This page is a part of XSecurePro online Help Manual.
X-SecurePro is X-Server for windows by Labtam bringing your PC to Unix and X-Windows. Seamless Secure integration from PC to Unix and X-Window System. Bringing Maximum Security while still finding all of the standard access of X11, TCP/IP, FTP, TFTP, LPR, TELNET, NFS and SSH. Visit Home of X Server for windows for more information.



Transfer Options

Transfer options you may configure include the following:

  • transfer mode
  • port number
  • transfer format type (ASCII, Binary)
  • E-mail address
  • confirms for Copy, Delete, Append and Overwrite operations
  • sound upon completing operations
  • security mode to login

To display current settings, select the Settings tab from the TabForm. This will bring up the tab with current options of your FTP session:

To save current settings, press the Save current settings button on the tool bar. You do not have to be connected to a server.


Setting Transfer Options

Transfer options will be in effect until you change them or close the server connection.

  1. To set up transfer format type (ASCII, Binary), you can choose it from within the Options menu. Alternatively, press the suitable button on the toolbar.

    If the ASCII option is selected, all transfers to or from a remote FTP server will be made in the ASCII format. This is necessary for ASCII text files on some FTP servers, but cannot be used for transfer of binary executable files, or files other than those composed strictly of ASCII text.

    In ASCII mode, each LF code is changed to CRLF (when transferring from UNIX to MS Windows), and each CRLF code is changed to LF (when transferring from MS Windows to UNIX).

    The Binary option makes FTP treat all transfers to and from a remote FTP server in a binary format, which is necessary for binary executable files, or very generally, for files that are not composed strictly of ASCII text.

    In Binary mode, no code is changed when transferring to or from a remote FTP server (i.e., transferred "as is").

    There is no special checking on the selections to determine if this is appropriate. For example, if you select a .exe file and select ASCII as the transfer type, you will not be notified.

  2. To toggle the Sound upon completing operations option, press the Red Bell button on the Settings tab. This option will enable the system sound upon connect, and successful download or upload of a file or files.

  3. To change the confirmation settings, check the Copy, Append, Delete or Overwrite check boxes if you want to be prompted to confirm whether to continue when you are performing the corresponding file operation.

  4. To specify a port number, enter it in the edit field (if you wish to communicate via a specific port on the FTP server). Otherwise, leave this field's default as 21.

    This port number will be used throughout the session. An optional port number may be supplied, in which case FTP will attempt to contact a FTP server at that port. Most servers accept FTP connection requests on port 21, but there are those that do not (for security or other reasons). Port number 21 is usually used for FTP clients.

  5. When the Passive Transfers check box is disabled, then a remote FTP server will (normally) try to establish connection with your FTP client and perform operations.

    When enabled, this mode makes a FTP server passive (with the PASV command) so your FTP client will try to connect to a FTP server. This mode is useful when your PC is behind a firewall or proxy server. (See section Connecting to the FTP server for more information on using standard FTP and SSH1/SSH2 connections.)

  6. When enabled, the Use RSA key to login check box specifies whether to use RSA authentication. If RSA authentication is selected, you should specify a location of the identity file to be used for this process. You can enter the filename in the entry field or select it with the Private key file button.

    When you press on the Private key file button, the standard Open File window will appear. You can select your identity file for RSA authentication. RSA authentication will only be attempted if the Private key file exists.

    In order to use your private key, you must transfer the identity file created by the ssh-keygen utility on the SSH server machine to a secure location on your PC for this file such that you are the only individual with access to it.

    Also, prior to using RSA authentication, the public key must be made available to the SSH server.

    One way to transfer the identity file from the remote machine to your PC is to use FTP (in ASCII mode). Another way is to copy the contents of the identity file to the clipboard using a remote text editor and then to paste the contents of the clipboard to a file you created using a local text editor (e.g., Notepad).






Home | Product | Download | Order Now | Upgrade | Support | Pricing | Company Information | Contact Us


Labtam Copyright 1999 - 2009 LabtamTM Inc.