In Feburary 2016 30,
Look at the first block of digits in your time stamp. The first numbers will be the date an event took place.
Look at the first number in the 'date' block of digits in your time stamp. If you're in the United States, the first number in this 'date' block will be the month. If you're anywhere else in the world, the first number will be the day.
Look at the second number in the 'date' block of digits in your time stamp. If you're in the United States, the second number will be the day. If you're anywhere else in the world, the second number will be the month.
Look at the third number in the 'date' block of digits in your time stamp. No matter where you are, this third number will always be your year. You now have the information you need to determine exactly what month, date and year a time stamp represents.
Look at the second block of numbers to the right of the date block in your time stamp. This second block of numbers is the 'time' block. The first number represents the hour in which an event took place. The second number represents the minute in which an event took place, and the third number represents the seconds in which an event took place.
In Feburary 2016 30,
Showing posts with label numbers. Show all posts
Showing posts with label numbers. Show all posts
Tuesday, 1 March 2016
Monday, 29 February 2016
How to Calculate Ean13 BarcodesIn Feburary 2016 29,
In Feburary 2016 29,
Locate the 12th digit in the barcode. If the check digit is not yet in place, this is the last digit from the left. If the check digit is in place, this is the second to last digit from the left.
For example, if your EAN-13 was 97 35940 56482 4, the 12th digit is the No. 2.
Starting with this 12th digit, move from right to left across the code adding every second digit to it. Using our example code of 97 35940 56482 4, this means starting with the No. 2 and adding to it the numbers 4, 5, 4, 5 and 7, giving a total of 27.
Multiply the sum obtained in Step 2 by 3. Using our example above, this means the multiplying of 27 by 3, giving a total of 81.
Locate the 11th digit in the code. Using our example code of 97 35940 56482 4, this would be the No. 8.
Starting with the 11th digit, move from right to left across the code adding every second digit to it. Using our example of 97 35940 56482 4, this means starting with the No. 8 and adding to it 6, 0, 9, 3 and 9, giving a total of 35.
Add the results from Step 3 and Step 5. In our example this means adding 81 and 35, giving a total of 116.
Round the result of Step 6 up to the nearest multiple of 10. In our example, this means rounding 116 up to 120.
Subtract the result of Step 7 from the result of Step 6. In our example, this is 120-116, giving us a difference of 4. This 4 should be the 13th number in the EAN-13, otherwise known as the check digit.
In Feburary 2016 29,
Locate the 12th digit in the barcode. If the check digit is not yet in place, this is the last digit from the left. If the check digit is in place, this is the second to last digit from the left.
For example, if your EAN-13 was 97 35940 56482 4, the 12th digit is the No. 2.
Starting with this 12th digit, move from right to left across the code adding every second digit to it. Using our example code of 97 35940 56482 4, this means starting with the No. 2 and adding to it the numbers 4, 5, 4, 5 and 7, giving a total of 27.
Multiply the sum obtained in Step 2 by 3. Using our example above, this means the multiplying of 27 by 3, giving a total of 81.
Locate the 11th digit in the code. Using our example code of 97 35940 56482 4, this would be the No. 8.
Starting with the 11th digit, move from right to left across the code adding every second digit to it. Using our example of 97 35940 56482 4, this means starting with the No. 8 and adding to it 6, 0, 9, 3 and 9, giving a total of 35.
Add the results from Step 3 and Step 5. In our example this means adding 81 and 35, giving a total of 116.
Round the result of Step 6 up to the nearest multiple of 10. In our example, this means rounding 116 up to 120.
Subtract the result of Step 7 from the result of Step 6. In our example, this is 120-116, giving us a difference of 4. This 4 should be the 13th number in the EAN-13, otherwise known as the check digit.
In Feburary 2016 29,
Sunday, 28 February 2016
Network Solutions: How to Upload to FTP in Internet ExplorerIn Feburary 2016 28,
In Feburary 2016 28,
Open Internet Explorer.
Type in the top search box 'ftp://' appended with the appropriate FTP address. For example, if the FTP address is ftp.Microsoft.com, type 'ftp://ftp.Microsoft.com' in the search box. The FTP address could also be a set of four numbers separated by dots, such as 127.0.0.1; in this case, type in 'ftp://127.0.0.1.'
Enter your FTP user name and password and then click the 'Log On' button. Files will appear in the open window. Earlier versions of Internet Explorer will open the FTP site inside the Internet Explorer window. More recent versions of Internet Explorer will automatically open Windows Explorer and display the FTP site in that window.
Upload Files to the FTP Site
Click 'Start,' type 'Windows Explorer' in the search box and press 'Enter.'
Position Windows Explorer side by side with the open FTP window by dragging the Windows Explorer window to the left and the FTP window to the right.
Navigate in Windows Explorer to the file you want to upload to the FTP site. Click and drag the file from the left Windows Explorer window to the FTP window. The file will be uploaded to the FTP site.
In Feburary 2016 28,
Open Internet Explorer.
Type in the top search box 'ftp://' appended with the appropriate FTP address. For example, if the FTP address is ftp.Microsoft.com, type 'ftp://ftp.Microsoft.com' in the search box. The FTP address could also be a set of four numbers separated by dots, such as 127.0.0.1; in this case, type in 'ftp://127.0.0.1.'
Enter your FTP user name and password and then click the 'Log On' button. Files will appear in the open window. Earlier versions of Internet Explorer will open the FTP site inside the Internet Explorer window. More recent versions of Internet Explorer will automatically open Windows Explorer and display the FTP site in that window.
Upload Files to the FTP Site
Click 'Start,' type 'Windows Explorer' in the search box and press 'Enter.'
Position Windows Explorer side by side with the open FTP window by dragging the Windows Explorer window to the left and the FTP window to the right.
Navigate in Windows Explorer to the file you want to upload to the FTP site. Click and drag the file from the left Windows Explorer window to the FTP window. The file will be uploaded to the FTP site.
In Feburary 2016 28,
Tuesday, 16 February 2016
Kerberos StepIn Feburary 2016 16,
In Feburary 2016 16,
Before you begin setting up Kerberos on your system, you should know the name of your Kerberos, the hostname of the master and slave Key Distribution Centers (KDC) and how you are going to map your hostnames in the Kerberos realm. You will need to determine the ports that the KDCs and the database access (kadmin) services will use. You will also have to know how frequently the master and slave KDCs will fill the database.You will use the above information to configure the master KDC. The master KDC configuration files will be found at '/etc/krb5.conf' and '/usr/local/var/krb5kdc/kdc.conf' and can be edited in any text editor. The 'krb5.conf' file contains information about where to locate the KDCs and admin servers, as well as the host name mapping information. The 'kdc.conf' file contains the default information used when issuing Kerberos tickets. Open the '/etc/krb5.conf' and edit the 'login,' 'realms' and 'domain_realm' values so that they are correct for your system. Change the '/usr/local/var/krb5kdc/kdc.conf' so that it reflects the correct information for your KDC server.The next step is to create the database. Open a terminal and type the command 'kdb5_util.' You will be asked to provide a master key. This should be a string of letters, numbers and special characters similar to a password. This key will be stored in a stash file on the KDC's hard drive. If you would rather be prompted for the key whenever Kerberos starts, you can choose to not create the stash file.Finally, you will create the Access Control List (ACL) and add at least one administrator to it. The ACL is a user created text file that is called '/usr/local/var/krb5kdc/kadm5.acl.' This file should have the administrator listed in the form:
Kerberos_principal permissions [target_principal] [restrictions]
Once the ACL list is created, issue the command 'kadmin.local' and add each principal to the database. Start the Kerberos daemons with the command '/usr/local/sbin/krb5kdc; /usr/local/sbin/kadmin.'
Creating the Keytab File
The keytab file is used to decrypt the Kerberos tickets and determine whether the user should have access to the database. In order to create this file, type the command 'kadmin.local' again. This will provide you with a prompt where you will type the command: 'ktadd -k /usr/local/var/krb5kdc/kadm5.keytab kadmin/admin kadmin/changepw' to create the keytab file. Replace the section '/usr/local/var/krb5kdc/kadm5.keytab' with the keytab location that was specified in the '/usr/local/var/krb5kdc/kdc.conf' file. Type 'quit' to exit the 'kadmin' utility.
Configuring the Slave KDCs
To create the slave KDCs, you will issue the 'kadmin.local' command a third time. At the prompt, issue the command 'addprinc-randkey host/example.com' for the Master and each slave. Use the host name of each KDC in place of 'example.conf.' This will create host keys for each of the KDCs. Next, extract the keys on each of the slave KDCs by starting the 'kadmin' utility on each of the slaves and issuing the command 'ktadd host/MasterKDC.com.' Replace 'MasterKDC.com' with the host name of the master KDC.For the database to be propagated from the master KDC to the slave KDCs you will have to create a file called '/usr/local/var/krb5kdc/kpropd.acl.' This file must contain the principals for each of the KDCs in the form 'host/example.com.' Each principal should be placed on its own line. Next, edit the '/etc/inetd.conf' file on each of the KDCS and add the following lines:
krb5_prop stream tcp nowait root /usr/local/sbin/kpropd kpropd
eklogin stream tcp nowait root /usr/local/sbin/klogind klogind -k -c -eEdit the '/etc/services' file on each of the KDCs and add the following lines:
kerberos 88/udp kdc # Kerberos authentication (udp)
kerberos 88/tcp kdc # Kerberos authentication (tcp)
krb5_prop 754/tcp # Kerberos slave propagation
kerberos-adm 749/tcp # Kerberos 5 admin/changepw (tcp)
kerberos-adm 749/udp # Kerberos 5 admin/changepw (udp)
eklogin 2105/tcp # Kerberos encrypted rlogin
Propagating the Database
Propagating the database is done from the Master KDC. Issue the command '/usr/local/sbin/kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans' to create a dump of the database. Next, issue the command ' /usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans Slave-1.example.com' to manually propagate the database on each of the slaves. These steps will need to be completed on a regular basis. The easiest way to do this is to create as script and run the script as a cron job. The script should look like:!/bin/sh
kdclist = 'slave-1.example.com slave-2.example.com'/usr/local/sbin/kdb5_util 'dump
=> /usr/local/var/krb5kdc/slave_datatrans'for kdc in $kdclist
do
/usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans $kdc
done
Of course, change the host names to reflect the values for your system.
Create Stash Files on the Slaves
The final step to setting up Kerberos is to create stash files on the slave KDCs. On each of the slave KDCs issue the command 'kdb5_util stash' and provide the master key when prompted. Once that is completed, you can start the 'krb5kdc' daemon on each slave with the command '/usr/local/sbin/krb5kdc/.'
In Feburary 2016 16,
Before you begin setting up Kerberos on your system, you should know the name of your Kerberos, the hostname of the master and slave Key Distribution Centers (KDC) and how you are going to map your hostnames in the Kerberos realm. You will need to determine the ports that the KDCs and the database access (kadmin) services will use. You will also have to know how frequently the master and slave KDCs will fill the database.You will use the above information to configure the master KDC. The master KDC configuration files will be found at '/etc/krb5.conf' and '/usr/local/var/krb5kdc/kdc.conf' and can be edited in any text editor. The 'krb5.conf' file contains information about where to locate the KDCs and admin servers, as well as the host name mapping information. The 'kdc.conf' file contains the default information used when issuing Kerberos tickets. Open the '/etc/krb5.conf' and edit the 'login,' 'realms' and 'domain_realm' values so that they are correct for your system. Change the '/usr/local/var/krb5kdc/kdc.conf' so that it reflects the correct information for your KDC server.The next step is to create the database. Open a terminal and type the command 'kdb5_util.' You will be asked to provide a master key. This should be a string of letters, numbers and special characters similar to a password. This key will be stored in a stash file on the KDC's hard drive. If you would rather be prompted for the key whenever Kerberos starts, you can choose to not create the stash file.Finally, you will create the Access Control List (ACL) and add at least one administrator to it. The ACL is a user created text file that is called '/usr/local/var/krb5kdc/kadm5.acl.' This file should have the administrator listed in the form:
Kerberos_principal permissions [target_principal] [restrictions]
Once the ACL list is created, issue the command 'kadmin.local' and add each principal to the database. Start the Kerberos daemons with the command '/usr/local/sbin/krb5kdc; /usr/local/sbin/kadmin.'
Creating the Keytab File
The keytab file is used to decrypt the Kerberos tickets and determine whether the user should have access to the database. In order to create this file, type the command 'kadmin.local' again. This will provide you with a prompt where you will type the command: 'ktadd -k /usr/local/var/krb5kdc/kadm5.keytab kadmin/admin kadmin/changepw' to create the keytab file. Replace the section '/usr/local/var/krb5kdc/kadm5.keytab' with the keytab location that was specified in the '/usr/local/var/krb5kdc/kdc.conf' file. Type 'quit' to exit the 'kadmin' utility.
Configuring the Slave KDCs
To create the slave KDCs, you will issue the 'kadmin.local' command a third time. At the prompt, issue the command 'addprinc-randkey host/example.com' for the Master and each slave. Use the host name of each KDC in place of 'example.conf.' This will create host keys for each of the KDCs. Next, extract the keys on each of the slave KDCs by starting the 'kadmin' utility on each of the slaves and issuing the command 'ktadd host/MasterKDC.com.' Replace 'MasterKDC.com' with the host name of the master KDC.For the database to be propagated from the master KDC to the slave KDCs you will have to create a file called '/usr/local/var/krb5kdc/kpropd.acl.' This file must contain the principals for each of the KDCs in the form 'host/example.com.' Each principal should be placed on its own line. Next, edit the '/etc/inetd.conf' file on each of the KDCS and add the following lines:
krb5_prop stream tcp nowait root /usr/local/sbin/kpropd kpropd
eklogin stream tcp nowait root /usr/local/sbin/klogind klogind -k -c -eEdit the '/etc/services' file on each of the KDCs and add the following lines:
kerberos 88/udp kdc # Kerberos authentication (udp)
kerberos 88/tcp kdc # Kerberos authentication (tcp)
krb5_prop 754/tcp # Kerberos slave propagation
kerberos-adm 749/tcp # Kerberos 5 admin/changepw (tcp)
kerberos-adm 749/udp # Kerberos 5 admin/changepw (udp)
eklogin 2105/tcp # Kerberos encrypted rlogin
Propagating the Database
Propagating the database is done from the Master KDC. Issue the command '/usr/local/sbin/kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans' to create a dump of the database. Next, issue the command ' /usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans Slave-1.example.com' to manually propagate the database on each of the slaves. These steps will need to be completed on a regular basis. The easiest way to do this is to create as script and run the script as a cron job. The script should look like:!/bin/sh
kdclist = 'slave-1.example.com slave-2.example.com'/usr/local/sbin/kdb5_util 'dump
=> /usr/local/var/krb5kdc/slave_datatrans'for kdc in $kdclist
do
/usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans $kdc
done
Of course, change the host names to reflect the values for your system.
Create Stash Files on the Slaves
The final step to setting up Kerberos is to create stash files on the slave KDCs. On each of the slave KDCs issue the command 'kdb5_util stash' and provide the master key when prompted. Once that is completed, you can start the 'krb5kdc' daemon on each slave with the command '/usr/local/sbin/krb5kdc/.'
In Feburary 2016 16,
How to Point DNS With NameCheapIn Feburary 2016 16,
In Feburary 2016 16,
Navigate to your current Web hosting service where you would like to host your domain name and website. Log on to your account, and from the 'Control Panel' locate the information that indicates the nameservers. These appear as 'NS000.WebHostName.com' with the zeros representing the numbers of the nameserver. There will be two nameservers listed. Write both of them down on the piece of paper -- you will be inputting this information elsewhere.
Login to your NameCheap account.
Place your cursor over the 'My Account' button and click the 'Manage Domains' link that appears in the drop-down menu.
Click on the domain name you want to change.
Find the menu on the left side of the 'Modify Domain' page and click the 'Domain Name Server Setup' link.
Click the 'Specify Custom DNS Servers' button.
Enter the names of the nameservers you wrote down earlier.
Click the 'Save Changes' button.
In Feburary 2016 16,
Navigate to your current Web hosting service where you would like to host your domain name and website. Log on to your account, and from the 'Control Panel' locate the information that indicates the nameservers. These appear as 'NS000.WebHostName.com' with the zeros representing the numbers of the nameserver. There will be two nameservers listed. Write both of them down on the piece of paper -- you will be inputting this information elsewhere.
Login to your NameCheap account.
Place your cursor over the 'My Account' button and click the 'Manage Domains' link that appears in the drop-down menu.
Click on the domain name you want to change.
Find the menu on the left side of the 'Modify Domain' page and click the 'Domain Name Server Setup' link.
Click the 'Specify Custom DNS Servers' button.
Enter the names of the nameservers you wrote down earlier.
Click the 'Save Changes' button.
In Feburary 2016 16,
Labels:
inputting,
Login,
NameCheap,
nameserver,
nameservers,
NS000,
numbers,
representing,
WebHostName,
zeros
Monday, 15 February 2016
How to Run a Home Madden TournamentIn Feburary 2016 15,
In Feburary 2016 15,
Confirm and finalize your participants. Nothing can throw a tournament into chaos quite like participants who either are late or fail to arrive. Ensure everyone who says they will take part in your tournament actually arrives.
Set up your bracket. If there are many players, you can set the bracket placement by writing numbers on sheets of paper and having participants taking them out of a hat. Refer to the link for a sample bracket layout.If you have an odd number of players, you can have a play-in game to see who will advance into your tournament.
Determine your rules. If you are playing a single-elimination tournament, where the player is eliminated after one loss, say so. If it is a double-elimination tournament, have a second 'loser' bracket set up for the losers to battle it out for third.
Prepare each game. Before the participants ever pick up a controller, set each game's difficulty, quarter times and other in-game options. Do this before each game so that the playing field is even.
In Feburary 2016 15,
Confirm and finalize your participants. Nothing can throw a tournament into chaos quite like participants who either are late or fail to arrive. Ensure everyone who says they will take part in your tournament actually arrives.
Set up your bracket. If there are many players, you can set the bracket placement by writing numbers on sheets of paper and having participants taking them out of a hat. Refer to the link for a sample bracket layout.If you have an odd number of players, you can have a play-in game to see who will advance into your tournament.
Determine your rules. If you are playing a single-elimination tournament, where the player is eliminated after one loss, say so. If it is a double-elimination tournament, have a second 'loser' bracket set up for the losers to battle it out for third.
Prepare each game. Before the participants ever pick up a controller, set each game's difficulty, quarter times and other in-game options. Do this before each game so that the playing field is even.
In Feburary 2016 15,
Tuesday, 9 February 2016
How to Create a MySQL TableIn Feburary 2016 09,
In Feburary 2016 09,
Write the skeleton of the CREATE command. In this example, the table is named 'customers.' Replace 'customers' with the name of the table you want to create. Example:
CREATE TABLE customers (
);
Create an id column. All tables should have an id column to uniquely identify that row, since two rows can exist with identical data. Without an id column, it would be impossible to tell the two rows apart.
Define the id column as an integer. It should also be an AUTO_INCREMENT column. This means MySQL keeps track of the id numbers for you in sequential order. Example:
id INTEGER AUTO_INCREMENT,
Remember that an AUTO_INCREMENT column is also required to be a primary key and add this line. Example:
PRIMARY KEY (id)
Create a string column using the VARCHAR column type. A VARCHAR(n) will hold up to n characters but no more, so be sure to choose an n that's large enough to hold all the data you'll need, yet short enough so it won't waste space. Example:
name VARCHAR(32),
Create a real number column. A 'real' number is anything but an integer. If, for example, you want to store a customer's balance, you'll need to store cents as well as dollars, so a FLOAT column type is also necessary. Example:
balance FLOAT,
Create an integer column. Here an INTEGER is used to track the number of purchases a customer has made. Example:
purchases INTEGER,
Create a date column. This example uses a DATE column to store the date of the first purchase. Example:
customer_since DATE,
Put the column types together. The command can be on multiple lines to make it easier to read and to store in files. The MySQL command-line client also allows for commands to be entered this way. Example:
CREATE TABLE customers (
id INTEGER AUTO_INCREMENT, name VARCHAR(128),
address VARCHAR(512),
ph_number VARCHAR(20),
email VARCHAR(64), balance FLOAT, purchases INTEGER, customer_since DATE, PRIMARY KEY (id)
);
In Feburary 2016 09,
Write the skeleton of the CREATE command. In this example, the table is named 'customers.' Replace 'customers' with the name of the table you want to create. Example:
CREATE TABLE customers (
);
Create an id column. All tables should have an id column to uniquely identify that row, since two rows can exist with identical data. Without an id column, it would be impossible to tell the two rows apart.
Define the id column as an integer. It should also be an AUTO_INCREMENT column. This means MySQL keeps track of the id numbers for you in sequential order. Example:
id INTEGER AUTO_INCREMENT,
Remember that an AUTO_INCREMENT column is also required to be a primary key and add this line. Example:
PRIMARY KEY (id)
Create a string column using the VARCHAR column type. A VARCHAR(n) will hold up to n characters but no more, so be sure to choose an n that's large enough to hold all the data you'll need, yet short enough so it won't waste space. Example:
name VARCHAR(32),
Create a real number column. A 'real' number is anything but an integer. If, for example, you want to store a customer's balance, you'll need to store cents as well as dollars, so a FLOAT column type is also necessary. Example:
balance FLOAT,
Create an integer column. Here an INTEGER is used to track the number of purchases a customer has made. Example:
purchases INTEGER,
Create a date column. This example uses a DATE column to store the date of the first purchase. Example:
customer_since DATE,
Put the column types together. The command can be on multiple lines to make it easier to read and to store in files. The MySQL command-line client also allows for commands to be entered this way. Example:
CREATE TABLE customers (
id INTEGER AUTO_INCREMENT, name VARCHAR(128),
address VARCHAR(512),
ph_number VARCHAR(20),
email VARCHAR(64), balance FLOAT, purchases INTEGER, customer_since DATE, PRIMARY KEY (id)
);
In Feburary 2016 09,
Labels:
AUTO_INCREMENT,
data,
Define,
identical,
impossible,
integer,
means,
MySQL,
numbers,
track
Saturday, 6 February 2016
How to Download FTP Files With Internet ExplorerIn Feburary 2016 06,
In Feburary 2016 06,
Find the address of the FTP server that you want to connect to. FTP servers owned by large corporations are usually identified by a name. For example, the address of the public Microsoft FTP server is ftp.Microsoft.com. A privately owned FTP server may not have a domain name. If an FTP server does not have a domain name, it is identified by an IP address, such as 192.168.0.1.
Find the port number of the FTP server. The standard port number for FTP servers is 21. If the port number is not mentioned, it is generally safe to assume that it uses port 21. Private servers often use nonstandard port numbers to avoid unwanted connection attempts.
Open Internet Explorer. Click in the address bar at the top of the screen, where you would normally type a website address. Type 'ftp' followed by a colon and two backslashes, then type the address of the FTP server. If the server uses a port number other than 21, type a colon followed by the port number. For example, if you wanted to connect to the Microsoft FTP server, you would type 'ftp://ftp.Microsoft.com' and press 'Enter.' If you wanted to connect to a server at the IP address 192.168.0.1 and using the port number 2000, you would type 'ftp://192.168.0.1:2000' and press 'Enter.'
Type the user name and password if prompted, then click the 'Log On' button. If the FTP server is private, the user name and password must be provided to you by the administrator in order to connect. Public FTP servers such as the one owned by Microsoft allow 'anonymous' connections, meaning that you are not prompted for a user name and password. Once you are connected, a list of folders is displayed. Think of these as being similar to the folders on your computer. Each is identified by a blue clickable link.
Click a blue link to browse into that folder. As you browse through the folders of the FTP site, you will begin to see files. Files can be identified by the extensions displayed, such as '.ZIP' or .RAR.' The size of each file (in bytes) is displayed in the column to the left of the file name.
Click the name of a file to download it. An Internet Explorer download window opens.
Click the 'Save' button. Browse to the location where you want to save the file--such as the desktop--and click 'Save' again to download the file.
In Feburary 2016 06,
Find the address of the FTP server that you want to connect to. FTP servers owned by large corporations are usually identified by a name. For example, the address of the public Microsoft FTP server is ftp.Microsoft.com. A privately owned FTP server may not have a domain name. If an FTP server does not have a domain name, it is identified by an IP address, such as 192.168.0.1.
Find the port number of the FTP server. The standard port number for FTP servers is 21. If the port number is not mentioned, it is generally safe to assume that it uses port 21. Private servers often use nonstandard port numbers to avoid unwanted connection attempts.
Open Internet Explorer. Click in the address bar at the top of the screen, where you would normally type a website address. Type 'ftp' followed by a colon and two backslashes, then type the address of the FTP server. If the server uses a port number other than 21, type a colon followed by the port number. For example, if you wanted to connect to the Microsoft FTP server, you would type 'ftp://ftp.Microsoft.com' and press 'Enter.' If you wanted to connect to a server at the IP address 192.168.0.1 and using the port number 2000, you would type 'ftp://192.168.0.1:2000' and press 'Enter.'
Type the user name and password if prompted, then click the 'Log On' button. If the FTP server is private, the user name and password must be provided to you by the administrator in order to connect. Public FTP servers such as the one owned by Microsoft allow 'anonymous' connections, meaning that you are not prompted for a user name and password. Once you are connected, a list of folders is displayed. Think of these as being similar to the folders on your computer. Each is identified by a blue clickable link.
Click a blue link to browse into that folder. As you browse through the folders of the FTP site, you will begin to see files. Files can be identified by the extensions displayed, such as '.ZIP' or .RAR.' The size of each file (in bytes) is displayed in the column to the left of the file name.
Click the name of a file to download it. An Internet Explorer download window opens.
Click the 'Save' button. Browse to the location where you want to save the file--such as the desktop--and click 'Save' again to download the file.
In Feburary 2016 06,
Labels:
assume,
attempts,
avoid,
Connection,
generally,
nonstandard,
numbers,
Open,
safe,
unwanted
Thursday, 4 February 2016
How Do I Change My Linksys NAT Settings?In Feburary 2016 04,
In Feburary 2016 04,
Locate the IP address of the computer that you want to change the NAT settings for. Go to 'Start --> Run.' In the run window, type in the command 'cmd.exe'. This will open up a command window. Type 'ipconfig' at the command line. When you see the line 'IP V4 address,' write down the numbers that follow. They will be in the form of four numbers separated by dots, like so: 192.168.1.4. Write this number down.
Open up a web browser and type in the following address 'http://192.168.1.1'. You will be prompted for your Netgear's admin login and password. If you haven't changed the default settings, login with the username 'admin' and password 'password' (no quotes).
Scroll odwn to the bottom of the administration menu. Look on the left-hand side of the screen, underneath the 'Advanced' section. Click the button marked 'Port Forwarding.'
Select the protocol that you want to change the NAT settings for, either 'HTTP' (for web services, such as a proxy server) or 'FTP' (for FTP servers).
Type the IP address of the computer that you looked up in Step 1 in the 'Server' box. In the drop-down menu, select the 'TCP/UDP' option. Click the 'Apply' button.
In Feburary 2016 04,
Locate the IP address of the computer that you want to change the NAT settings for. Go to 'Start --> Run.' In the run window, type in the command 'cmd.exe'. This will open up a command window. Type 'ipconfig' at the command line. When you see the line 'IP V4 address,' write down the numbers that follow. They will be in the form of four numbers separated by dots, like so: 192.168.1.4. Write this number down.
Open up a web browser and type in the following address 'http://192.168.1.1'. You will be prompted for your Netgear's admin login and password. If you haven't changed the default settings, login with the username 'admin' and password 'password' (no quotes).
Scroll odwn to the bottom of the administration menu. Look on the left-hand side of the screen, underneath the 'Advanced' section. Click the button marked 'Port Forwarding.'
Select the protocol that you want to change the NAT settings for, either 'HTTP' (for web services, such as a proxy server) or 'FTP' (for FTP servers).
Type the IP address of the computer that you looked up in Step 1 in the 'Server' box. In the drop-down menu, select the 'TCP/UDP' option. Click the 'Apply' button.
In Feburary 2016 04,
Subscribe to:
Comments (Atom)