Skype for Business (Lync) Enable/Move Users in Bulk


You can easily enable users for Skype for Business (Lync) in bulk based on group membership, department, organizational unit or other criterias. You don’t need any special tools but Get-CsADUser and Enable-CsUser comandlets. You can move users to another pool in similar manner by using Move-CsUser instead of Enable-CsUser commandlet.

Here are some examples to get you started. Continue reading

Data Protection Manager Error ID 948 Unable to open console

I’m trying to open Data Protection Manager console from user different than the one performed installation. Despite the fact my user is a Server Administrator as well I receive:


Unable to connect. Verify that the DPM service is running on this computer.

Continue reading

Windows Server 2012 The file is likely corrupt or the victim of tampering

If the driver you are trying to install is not properly signed you will get the following screen:


“Windows found driver software for your device but encountered an error while attempting to install it. The hash for the file is not present in the specified catalog file. The file is likely corrupt or the victim of tampering.”

If you are sure about the driver you are trying to install then you need to disable  driver signature enforcement in Windows.

You can do this in 2 ways.

Continue reading

Disable driver signature enforcement in Windows

Windows 8 and Windows 10 require device drivers have a digital signature. Otherwise the system will not install a driver. Signature allows to determine driver developers and also shows whether the driver is changed after the release of third parties. Drivers are signed with certificates for signing files.

For devices that come with unsigned drivers you will have to disable driver signature enforcement in Windows in order to install them.

Continue reading

Connect GoIP8 GSM gateway to Asterisk

GoIP 8

Here are the steps how to connect GSM Gateway GoIP8 to Asterisk. Required features: the possibility to outgoing calls and receive incoming. For outgoing calls to have a choice of an arbitrary line.

1.  GoiP 8 configuring

It is assumed that you have a new device out of the box, so the steps – as for factory settings.

Insert SIM card in slots, turn on the power. GoIP8 has 2 ports “LAN” and “PC”.

The  «PC» port has a static address by default and can be used to connect switches which can be connected to users’ PC (gateway supports DHCP server).


Continue reading

Skype for Business (Lync) Dial-in Conferencing Phone Numbers Displaying

skype-for-businessA company is moving it’s conferencing to on-premise Skype for Business server. When conferences were deployed on Asterisk we could form an email invitation with meeting ID and conference numbers attendee can call to get into the conference. Here the company wants similar and display all dial-in conference numbers in Skype for Business (Lync) invitation.

When you create a dial plan in the Skype for Business Control Panel, you can set a value for Dial-in conferencing region. This value is used to group dial-in conferencing phone numbers and present those to users assigned to that particular dial plan.

S4B-dialplan-configure-region Continue reading

Why you should use Signal as your messenger


I can bet that 9 of 10 smartphone owners use some text messenger to chat with family and friends. You must be too… Have you heard about Signal messenger? If you take care seriously about your privacy I can bet you do heard or use it already! If not – maybe it’s a right time to start! I’m not going to prove again here that keeping your identity private in Internet must be a part of your life philosophy. All I want to remind now is: you are never know what information and when will be used against you. Continue reading

How to create a loop in Asterisk

Asterisk PBX

Let we have some variable like:
We need to go through the variable, using «,» as a separator.


same => n,Set(Asterisk=1,2,4,3,5)
same => n,Set(X=1)
same => n,Set(DEV=${CUT(Asterisk,\,,1)})
same => n,While($[${EXISTS(${DEV})}])
same => n,NoOp(DEV = ${DEV})
same => n,Set(X=$[${X} + 1])
same => n,Set(DEV=${CUT(Asterisk,\,,${X})})
same => n,EndWhile()

Module was not compiled with the same compile-time options as this version of Asterisk

Asterisk developers have built check that prevents the module is loaded from another binary assembly, as this may cause a malfunction PBX Asterisk. check algorithm checks the value of a constant AST_BUILDOPT_SUM where hash sum at module’s compile time was recorded. Using this hash it’s possible to uniquely identify each binary assembly. It looks like 32 hexadecimal digits consecutive: c03a66cc29fb79f47c469d2b0a362e5e. There are two ways to bypass validation.
Method one:

You need to find a line like this in any of the modules in your IP-PBX Asterisk installation . It is usually near to the end of file. Very handy for things like this is to use a hex editor. For example, for Hex Workshop: Tools —> Find Strings… , specify the minimum length of 32 characters and get a set of rows. The hash sum we are interested in is located next to the information about the version of the compiler:


Continue reading

TCPDump examples

The list of network interfaces where tcpdump can capture traffic:

Capture traffic on eth0:

Capture traffic on all available network interfaces (does not work in promiscuous mode. Linux kernel 2.2 and up is needed):

Continue reading

Load more