etc no: indicates that uploading is not allowed in the subdirectory / home / ftpd / etc;
upload / home / ftpd / pub yes real 0644 dirs: allows legal users on the server to be in the subdirectory / home / ftpd / pub directory You can upload files with permission 0644 (that is, -rw-r--r--), and you can create new subdirectories under this directory.

>
πŸ¦‘ now lets configure a anonymous dirs on ftp
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ upload / home / ftpd / incoming yes real guest anonymous 0644 dirs:

1) Allow all users to upload files with permissions 0644 in the subdirectory / home / ftpd / incoming, and in this directory can create a new subdirectory.

2) Format: alias [directory alias] [directory name]
Function: set an alias for the specified directory, you can use a shorter directory alias when switching directories.
Example: alias inc: / incoming: set an alias inc: for the subdirectory incoming.

3) Format: email [guest's E-Mail address]
Function: As long as certain E-Mail addresses are set in this place, then when these users log in to the FTP server, his identity will be guest, and the general authority is lower than real, than anonymous high.
Example: email guest@xxx.net email guest@yyy.net: This is just an example, in fact, it can contain multiple E-Mail addresses that meet the specifications.

4) Format: deny [IP address / domain name] [description file]
Function: This setting can restrict users whose IP addresses or domain names cannot log in to the FTP server.
Example: deny * .com.tw /etc/ftpd/deny.msg: Set any domain name whose domain name ends with ".com.tw" to prohibit its access. The content of /etc/ftpd/deny.msg is displayed to the user.

5) Set / etc / ftpuser to prohibit certain users from logging in
Sometimes we need to prohibit some users from using FTP services. In fact, this setting is very simple, only need to write the user account to be banned to the file / etc / ftpuser. Due to the security of the system, we generally do not want users with too much authority and some users with the same command name to enter the FTP server. So in the default configuration, generally the following users have been added to the "blacklist".

root
uucp
news
bin
adm
nobody
lp
sync
shutdown
halt
mail

6) Set / etc / ftphosts to prohibit certain logins from specified machines. If you need to refuse logins from certain hosts, one way is to set them in / etc / ftpaccess The deny command, another simpler method is to write the IP address or domain name of the host you want to ban in / etc / ftphosts.

7) Make the new configuration take effect
So far, we have been able to make necessary modifications and adjustments to the FTP server configuration according to our needs. And after we reconfigure, we must make it effective. In general, the configuration of / etc / ftpaccess is directly applied to the next FTP service process after setting. For others, restart the inetd process.

> Use of some other commands related to wu-ftp
>Connection count command ftpcount
We can use the ftpcount command to clearly count the number of users currently connected to the FTP server, and also list the upper limit. The command output is as follows:

8) Service class local 0 Users (20maximum)
Service class remote 5 Users (100maximum)

> Online user view command ftpwho
We can use the ftpwho command to clearly list the details of the currently connected users.
5.4.2 FTP shutdown file generation command ftpshut
We can use the ftpshut command to generate a shutdown.msg file set in / etc / ftpaccess for shutdown settings. The format of the ftpshut command is:

9) Ftpshut <-l min> <-d min> time <Description>

-l This parameter sets how many minutes before closing the FTP server function to stop the user's connection;
-d This parameter is set to close FTP How many minutes before the server function to disconnect the user connection;
time specifies the time to close the FTP server. For example, 6:20 points are written as 0620;

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Download files from ftp server via script any distro <? php by undercode :


/ **
* function name php_ftp_download
* function download file from ftp server
* entry parameter
* filename the name of the file to be downloaded, including the path
* /
function php_ftp_download ($ filename) {
$ phpftp_host = "ftplocalhost"; // server Address
$ phpftp_port = 21; // server port
$ phpftp_user = "name"; // username
$ phpftp_passwd = "passwrd"; // password
$ ftp_path = dirname ($ filename). "/"; // get path
$ select_file = basename ($ filename); // Get the file name

$ ftp = ftp_connect ($ phpftp_host, $ phpftp_port); // Connect to the ftp server
if ($ ftp) {
if (ftp_login ($ ftp, $ phpftp_user, $ phpftp_passwd)) { // Login
if (@ftp_chdir ($ ftp,$ ftp_path)) {// Enter the specified path
$ tmpfile = tempnam (getcwd (). "/", "temp"); // Create unique temporary file
if (ftp_get ($ ftp, $ tmpfile, $ select_file, FTP_BINARY)) {// Download the specified file to File
ftp_quit ($ ftp); // Close the connection
header ("Content-Type: application / octet-stream");
header ("Content-Disposition: attachment; filename =". $ Select_file);
readfile ($ tmpfile);
unlink ($ tmpfile); // delete temporary file
exit;
}
unlink ($ tmpfile);
}
}

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁