Monday, August 1, 2016

FTP Server Software Free

FTP server is the application software required on networks that wish to support share files using file transfer protocol. This page lists the best FTP servers available for Windows operating system. Evaluation versions can be downloaded each of these FTP server software products from vendor sites.

1.WS_FTP Server

WS_FTP Server is an option to meet evolving needs. Although it costs more than FTP servers competitors, it's extremely powerful and full-featured. WS_FTP Server supports 128-bit SSL encryption, and a nice installation wizards complete administrative GUI. It also features an inline Log Analyzer. WS_FTP Server is designed to run on Windows servers are true; runs on operating system Windows NT and Windows 2000 operating system and the operating system Windows XP.

2. war FTP daemon

FTP daemon war FTP is free software which is also "open source" in the current development. It works on most popular Windows versions and is designed for a range of basic needs. War FTP has developed over many years, and has proved itself as a server "FTP Windows" freeware is stable and mature.
Vendor's site

3. zFTPServer suite

Now in version 3.0, zFTPServer Suite still Server "FTP Windows" for free, and gained a loyal following. It features a multilingual user interfaces, flexible access control IP addresses and accounts, the negative mode connections, as well as active. ZFTPServer supports all popular Windows operating systems (except Windows Vista) and is designed for ease of use before the beginning-and intermediate level users. Some third party extensions available to zFTPServer to get advanced functionality, enterprise-level cost extra.

4.FileZilla Server

Most Windows Server free download FTP, FileZilla Server project "open source" community is particularly active with both full source code and binary downloads available. FileZilla connected user IDs server tracks all sessions and each file transfer.
Vendor's site

5. Serv-u FTP server

Serv-u strikes a good balance between cost and features and stability. Serv-u is one of the most mature Windows FTP servers. Over time, it has been revamped user interface, added support for SSL, and improve overall robustness. Serv-u works on all versions of Windows including Windows 95 and Windows 98 as well as Windows NT basic regulations for Windows latest popularity. It's affordable.
Vendor's site

6. Xlight FTP server

Xlight FTP Server Personal Edition is free for use by individuals, while the standard and professional editions are also available. Xlight features for businesses, Active Directory service, LDAP integration, support 128-bit SSL, supporting the virtual server and Remote Administration GUI. It also supports IPv6 networks.
Vendor's site

7. Golden FTP server

This FTP server is designed for simplicity and those unfamiliar with FTP or Server Manager. The free version supports multiple languages but does not support advanced statistics and user accounts, and other options are available in the upgrade version.

Thursday, July 21, 2016

File Transfer Protocol (FTP)

FTP merupakan salah satu protokol Internet yang paling awal dikembangkan, dan masih digunakan hingga saat ini untuk melakukan pengunduhan (download) dan penggugahan (upload) berkas-berkas komputer antara klien FTP dan server FTP. Sebuah Klien FTP merupakan aplikasi yang dapat mengeluarkan perintah-perintah FTP ke sebuah server FTP, sementara server FTP adalah sebuah Windows Service atau daemon yang berjalan di atas sebuah komputer yang merespons perintah-perintah dari sebuah klien FTP. Perintah-perintah FTP dapat digunakan untuk mengubah direktori, mengubah modus pengiriman antara biner dan ASCII, menggugah berkas komputer ke server FTP, serta mengunduh berkas dari server FTP.

Sebuah server FTP diakses dengan menggunakan Universal Resource Identifier (URI) dengan menggunakan format ftp://namaserver. Klien FTP dapat menghubungi server FTP dengan membuka URI tersebut.

FTP menggunakan protokol Transmission Control Protocol (TCP) untuk komunikasi data antara klien dan server, sehingga di antara kedua komponen tersebut akan dibuatlah sebuah sesi komunikasi sebelum pengiriman data dimulai. Sebelum membuat koneksi, port TCP nomor 21 di sisi server akan "mendengarkan" percobaan koneksi dari sebuah klien FTP dan kemudian akan digunakan sebagai port pengatur (control port) untuk (1) membuat sebuah koneksi antara klien dan server, (2) untuk mengizinkan klien untuk mengirimkan sebuah perintah FTP kepada server dan juga (3) mengembalikan respons server ke perintah tersebut. Sekali koneksi kontrol telah dibuat, maka server akan mulai membuka port TCPnomor 20 untuk membentuk sebuah koneksi baru dengan klien untuk mengirim data aktual yang sedang dipertukarkan saat melakukan pengunduhan dan penggugahan.

FTP hanya menggunakan metode autentikasi standar, yakni menggunakan username dan password yang dikirim dalam bentuk tidak terenkripsi. Pengguna terdaftar dapat menggunakan username dan password-nya untuk mengakses, men-download, dan meng-upload berkas-berkas yang ia kehendaki. Umumnya, para pengguna terdaftar memiliki akses penuh terhadap beberapa direktori, sehingga mereka dapat membuat berkas, membuat direktori, dan bahkan menghapus berkas. Pengguna yang belum terdaftar dapat juga menggunakan metode anonymous login, yakni dengan menggunakan nama pengguna anonymous dan password yang diisi dengan menggunakan alamat e-mail.

Secure Shell (SSH)

Secure Shell (SSH) adalah sebuah protokol jaringan kriptografi untuk komunikasi data yang aman, login antarmuka baris perintah, perintah eksekusi jarak jauh, dan layanan jaringan lainnya antara dua jaringan komputer. Ini terkoneksi, melalui saluran aman atau melalui jaringan tidak aman, server dan klien menjalankan server SSH dan SSH program klien secara masing-masing. Protokol spesifikasi membedakan antara dua versi utama yang disebut sebagai SSH-1 dan SSH-2.

Aplikasi yang paling terkenal dari protokol ini adalah untuk akses ke akun shell pada sistem operasi mirip Unix, tetapi juga dapat digunakan dengan cara yang sama untuk akun pada Windows. Ia dirancang sebagai pengganti Telnet dan protokol remote shell lainnya yang tidak aman seperti rsh Berkeley dan protokol rexec, yang mengirim informasi, terutama kata sandi, dalam bentuk teks, membuat mereka rentan terhadap intersepsi dan penyingkapan menggunakan penganalisa paket. Enkripsi yang digunakan oleh SSH dimaksudkan untuk memberikan kerahasiaan dan integritas data melalui jaringan yang tidak aman, seperti Internet.

Create a CNAME record

Each hosting service has a slightly different way to create CNAME records. When in doubt, check with the particular company you're using for additional instructions.
  1. Log in to your account at
  2. Open the Domains tab.
  3. Select My Domain Names. You'll be directed to the Domain Manager page.
  4. Click the domain that you'd like to use with your blog.
  5. At the bottom of the "Total DNS" section, click Total DNS Control and MX Records.
  6. In the box labeled "CNAMES," click Add New CNAME Record. If you've already created a CNAME record for your blog's address, click the pencil icon next to the existing CNAME record.
  7. In the "Name" section, enter your subdomain. For example, if you picked as your address, enter www.
  8. In the "Host name" section, enter <YOUR DOMAIN> Specify a TTL or use the default setting of 1 hour. For example, if you picked as your address,
  9. Click OK.
  10. In the box labeled "CNAMES," click Add New CNAME Record again.
  11. In the "Name" section, enter the short security token.
  12. In the "Host name" section, Enter the long security token. Specify a TTL or use the default setting of 1 hour.
  13. Click OK > OK.

Other hosting services

  1. Log in to your account on your hosting service's website.
  2. Go to the DNS management page.
  3. Since CNAME records are special Domain Name Service (DNS) records, they may be in sections like "DNS Management" or "Name Server Management." It's possible that you will have to turn on advanced settings to create a CNAME record.
  4. Delete existing CNAME entries for the address you want to use with your blog.
  5. Before entering a new CNAME record to point to Google, delete any existing entries for the same alias. If you plan to transfer an existing web address to Blogger, you may want to copy any content currently at that address elsewhere first.
  6. Use the information in the following table when you create your CNAME record.
  7. If your service requires you to enter server information directly into the DNS tables, the entry below needs to have a type CNAME associated with them.
Host Name/Alias: www
This is the part of your website's address that you designated. For example, if is your address, enter www.
Value/Destination: <YOUR DOMAIN>
For example, if you chose as the address,

Friday, September 16, 2011

How to Register Domain Free. Tk (dot tk)

Actually right now or at the time this article was created, I am a new user a free domain. Tk (dot tk) because before I used to use a free domain like. or the like. If you know about the story does have quite a long time of om Google but only now that I have free time for tried it, it's known since the world of IT development is very rapid, automated many new things as well in the IT world should I learn. But unfortunately I can not afford the brain's ability to learn everything as fast as lightning. hehe .. Maybe that's because I just could factor taking the time now.
Okay, back to the subject. There have been many blogs or websites that explain everything about the domain of this one so I will not describe here, perhaps in another article I will try to explain. So just go ahead,

Here are step by step How to Register Domain Free. Tk (dot tk):
  • Login first to his website here:
  • When the page loads it will appear that gives us two options, namely Get a Free. TK Domain Name and Shorten a long web address. Select the first option as shown below:
  • Ithe column with the domain name / website that we want to make or Register a then click "GO".
  • If successful or a domain name is still available, in the sense that no one has used it it will show a page to the next step like this:
  • In the section "Use your new domain" select / click: Use DNS.
  • In the column "tab of your personal control", there are some options:
The first option: If you want to use it through Blogger hosting, then the contents of both the "Server name" with: (IP address leave blank).

Option two: If want to use another Webhost, for example then fill in the first column "Server name" with: then in the second column content by: (IP address leave blank).
  • Next fill in the column and should be the same character / line with the characters that appear at the top of the column.
  • Click the "Sign up" at the bottom of the page:
  • On the sign-up we provided two options: first by way of social accounts through our network that is so, for example: Facebook, Google accounts, Yahoo! etc. .. Then the second choice by creating a new account using the email address.
  • Let me quickly, we just use the first option to one that is with socially Account Sign in using our network. Incidentally here I use a Google account, so I explained him that through Google, yes .. :) But use other accounts as well as any aliases there are no striking differences. Just click the options button and then enter the Username / Email your Google account (if you want to sign in via a Google account) and also enter the Password / her password and Log / Log.
  • Having successfully entered, a dialog box as shown below, click "Allow".
  • Now we just connect the domains. Tk is already ready to use it through the settings we use your webhost. Suppose we want to redirect the domain. Tk us to blogger, click on "My Domains" located on the left page, then "Register my domain" and click "Change" button.
  •  Options appear as shown below below and select "Use Dot TK DNS Service Guide" then click "Configure".
  • Once it's set its DNS Service, in the Type field: "CNAME", Host Name: your domain name, IP address: then click "Continue" button at the bottom right of the page.
  • If successful then the words "Change has been updated" and now lives its settings in Blogger.

    Tuesday, February 1, 2011

    IPv6 Basics III - IPv6 Addressing

    The IPv6 Address Space

    The most obvious distinguishing feature of IPv6 is its use of much larger addresses. The size of an address in 

    IPv6 is 128 bits, which is four times the larger than an IPv4 address. A 32-bit address space allows for 232 or 4,294,967,296 possible addresses. A 128-bit address space allows for 2128 or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4´1038 or 340 undecillion) possible addresses.

    In the late 1970s when the IPv4 address space was designed, it was unimaginable that it could be exhausted. 

    However, due to changes in technology and an allocation practice that did not anticipate the recent explosion of hosts on the Internet, the IPv4 address space was consumed to the point that by 1992 it was clear a replacement would be necessary.

    With IPv6, it is even harder to conceive that the IPv6 address space will be consumed. To help put this number in perspective, a 128-bit address space provides 655,570,793,348,866,943,898,599 (6.5´1023) addresses for every square meter of the Earth’s surface.

    It is important to remember that the decision to make the IPv6 address 128 bits in length was not so that every square meter of the Earth could have 6.5´1023 addresses. Rather, the relatively large size of the IPv6 address is designed to be subdivided into hierarchical routing domains that reflect the topology of the modern-day Internet. The use of 128 bits allows for multiple levels of hierarchy and flexibility in designing hierarchical addressing and routing that is currently lacking on the IPv4-based Internet.

    The IPv6 addressing architecture is described in RFC 4291.


    IPv6 Address Syntax

    IPv4 addresses are represented in dotted-decimal format. This 32-bit address is divided along 8-bit boundaries. Each set of 8 bits is converted to its decimal equivalent and separated by periods. For IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons. The resulting representation is called colon-hexadecimal.

    The following is an IPv6 address in binary form:                                       
    0010000000000001000011011011100000000000000000000010111100111011 0000001010101010000000001111111111111110001010001001110001011010

    The 128-bit address is divided along 16-bit boundaries:
    0010000000000001   0000110110111000   0000000000000000   0010111100111011   0000001010101010   0000000011111111   1111111000101000   1001110001011010   

    Each 16-bit block is converted to hexadecimal and delimited with colons. The result is:

    IPv6 representation can be further simplified by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. With leading zero suppression, the address representation becomes:

    Compressing Zeros

    Some types of addresses contain long sequences of zeros. To further simplify the representation of IPv6 addresses, a contiguous sequence of 16-bit blocks set to 0 in the colon hexadecimal format can be compressed to “::”, known as double-colon.

    For example, the link-local address of FE80:0:0:0:2AA:FF:FE9A:4CA2 can be compressed to FE80::2AA:FF:FE9A:4CA2. The multicast address FF02:0:0:0:0:0:0:2 can be compressed to FF02::2.

    Zero compression can only be used to compress a single contiguous series of 16-bit blocks expressed in colon hexadecimal notation. You cannot use zero compression to include part of a 16-bit block. For example, you cannot express FF02:30:0:0:0:0:0:5 as FF02:3::5. The correct representation is FF02:30::5.

    To determine how many 0 bits are represented by the “::”, you can count the number of blocks in the compressed address, subtract this number from 8, and then multiply the result by 16. For example, in the address FF02::2, there are two blocks (the “FF02” block and the “2” block.) The number of bits expressed by the “::” is 96 (96 = (8 – 2)´16).

    Zero compression can only be used once in a given address. Otherwise, you could not determine the number of 0 bits represented by each instance of “::”.

    IPv6 Prefixes


    The prefix is the part of the address that indicates the bits that have fixed values or are the bits of the subnet prefix. Prefixes for IPv6 subnets, routes, and address ranges are expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in address/prefix-length notation. 

    For example, 21DA:D3::/48 and 21DA:D3:0:2F3B::/64 are IPv6 address prefixes.

    Note  IPv4 implementations commonly use a dotted decimal representation of the network prefix known as the subnet mask. A subnet mask is not used for IPv6. Only the prefix length notation is supported.

    Types of IPv6 Addresses


    There are three types of IPv6 addresses:

    1.   Unicast
    A unicast address identifies a single interface within the scope of the type of unicast address. With the appropriate unicast routing topology, packets addressed to a unicast address are delivered to a single interface.

    2.   Multicast
    A multicast address identifies multiple interfaces. With the appropriate multicast routing topology, packets addressed to a multicast address are delivered to all interfaces that are identified by the address. A multicast address is used for one-to-many communication, with delivery to multiple interfaces.

    3.   Anycast
    An anycast address identifies multiple interfaces. With the appropriate routing topology, packets addressed to an anycast address are delivered to a single interface, the nearest interface that is identified by the address. 

    The “nearest” interface is defined as being closest in terms of routing distance. An anycast address is used for one-to-one-of-many communication, with delivery to a single interface.

    In all cases, IPv6 addresses identify interfaces, not nodes. A node is identified by any unicast address assigned to one of its interfaces.

    Note  RFC 4291 does not define a broadcast address. All types of IPv4 broadcast addressing are performed in IPv6 using multicast addresses. For example, the subnet and limited broadcast addresses from IPv4 are replaced with the link-local scope all-nodes multicast address of FF02::1.

    Links and Subnets

    Similar to IPv4, an IPv6 subnet prefix is assigned to a single link. Multiple subnet prefixes can be assigned to the same link. This technique is called multinetting.

    IPv6 Basics II - Differences Between IPv4 and IPv6

    Source and destination addresses are 32 bits (4 bytes) in length.
    Source and destination addresses are 128 bits (16 bytes) in length. For more information, see “IPv6 Addressing.”
    IPsec support is optional.
    IPsec support is required. For more information, see “IPv6 Header.”
    No identification of packet flow for QoS handling by routers is present within the IPv4 header.
    Packet flow identification for QoS handling by routers is included in the IPv6 header using the Flow Label field. For more information, see “IPv6 Header.”
    Fragmentation is done by both routers and the sending host.
    Fragmentation is not done by routers, only by the sending host. For more information, see “IPv6 Header.”
    Header includes a checksum.
    Header does not include a checksum. For more information, see “IPv6 Header.”
    Header includes options.
    All optional data is moved to IPv6 extension headers. For more information, see “IPv6 Header.”
    Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IPv4 address to a link layer address.
    ARP Request frames are replaced with multicast Neighbor Solicitation messages. For more information, see “Neighbor Discovery.”
    Internet Group Management Protocol (IGMP) is used to manage local subnet group membership.
    IGMP is replaced with Multicast Listener Discovery (MLD) messages. For more information, see “Multicast Listener Discovery.”
    ICMP Router Discovery is used to determine the IPv4 address of the best default gateway and is optional.
    ICMP Router Discovery is replaced with ICMPv6 Router Solicitation and Router Advertisement messages and is required. For more information, see “Neighbor Discovery.”
    Broadcast addresses are used to send traffic to all nodes on a subnet.
    There are no IPv6 broadcast addresses. Instead, a link-local scope all-nodes multicast address is used. For more information, see “Multicast IPv6 Addresses.”
    Must be configured either manually or through DHCP.
    Does not require manual configuration or DHCP. For more information, see “Address Autoconfiguration.”
    Uses host address (A) resource records in the Domain Name System (DNS) to map host names to IPv4 addresses.
    Uses host address (AAAA) resource records in the Domain Name System (DNS) to map host names to IPv6 addresses. For more information, see “IPv6 and DNS.”
    Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.
    Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names. For more information, see “IPv6 and DNS.”
    Must support a 576-byte packet size (possibly fragmented).
    Must support a 1280-byte packet size (without fragmentation). For more information, see “IPv6 MTU.”