Skype for Business (Lync) Dial-in Conferencing Phone Numbers Displaying

skype-for-businessA company is moving it’s conferencing to on-premise Skype for Business server. When conferences were deployed on Asterisk we could form an email invitation with meeting ID and conference numbers attendee can call to get into the conference. Here the company wants similar and display all dial-in conference numbers in Skype for Business (Lync) invitation.

When you create a dial plan in the Skype for Business Control Panel, you can set a value for Dial-in conferencing region. This value is used to group dial-in conferencing phone numbers and present those to users assigned to that particular dial plan.

S4B-dialplan-configure-region Continue reading

Why you should use Signal as your messenger

Signal-Private-Messenger

I can bet that 9 of 10 smartphone owners use some text messenger to chat with family and friends. You must be too… Have you heard about Signal messenger? If you take care seriously about your privacy I can bet you do heard or use it already! If not – maybe it’s a right time to start! I’m not going to prove again here that keeping your identity private in Internet must be a part of your life philosophy. All I want to remind now is: you are never know what information and when will be used against you. Continue reading

How to create a loop in Asterisk

Asterisk PBX

Let we have some variable like:
Set(Asterisk=1,2,3,4,5)
We need to go through the variable, using «,» as a separator.

Solution:

same => n,Set(Asterisk=1,2,4,3,5)
same => n,Set(X=1)
same => n,Set(DEV=${CUT(Asterisk,\,,1)})
same => n,While($[${EXISTS(${DEV})}])
same => n,NoOp(DEV = ${DEV})
same => n,Set(X=$[${X} + 1])
same => n,Set(DEV=${CUT(Asterisk,\,,${X})})
same => n,EndWhile()

Module was not compiled with the same compile-time options as this version of Asterisk

Asterisk developers have built check that prevents the module is loaded from another binary assembly, as this may cause a malfunction PBX Asterisk. check algorithm checks the value of a constant AST_BUILDOPT_SUM where hash sum at module’s compile time was recorded. Using this hash it’s possible to uniquely identify each binary assembly. It looks like 32 hexadecimal digits consecutive: c03a66cc29fb79f47c469d2b0a362e5e. There are two ways to bypass validation.
Method one:

You need to find a line like this in any of the modules in your IP-PBX Asterisk installation . It is usually near to the end of file. Very handy for things like this is to use a hex editor. For example, for Hex Workshop: Tools —> Find Strings… , specify the minimum length of 32 characters and get a set of rows. The hash sum we are interested in is located next to the information about the version of the compiler:

Module-was-not-compiled-with-the-same-compile-time-options-as-this-version-of-Asterisk

Continue reading

TCPDump examples

The list of network interfaces where tcpdump can capture traffic:

Capture traffic on eth0:

Capture traffic on all available network interfaces (does not work in promiscuous mode. Linux kernel 2.2 and up is needed):

Continue reading

RDCMan: There were problems decrypting some credentials

I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. With the problem described and fixed here I got this popup window:

There_were_problems_decrypting_some_passwords1
To fix this issue, we should remove the <password> </password> pair from the .rdg file.

Continue reading

How to fix Remote Desktop Connection Manager 2.7 full screen issue

Remote_Dektop_Connection_Manager_fix_screen_issue1

I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. And this event has quickly become a pain to me: the host’s screen doesn’t scale to fit the full size of the local client screen size and ugly scroll bars were present on screen so had to use it to get the “start” button. This is really irritating…

Here is how it can be fixed:

Continue reading

MySQL show connections with MyTOP

mytopMyTOP is an utility for tracking performance and connections to MySQL/MariDB servers. The interface is very similar to top utility. Further examples is performed in CentOS 6 x64 operating system.

First of all we need to plug Epel repository:

Continue reading

How To Set Up SSH Keys

SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone. Generating a key pair provides you with two long string of characters: a public and a private key. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. When the two match up, the system unlocks without the need for a password. You can increase security even more by protecting the private key with a passphrase. Continue reading

Install Bash-Shell in favour of Ash-Shell on Padavan’s firmware

,RT-N14UThe thing I needed is an amazing Dropbox-Uploader script from Andrea Fabrizi be installed on my Asus RT-N14U router with Padavan’s firmware. Dropbox-Uploader needs Bash shell to run so i had to install it. I assume Entware is already enabled in your router in Advanced Settings –> USB Apllication –> Allow Run Optware? as on the screenshot below:

Continue reading

Load more