Understanding FTP Server along with functions, how to work and sample FTP Server applications

Understanding FTP Server along with functions, how to work and sample FTP Server applications

Before discussing about FTP Server We must first understand what is meant by FTP or that has the length of File Transfer Protocol. File Transfer Protocol (FTP) is the definition of a network protocol usually used for exchanging data or files interchangeably using an intermediary TCP connection.

Data exchange activities can be done in two directions, so that all connected can do the upload and download likewise otherwise. The process of exchanging data on FTP also involves two services namely FTP Server and FTP Client.

In this occasion the authors will focus more on the discussion on FTP Server only, covering the understanding, function and how the FTP Server works itself. As the name implies FTP Server is the definition of a Server or a parent device that is running an FTP service (data exchange or file). The existence of this FTP Server has a very vital position and should exist as a condition of FTP service occurrence.

FTP Server functions
Identify Routing types based on multiple aspects

Identify Routing types based on multiple aspects

The term "routing" is known in the World Networking world. Routing is a process of sending data using a router tool that is capable of sending data packets over the Internet or network to its destination.

The routing process occurs on the third layer (i.e. the network layer, e.g. Internet Protocol) of the seven-layer OSI stack protocol.

In order to run the routing process, things to be aware of in the router are its destination address, the various routers involved in order to learn a network remote that was created, and the best router on each network.

Information about the router is stored in the routing table, which tells you how to find the network remote.

Types of Routing
The types of routing can be differentiated based on the nature of routing, routed and routing protocols and class in routing protocols. For more details below, it will be explained about the sharing of routing types:

A. Based on Nature Routing
Know the characteristics of Firewall and its artist in computer network

Know the characteristics of Firewall and its artist in computer network

Have you ever heard the term firewall? What kind of firewall character do you know? A Firewall is a combination of hardware and software.

Firewalls are useful for splitting a computer network into two or more parts so that the data contained therein remains safe. There is also a defining firewall as a security system that is on a network that is useful to protect the computer from various outside attacks that can come at any time.

Another use of firewalls is to restrict or control the person who is about to enter and access the data contained within a computer network. The Firewall also refers to a communication organizer that is performed by two networks that have the same character or type. Firewalls have their own features or characteristics. Then what kind of firewall characteristics? Here's the answer for you.

Firewall characteristics
Know the definition of Telnet and its history, functions and how it works

Know the definition of Telnet and its history, functions and how it works

Know the definition of Telnet and its history, functions and how it works
For some people may have never heard this term, a technology on the network that is commonly referred to as Telnet. The definition of Telnet or Telecommunication Network is a client-server protocol that can provide access to the computer remotely (Remote).

This Telnet device is commonly abbreviated to TN and can also be interpreted as a virtual or terminal emulation utilizing that protocol with the same purpose of accessing a remote computer.

In addition to login or access other computers Telnet is also commonly used to access various public services such as catalogs, libraries or other types of databases. In other words we can connect to each other and access between computers over the network. It is believed to be easier than giving the application to all users who want to access.

It is now a lot of emerging software-special software Remote such as Team Viewer and other-others. But still for its use requires an Internet connection and because it has a special function for the Remote from a further distance Team Viewer also requires the ID and Password of the target computer. In Telnet usage is more or less the same but without involving outside software (using the Command Line on the computer) as well as a smaller distance.

History of Telnet
5 Computer network components you should know

5 Computer network components you should know

If you are talking about the components of a computer network, then we will discuss what components are used to form a computer network.

A computer network is a set of computers interconnected between one and another through a network. There are many types of networks that we know of which each of these networks have their own functions and usability.

The purpose of this computer network to make it easier to do data transfer transaction where we only need to send through the network so that later can get to the computer that we are aiming.

Computer network components
In creating a computer network, you need some of the components we'll describe below.

1. PC or Personal components
Right and standard compliant Straight and Crossover cable (UTP cable)

Right and standard compliant Straight and Crossover cable (UTP cable)

In building a computer network, you will know the term UTP cable. Then, what is the UTP cable? UTP or Unshielded Twisted Pair is a type of data cable that is often used to connect between the same device or different devices, such as computers with computers, computers with other devices (routers, switches, printers, servers, access points and hubs).

Most people use UTP cables only to limit building a LAN (Local Area Network) network. The price is relatively cheap and easy to obtain, making this UTP cable often used. However, according to the name of the UTP cable is not equipped with a protective (Unshielded) so that the cable is not resistant to the presence of electromagnetic interference.

UTP cables consist of cables that are arranged in between. Basically, the cables that will be compiled in number 8 with different color arrangement, where the cable is wrapped into 4 pairs. There are two models that are making UTP cable, straight and crossover. Do you know what is a straight or crossover model in the preparation of UTP cables?

In this article, it will be explained and discussed in detail about the understanding of straight cables and straight wiring arrangement. Discussed also about the understanding of crossover cables and crossover cable arrangement. Immediately, you can read more about this.

Standard UTP Cable
In general, there is an international standard used in the color sequence of UTP cable is TIA/EIA 568A and TIA/EIA 568B.
Understanding IP Address and function and class IP Address on computer network

Understanding IP Address and function and class IP Address on computer network

For those who are concentrating on the field of computer networks or the Internet world will surely often hear and interact with the name IP Address. Computer network is a form of telecommunications network connected to several computers with the purpose of interacting and mutual exchange – exchanging data.

Generally all computer networks are designed with a client-server model. There are computers that serve as servers and some computers that act as clients or members. The use of IP Address in this case is as the identity of each-each computer that acts as a server or as a client. Similarly, in Internet activity, the use of IP Address is also the naming or identity of each – the host computer.

At the base of his IP Address is a combination of numbers in certain digits and separated by dots. To be able to determine the use of IP Address on each computer, of course also need the fundamentals of knowledge and deep understanding.

Although it reads the guidelines but without any understanding of course everyone will have trouble implementing IP Address. Therefore we will describe and explain in detail the understanding of IP Address and its functions to you. In addition, you will also know the classes in the IP Address.

Understanding IP Address
Essentially the Internet Protocol Address or commonly called IP Address is a binary line of numbers compiled with a range between 32 bits and 128 bits and is used as the identification address on each computer. In computer network science the use of numbers with 32 bits is used in the IP Address specific version of IPv4 while for numbers 128 bits for which the IPv6 version.
Proxy definition and function and how Proxy works in computer network

Proxy definition and function and how Proxy works in computer network

When someone through their personal computer using a proxy Internet network is trying to surf the internet, the user's computer identity (IP address) will be visible to the website requested.

Sometimes, if you are not careful, this IP address can be misused by others, such as to spread viruses, malware, or even retrieve personal user data such as email passwords, bank passwords, and so on.

To prevent the user's IP address from being clearly visible, we can use a proxy that bridges the personal computer with the Internet network. The following will be explained in more detail regarding proxy definitions, proxy functions, proxy types, and how it works.

Proxy definitions
Simply put, a proxy is a computer server that serves to forward user requests to other servers on the Internet. In the same time, this proxy server is a connection between personal computer and Internet network. Proxy itself has several kinds of usability, among others:

  1. To hide the IP address of the client/user's computer, so anyone can surf anonymously without leaving a trace of the IP address on the Web page visited. For example, if a client visits Google through a proxy server, then Google will see that visiting it is a proxy server, not the client, so that Google can also not track the user's client position.
  2. Surf faster on the Internet. All requests from client computers will reach the proxy server first. Then the proxy will check if the Web page that the user visited already has caching stored or not. If there is, then the client will get feedback from the data caching, so that the client can surf faster on the Internet.
  3. To block an unwanted site. Suppose for the Internet network in offices, so that workers in the Office do not utilize the Internet to play social media and watch, then some sites can be included in the blacklist proxy so that it is not accessible through the office network.

Proxy function
Understanding VPN along with the functions and workways of VPN on computer network

Understanding VPN along with the functions and workways of VPN on computer network

One of the things that Internet users need to note is security when surfing the Internet, how to make it when the computer is connected to a wide network, stay on the safe path so that it is not utilized by irresponsible parties. To overcome this, one way is to utilize a VPN.

This VPN is very useful for those of you who do not want to geo-location or your identity tracked by other parties while being surfing the internet, also to avoid hackers attacks when there is in public places.

More about VPN will be discussed in this article, from the understanding of VPN, VPN function, and how VPN works.

Understanding VPN
Understanding Modem and Modem functions and modem types on the computer network

Understanding Modem and Modem functions and modem types on the computer network

One of the hardware required to connect a computer with the Internet is a modem. Not many people understand that the name of the modem itself stands for the process of how it works.

The Modem also has many types with advantages and disadvantages respectively. In this article, it will be discussed about the understanding of modems, modem functions, modem types, and how the modem works.

Definition of Modem

The MODEM itself is an acronym of the Demodulator Modulator. This means that the device can function as a modulator and also a demodulator. The modulator itself means that the information signal modifier becomes the signal of the carrier to send.

Meanwhile, the demodulator is a separator between the information signal and the carrier signal, so that a data can be received perfectly. Broadly, the modem can be divided into two types, the internal modem and the external modem. The explanation of the two is shown in the following points:


1. Internal Modem
Understanding Computer Networks: benefits, types and kinds of computer networks

Understanding Computer Networks: benefits, types and kinds of computer networks

Radio, television, telephone have become part of human life. With the rapid growth of technology, the role of the Internet has become greater in today's life.

With the presence of the Internet, dissemination of information is becoming faster accepted by various communities, even if they live far away in different continents with us. They will still be able to receive the latest information only with the Internet.

Internet is one of the computer networks that are still being used by many people to support their activities, whether they communicate, sell online and so on. What we cover this time is not about the Internet, but about the computer network. Do you know understanding of computer networks? And what are the benefits that we can take from the computer network?

Understanding Computer Networks

A computer network is a system consisting of two or more computers that connect with each other through transmission media or communication media so that they can share data, applications or share computer hardware.

The term computer network itself can also be interpreted as a collection of a number of communication terminals consisting of two or more interconnected computers. The purpose of the computer network is to have the information/data that the transmitter can bring to the receiver precisely and accurately.

Computer networks allow users to easily communicate with each other. In addition, the role of computer networking is indispensable to integrate data between client computers so that the relevant data is obtained.

Computer network Benefits
Understanding Cloud Computing with advantages, disadvantages and how Cloud Computing works

Understanding Cloud Computing with advantages, disadvantages and how Cloud Computing works

With the rapid growth of technology and information, many new terms emerge. One is a technology called Cloud Computing or in Bahasa Indonesia known as cloud computing.

The term Cloud or cloud is actually a depiction of the Internet technology itself. Often we see an internet diagram covered or in a cloud-shaped symbol. Cloud computing technology is quite popular and began to be widely demanded and utilized in all areas such as for storage media, industry, industrial development and many more.

In this article, the author wants to explain more about cloud computing technology, including the definition or understanding of cloud computing, the way it works and its advantages and disadvantages when used. Our hope is that in addition to introducing people who are still public about cloud computing, it is also a medium of learning for you who want to use it or just curious. Just jump into the full review of the cloud computing sense you can see below:

Understanding Cloud Computing
How to override slow Default DNS into a fast Google DNS or OpenDNS

How to override slow Default DNS into a fast Google DNS or OpenDNS

As a human being, we are unlikely to memorize the entire IP address of all websites/websites in this world. Well, DNS is very helpful in terms of translating and converting the domain name into an IP address that makes us need not bother to remember the entire IP address we want to visit.

DNS also helps mapping a computer's host name to the IP address of an Internet-connected application. The main concept is that DNS is a distributed database or storage space used to facilitate the searching of information on the Internet path of the hostname and domain name of a site.

DNS often does not respond or encounters an error so you can't connect to the site you want to go to or your Internet connection is very slow. No need to worry, you can fix any problems with DNS, without the help of a computer expert.

This article will tell you how to override the default DNS to Google DNS or OpenDNS. Let's see the steps below.



How to change the Default DNS to Google DNS/OpenDNS

Have you ever experienced an Internet connection that often broke or lelet when your Internet network could be said to be good or you already paid expensive? Well, the failed or slow internet connection may be because the DNS server used by the ISP or Internet service provider is insufficient in serving the customer.

The main cause is that the number of users always exceeds the maximum limit of the ISP's so that the traffic is overloaded. This issue can be resolved by replacing DNS to Google DNS or OpenDNS. This DNS itself has been claimed as the fastest DNS.

#1 replacing DNS through Control Panel
The Google company has its own DNS named Google DNS with its DNS server address 8.8.8.8 and 8.8.4.4. Google DNS has the advantage of being faster than ISP DNS. For security issues, Google DNS is more a DNS cache issue that prevents hackers from taking control of an IP address. Follow the steps below.

1. Right click the Network icon as below screenshot shown. The network icon can be a signal image (if connected to WiFi) and display the computer (if connected to a LAN). Next select Open Network and Sharing Center.
How to create a free SSH account easily? Here's the steps!

How to create a free SSH account easily? Here's the steps!

This article I will explain about how to create a free SSH account without having to pay a penny. Before that, already did you know what is SSH?

Secure Shell or people more commonly refer to it as SSH is a network protocol that allows one to perform data exchanges over a secure network. Usually this SSH account is used by the quota as I used to internetan free with a pretty fast speed.

How to create a free SSH account

Exchanging data using SSH is very secure as all the by data will be encrypted so it is safe from viruses or malware. Steps to create a free SSH account easily and not Ribet:

1. Create a free SSH account at FastSSH.com

1. First of all visit the site fastssh.com. Then on the main page, choose which country you want. Here I want to create an SSH account located in Singapore, so select Select in Asia.
Understanding Ring topology and its advantages and disadvantages

Understanding Ring topology and its advantages and disadvantages

There are several types of network topology that you can use, such as the topology of Bus, star, ring, tree and mesh. Each of these types of topologies must have their own advantages and challenges.

To select a network topology, there are some considerations that you should look at from connectivity, cost, speed, size, to the environment.

For this time will be discussed further about ring topology. As the name suggests, this type of topology does have a form of ring-like circuit because on the circuit each one is connected to another 2 points. Then what are the ring topology characteristics? And what are the advantages and disadvantages of the ring topology when used? Here is more complete explanation of the ring topology definition.

Understanding Ring Topology
Understanding network cable and its functions, advantages and disadvantages

Understanding network cable and its functions, advantages and disadvantages

For those of you who often access the Internet using a computer, of course it is no stranger to the network cable. If there is no network cable, then of course you will not be able to access the Internet through your computer.

Although now there are many who use wireless or who do not need cables because of its practical use and easy installation, but still many people who use a network cable as one way to Connect a computer with an Internet connection.

The use of this network cable has the primary purpose of connecting communications that occur between one computer and another computer and can be used to share files. Network cables also have several types where each type of cable has its own characteristics. Well here will be discussed more detail about the understanding of network cable, network cable function and the advantages and disadvantages of network cables.

Understanding Network Cable
Gopher's sense of function and how Gopher works

Gopher's sense of function and how Gopher works

There are several kinds of Internet services that you can currently use, ranging from email (electronic mail), Mailing List, Telnet, File Transfer Protocol, Newsgroup, Internet Relay Chat, World Wide Web (WWW), Gopher, and many more.

The function of this Internet service, of course, allows you to access the Internet, ranging from personal life information, hobbies, personal development, business, economics, forums, and so on. This time will be discussed further on one of the existing Internet services, namely Gopher.

Gopher itself is a software application in which it contains menus regarding information retrieval systems. But unfortunately, nowadays it is very rare that people use gopher applications, maybe even almost nothing. But it doesn't hurt if you listen to the following Gopher's understanding.

Understanding Gopher

Ghoper is a software application which is composed of menus of information retrieval system. Sites that use Gopher services or protocols are actually menus that represent existing information and data.

Basically, the menu here is the table of contents to process and show certain information. This Gopher service uses FTP as a way in file Exchange as well as Telnet (Tele Networking) on certain server connections. Although the current gopher services are rarely used, there are still a few small populations that still become active servers.
Understanding the linear topology and its advantages and disadvantages

Understanding the linear topology and its advantages and disadvantages

Computer network topology in telecommunication can also be interpreted as a way that can connect between telecommunication device and other device. So it can form a network.

The network will then relate to each other and form data communication. There are several types of network topology that is often widely used, ranging from bus topology, star topology, Ring topology, linear topology and many others.

Each of these types of network topology has the advantages and disadvantages of each. This time it will be discussed further on linear topology or Runtut topology. It is called a topological topology due to its sequential layout and includes a fairly common layout. Here's a further explanation of the linear notion of topology.

Understanding Linear Topology
Understanding the Peer to Peer topology and its advantages and disadvantages

Understanding the Peer to Peer topology and its advantages and disadvantages

Nowadays there are many types of network topology used by the community. Starting from the bus topology, mesh topology, ring topology, Linear topology, star topology, peer to peer topology.

Of course the use of the type and each of these network topologies differ from one another. Each type of topology has the advantages and disadvantages of each of which use you have to adjust to the needs. This time, however, will be discussed further on the peer to peer topology.

This type of topology is actually quite simple because the installation uses only two computers connected to each other. So this type of topology only use one cable to do the data exchange process. Here is further explanation on the understanding of peer to peer topology and the advantages and disadvantages of using peer to peer topology.
15 How to accelerate a powerful and proven successful Internet connection

15 How to accelerate a powerful and proven successful Internet connection

As we know that the Internet seems to be a major necessity in our lives. With this internet, we can connect with various people with ease, looking for any information as fast as lightning, selling products without having to come face to face and so forth.

The Internet speed we use greatly affects our activities, especially for those of you who work in the office. Think of it now that you are overtime working on a project that the end of tomorrow should be completed. And you need an Internet connection to scratch your project. But the Internet connection that you use is very lelet and discourages you in working on the project, it is definitely very upset and irritated, right?

Therefore, in the following article will be explained in detail about how to speed up Internet connection easily and guaranteed to be powerful.

How to accelerate Internet connection (powerful)
I will divide this article into 2 parts, namely speed up Internet connection in terms of software and hardware. These two sections relate to each other, so it's advisable for you to apply them one by one.

A. In terms of software
Speed up Internet connection in terms of software can be done by scanning your PC/laptop, check which applications consume a lot of Internet data, delete browsing history and so on. The full discussion can be seen below:

1. Check your internet speed
The first thing you have to do is check your internet speed. To do this, you can use Ookla's online tool, which is speedtest.net. This is done so that the Internet service you use is as expected.

Suppose you subscribe to the Indihome Internet service with a package of 10MB, then you deserve the speed according to the service offered, which is 10MB. It could be that you subscribe to the 10MB package but you get 512KB speed to make your Internet connection slow. Therefore, you need to check your Internet speed in advance.

Below is the result of my internet speed. I subscribed to Indihome with a 10MB package and after I check it, the speed is indeed more or less the same as mentioned.