Skip to main content

How to Setup an FTP Server in Windows 7

Hey guys, 

 Assalamu Alaikum...

 This is Tom... ✌✌ ************************* 

 now i will show you how to setup an #FTP server in Janala 7 (Windows 7)
😂 ************************* 
 I will show you how you can install an FTP Web server along with your IIS in Windows 7....... 

first,
 1. Go to Programs, Control Panel, Programs and Features, Then click on “Turn Windows features On or Off”....
 2. Now from the list that opens, locate the option for Internet Information Services and select FTP Server. Click on OK. Installation will take some time..... 
 3. After your FTP server is installed, you can check the installation using an ftp client by entering localhost as the hostname and 21 as the port number..... 
***
 some additional steps for configuring the FTP sites and servers to work: *. Open the IIS Manager *. 
In the tree view (on the far right), right-click “Server (ServerUser)” and select “Add FTP Site…” *. 
The Wizard window will now open and you will enter in a name for your Site where it says FTP Site Name and all process  are step by step Like pic.. 

*next
*next

 once you’ve done this, IIS will have your FTP server listed under Web Sites so you can configure it.....

 *******************************Its a Short tutorial...don't worry guys Video tutorial Coming soon......
and sorry for my Shitty english😐😐.Please stay with Us.... Thank you....

Comments

Popular posts from this blog

TCP Flood & IP Spoofing Tutorial - Hping3 (With Effective Tricks)

hping is a command-line oriented TCP/IP packet assembler/analyzer. Using hping3 you are able to perform at least the following stuff: Test firewall rules Testing Network performance using different protocols, packet size, TOS (type of service) and fragmentation Remote OS fingerprinting. TCP/IP stack auditing Today, we will use hping3 for testing network performance. In other words we will use it to do DDOS Attack Tests. We can start “Help Document” by typing “hping3 --help” on the command line. Hping3 Important Parameters :  The flood parameter : Activates the fastest packet sending mode The destport(p) parameter : Specifies the destination port The spoof(a) parameter : Specifies which IP Adress is to be spoofed The rand-source parameter : Activates the random source address mode Although the above parameters are important, it should be selected which flag is set to determine the main attack type.  Main Attack Types :  The syn(S) parameter: Specifies tha

Top 110 Free Proxy Sites – Best Free Proxy Servers List 2017

Sometimes you may face problem while accessing some websites either it says this webpage is not available or this website/url has been blocked. If you still want to access a useful website from a place where it is blocked, the best way to access a blocked website is by using a proxy websites. Proxy sites can open restricted website which are blocked in colleges, schools, government offices, IP restricted etc. Proxy sites not only help you to access blocked websites, it also help to surf internet anonymously. Proxy sites are very easy to use. They redirect your network traffic through their servers so that you can access those websites because their servers are not blocked to access that site. So here in this tutorial we are providing you the list of top 110 proxy servers. The below we listed the best proxy sites: Skull Proxy: Skull Proxy is a new yet very powerful proxy server that should take you to your desired site with a blazing loading time. Hidester: Peo

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux. Reverse engineering a program or software involves disassembling, i.e. converting binary instructions into assembly code when its source code is unavailable, helping software engineers, especially malware analysts, understand the functionality of the code and actual design and implementation information. Download  GHIDRA 9.0 — software package, slides, and exercises Adapted from  thehackernews.com