![]() Now that you know how these rogue servers come about, it's time to discuss why you wouldn't want any lying around in your network. In other words, employees don't bother to seek approval from their IT departments (or even inform IT staff) before deploying them. With enough know-how, some individuals can even set up public FTP servers, which can enable them to easily share files over the Internet.īut as ad-hoc solutions, FTP servers don't usually go through the company's normal software acquisition process. Obviously, anybody who wants to use FTP can easily do so. That's why FTP is often the preferred ad-hoc solution by people who need to share files. There are also a lot of free FTP servers and free FTP clients which can be downloaded from the Web. It's just a matter of having a user with the know-how and enough administrator privileges to activate them.īuilt-in FTP server on an old version of Mac OS X (Pre MacOS Mojave and High Sierra)īuilt-in FTP Server on Windows Server 2012 R2 In fact, all widely used operating systems (Windows, Mac OS X, and Linux, included) already have built-in FTP servers and even FTP clients. How networks spring forth rogue FTP serversįirst of all, FTP servers are not difficult to install. ![]() In this post, you'll learn where these servers come from, what specific dangers accompany them, and how they can be detected. Not only do they pose a serious threat to company privacy, they can also stand in the way of regulatory compliance. Note: This blog post was originally published on Novembut was updated and republished on September 19, 2018.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |