và độ chính xác mỗi khi bạn đến giao diện điều khiển. Unix là đáng sợ, nhưng như bạn có thể thấy, nó không khó sử dụng và để tìm hiểu về. Tiếp tục kiểm tra các trang người đàn ông khi bạn cần giúp đỡ. Một số trang người đàn ông hữu ích liên quan đến nội dung của bài học này bao gồm crontab người đàn ông, cron người đàn ông, người đàn ông ở | 138 The ftp command provides you with a way to retrieve files from remote machines that aren t set up to share file systems with yours. If your machine is running an FTP server you might be able to use it to provide your files to the rest of the world as well. Contact your system administrator about this. Remember this book covers only the using end of Unix so anything that needs to be added to your Unix system must be requested. To use the ftp command simply enter the command as follows ftp ftp server where the FTP server is the IP address or hostname of a remote machine running an FTP server. If you ve connected properly you ll get a prompt for your credentials which are your username and password. It should also be noted that FTP has the same inherent problems as telnet the information is sent in clear text. Some FTP servers enable you to connect without an account on the system. For these use the username anonymous and give your email address as the password. Let s see how to log in with ftp ftp ftp pr1 Once connected to an FTP site you can cd and Is your way around. Using the command get filename enables you to retrieve a file and put filename enables you to send one from your directory to the remote system. Can I Secure FTP So how can I secure FTP if it is also not secure The answer is simple. You can use Secure FTP or SFTP for short. If you have ssh installed you will most likely have SFTP installed as it is usually part of the same client package. If you do not have it you can request it from your system administrator. Another program that you could use is also secure copy or scp for short. Summary In this lesson you were introduced to a sampling of tools that enable you to make use of the network resources around you and around the world. As you explore Unix you ll find that this was really only a small sampling and that there are new tools for you to use appearing constantly. Some will be replacements or upgrades for the commands outlined here .