You don't need to mess with a dydns right now. Your address (for the box running FTP) needs to be static at your router. You need to set the router to give out addresses in a range for DHCP.
lets use 192.168.1.1 - 192.168.1.200 for example, that way the router will assign IPs to machines in this range leaving the other addresses (192.168.1.201 - 192.168.1,254) for static assignments. This has nothing to do with your IP from your ISP, this is necessary for the port forwarding to work properly.
You will also need to set the network properties on the FTP box to use a static address.
The reason to use DYDNS is for when you have a registered domain name and want to use it with an address (from your ISP) that is DHCP. DYDNS will change when your are issued a new IP from your ISP.
You do realize that once to start running FTP that you will have people constantly trying to hack it?
You don't need to mess with a dydns right now. Your address (for the box running FTP) needs to be static at your router. You need to set the router to give out addresses in a range for DHCP.
lets use 192.168.1.1 - 192.168.1.200 for example, that way the router will assign IPs to machines in this range leaving the other addresses (192.168.1.201 - 192.168.1,254) for static assignments. This has nothing to do with your IP from your ISP, this is necessary for the port forwarding to work properly.
You will also need to set the network properties on the FTP box to use a static address.
The reason to use DYDNS is for when you have a registered domain name and want to use it with an address (from your ISP) that is DHCP. DYDNS will change when your are issued a new IP from your ISP.
You do realize that once to start running FTP that you will have people constantly trying to hack it?
Ever hear of a port scanner? Mine was up for three day before people started trying to get in. Luckily, no one got in, but I blocked all of the IPs that were trying to gain unauthorized access (that's a pretty long list). Almost all of the IPs were coming from proxy servers from Asia, so there was no easy way to find out who was trying to hack me.
Ever hear of a port scanner? Mine was up for three day before people started trying to get in. Luckily, no one got in, but I blocked all of the IPs that were trying to gain unauthorized access (that's a pretty long list). Almost all of the IPs were coming from proxy servers from Asia, so there was no easy way to find out who was trying to hack me.
How in the world would someone know that you just set up a ftp server?
How in the world would someone know that you just set up a ftp server?
People just sit around with port scanners running to scan random IP addresses for open ports. Once they find one they use password cracks to try to get in. That is why a strong password and user name is important.
Like I said, no one was successful, but I take an active roll to keep people out.
Ninja, that is why I recommended Smoothwall for you. It has a feature that would allow you to block all incoming IP's except your brothers.
I can get in from another pc on the network just not from a pc outside of my network so thats why I came here
No that should work. Do a "sheilds up" scan at grc.com to see if those ports are open. Let us know waht you find out.