Windows Server 2012 The file is likely corrupt or the victim of tampering

If the driver you are trying to install is not properly signed you will get the following screen:

the-hash-is-not-present

“Windows found driver software for your device but encountered an error while attempting to install it. The hash for the file is not present in the specified catalog file. The file is likely corrupt or the victim of tampering.”

If you are sure about the driver you are trying to install then you need to disable  driver signature enforcement in Windows.

You can do this in 2 ways.

Continue reading

Disable driver signature enforcement in Windows

Disable-Driver-Signature-Verification-on-64-Bit-Windows-8-itgala.xyz

Windows 8 and Windows 10 require device drivers have a digital signature. Otherwise the system will not install a driver. Signature allows to determine driver developers and also shows whether the driver is changed after the release of third parties. Drivers are signed with certificates for signing files.

For devices that come with unsigned drivers you will have to disable driver signature enforcement in Windows in order to install them.

Continue reading

Connect GoIP8 GSM gateway to Asterisk

GoIP 8

Here are the steps how to connect GSM Gateway GoIP8 to Asterisk. Required features: the possibility to outgoing calls and receive incoming. For outgoing calls to have a choice of an arbitrary line.

1.  GoiP 8 configuring

It is assumed that you have a new device out of the box, so the steps – as for factory settings.

Insert SIM card in slots, turn on the power. GoIP8 has 2 ports “LAN” and “PC”.

The  «PC» port has a static address 192.168.8.1 by default and can be used to connect switches which can be connected to users’ PC (gateway supports DHCP server).

 

Continue reading

Skype for Business (Lync) Dial-in Conferencing Phone Numbers Displaying

skype-for-businessA company is moving it’s conferencing to on-premise Skype for Business server. When conferences were deployed on Asterisk we could form an email invitation with meeting ID and conference numbers attendee can call to get into the conference. Here the company wants similar and display all dial-in conference numbers in Skype for Business (Lync) invitation.

When you create a dial plan in the Skype for Business Control Panel, you can set a value for Dial-in conferencing region. This value is used to group dial-in conferencing phone numbers and present those to users assigned to that particular dial plan.

S4B-dialplan-configure-region Continue reading

Why you should use Signal as your messenger

Signal-Private-Messenger

I can bet that 9 of 10 smartphone owners use some text messenger to chat with family and friends. You must be too… Have you heard about Signal messenger? If you take care seriously about your privacy I can bet you do heard or use it already! If not – maybe it’s a right time to start! I’m not going to prove again here that keeping your identity private in Internet must be a part of your life philosophy. All I want to remind now is: you are never know what information and when will be used against you. Continue reading

How to create a loop in Asterisk

Asterisk PBX

Let we have some variable like:
Set(Asterisk=1,2,3,4,5)
We need to go through the variable, using «,» as a separator.

Solution:

same => n,Set(Asterisk=1,2,4,3,5)
same => n,Set(X=1)
same => n,Set(DEV=${CUT(Asterisk,\,,1)})
same => n,While($[${EXISTS(${DEV})}])
same => n,NoOp(DEV = ${DEV})
same => n,Set(X=$[${X} + 1])
same => n,Set(DEV=${CUT(Asterisk,\,,${X})})
same => n,EndWhile()

Module was not compiled with the same compile-time options as this version of Asterisk

Asterisk developers have built check that prevents the module is loaded from another binary assembly, as this may cause a malfunction PBX Asterisk. check algorithm checks the value of a constant AST_BUILDOPT_SUM where hash sum at module’s compile time was recorded. Using this hash it’s possible to uniquely identify each binary assembly. It looks like 32 hexadecimal digits consecutive: c03a66cc29fb79f47c469d2b0a362e5e. There are two ways to bypass validation.
Method one:

You need to find a line like this in any of the modules in your IP-PBX Asterisk installation . It is usually near to the end of file. Very handy for things like this is to use a hex editor. For example, for Hex Workshop: Tools —> Find Strings… , specify the minimum length of 32 characters and get a set of rows. The hash sum we are interested in is located next to the information about the version of the compiler:

Module-was-not-compiled-with-the-same-compile-time-options-as-this-version-of-Asterisk

Continue reading

TCPDump examples

The list of network interfaces where tcpdump can capture traffic:

Capture traffic on eth0:

Capture traffic on all available network interfaces (does not work in promiscuous mode. Linux kernel 2.2 and up is needed):

Continue reading

RDCMan: There were problems decrypting some credentials

I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. With the problem described and fixed here I got this popup window:

There_were_problems_decrypting_some_passwords1
To fix this issue, we should remove the <password> </password> pair from the .rdg file.

Continue reading

How to fix Remote Desktop Connection Manager 2.7 full screen issue

Remote_Dektop_Connection_Manager_fix_screen_issue1

I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. And this event has quickly become a pain to me: the host’s screen doesn’t scale to fit the full size of the local client screen size and ugly scroll bars were present on screen so had to use it to get the “start” button. This is really irritating…

Here is how it can be fixed:

Continue reading

Load more