Change maximum upload file size in SharePoint/WSS 3.0

Sharepoint max upload file size is limited out of the box.  You can change the max file upload size by following the steps below.  Note that if the max upload size setting is greater than 50MB then IIS settings in web.config may need to be changed too.

Click screenshots below to view full-size version.

  1. Connect to Central Admin
    image
  2. Navigate to Central Admin > Application Management > Web Application General Settings
    image
  3. Select your web application
    image
  4. Set the Maximum Upload Size value to "X" MB and click OK
    image
  5. Repeat steps 6-7 for all zones for your web application on all servers hosting the web application role
  6. If size is greater than 50MB, you must change IIS .Net settings in the web.config file also
  7. Open the web.config for your SharePoint application
  8. Replace the following line:
    <httpRuntime maxRequestLength="51200" />
    with
    <httpRuntime maxRequestLength="{X * 1024}" />
    image

Leave a Reply

Related Post

Hardening WordPress Security

Wordpress out of the box is fairly secure but there are still some pretty big holes. In addition, hosting environments and installation requirements often introduce gaping security holes in the Wordpress framework. Below are a few best practices to help secure your Wordpress framework.

Gaining Shell Access via Local File Inclusion Vulnerabilities

My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it was an attempt to gain Shell access via Local File Inclusion vulnerabilities and injection of malicious code in proc/self/environ. Research lead to the following step-by-step instructions on what was being attempted (listed below).

Passwordless logins in Unix

Connecting via SSH, requires a user provide his identity to the remote machine using one of several methods. One method lets you access the remote system without entering a password at each login. Normally, when you log in to a system, you authenticate by entering your password for that system. Your password goes, as it is typed, to the remote system, which authenticates it against the /etc/passwd or /etc/shadow file. By contrast, SSH allow a “password-less” authentication method based on public-key cryptography.