expand for answer

Anonymous File Transfer Protocol (FTP)

A method for downloading public files using the File Transfer Protocol. Anonymous FTP is called anonymous because users do not provide credentials before accessing files from a particular server. In general, users enter the word “anonymous” when the host prompts for a username; anything can be entered for the password, such as the user’s email address or simply the word “guest. ” In many cases, an anonymous FTP site will not even prompt for a name and password.


Similar items:
A solution that provides a storage space for users to keep their credentials when single sign on (SSO) isn’t available. Users can store credentials for websites and network resources that require a different set of credentials. The management system secures the credentials with encryption to prevent unauthorized access.
[view]
A method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server. IMAP permits a “client” email program to access remote message stores as if they were local. For example, email stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages of files back and forth between these computers. IMAP can be regarded as the nextgeneration POP. A protocol used to transfer email messages from an email server to an email client.
[view]
Authentication protocol that allows PPP peers to authenticate one another. The remote router attempting to connect to the local router is required to send an authentication request. Unlike CHAP, PAP passes the password and hostname or username in the clear (unencrypted). PAP does not itself prevent unauthorized access, but merely identifies the remote end. The router or access server then determines if that user is allowed access. PAP is supported only on PPP lines. Compare with CHAP.
[view]
A set of communications protocols that encompasses media access, packet transport, session communications, file transfer, electronic mail, terminal emulation, remote file access, and network management. TCP/IP provides the basis for the Internet. The structure of TCP/IP is as follows: Process layer clients: FTP, Telnet, SMTP, NFS, DNS; Transport layer service providers: TCP (FTP, Telnet, SMTP), UDP (NFS, DNS); Network layer: IP (TCP, UDP); and Access layer: Ethernet (IP), Token ring (IP).
[view]
Token used in a token device that generates passwords at fixed time intervals. Time interval tokens require that the clock of the authentication server and the token device be synchronized. The generated password is entered by the subject along with a PIN, passphrase, or password.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in