I can bet that 9 of 10 smartphone owners use some text messenger to chat with family and friends. You must be too… Have you heard about Signal messenger? If you take care seriously about your privacy I can bet you do heard or use it already! If not – maybe it’s a right time to start! I’m not going to prove again here that keeping your identity private in Internet must be a part of your life philosophy. All I want to remind now is: you are never know what information and when will be used against you. Continue reading
Jul 30 2016
How to create a loop in Asterisk
Let we have some variable like:
Set(Asterisk=1,2,3,4,5)
We need to go through the variable, using «,» as a separator.
Solution:
same => n,Set(Asterisk=1,2,4,3,5) same => n,Set(X=1) same => n,Set(DEV=${CUT(Asterisk,\,,1)}) same => n,While($[${EXISTS(${DEV})}]) same => n,NoOp(DEV = ${DEV}) same => n,Set(X=$[${X} + 1]) same => n,Set(DEV=${CUT(Asterisk,\,,${X})}) same => n,EndWhile() |
Jul 09 2016
Module was not compiled with the same compile-time options as this version of Asterisk
Asterisk developers have built check that prevents the module is loaded from another binary assembly, as this may cause a malfunction PBX Asterisk. check algorithm checks the value of a constant AST_BUILDOPT_SUM where hash sum at module’s compile time was recorded. Using this hash it’s possible to uniquely identify each binary assembly. It looks like 32 hexadecimal digits consecutive: c03a66cc29fb79f47c469d2b0a362e5e. There are two ways to bypass validation.
Method one:
You need to find a line like this in any of the modules in your IP-PBX Asterisk installation . It is usually near to the end of file. Very handy for things like this is to use a hex editor. For example, for Hex Workshop: Tools —> Find Strings… , specify the minimum length of 32 characters and get a set of rows. The hash sum we are interested in is located next to the information about the version of the compiler:
Jul 09 2016
TCPDump examples
The list of network interfaces where tcpdump can capture traffic:
1 |
tcpdump -D |
Capture traffic on eth0:
1 |
tcpdump -i eth0 |
Capture traffic on all available network interfaces (does not work in promiscuous mode. Linux kernel 2.2 and up is needed):
1 |
tcpdump -i any |
Jul 02 2016
RDCMan: There were problems decrypting some credentials
I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. With the problem described and fixed here I got this popup window:
To fix this issue, we should remove the <password> </password> pair from the .rdg file.
Jul 02 2016
How to fix Remote Desktop Connection Manager 2.7 full screen issue
I have recently upgraded Remote Desktop Connection Manager (RDCMan) 2.2 to version 2.7. And this event has quickly become a pain to me: the host’s screen doesn’t scale to fit the full size of the local client screen size and ugly scroll bars were present on screen so had to use it to get the “start” button. This is really irritating…
Here is how it can be fixed:
Jun 21 2016
MySQL show connections with MyTOP
MyTOP is an utility for tracking performance and connections to MySQL/MariDB servers. The interface is very similar to top utility. Further examples is performed in CentOS 6 x64 operating system.
First of all we need to plug Epel repository:
1 2 |
wget http://mirror.omnilance.com/epel/6/x86_64/epel-release-6-8.noarch.rpm rpm -Uvh epel-release-6-8.noarch.rpm |
May 30 2016
How To Set Up SSH Keys
SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone. Generating a key pair provides you with two long string of characters: a public and a private key. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. When the two match up, the system unlocks without the need for a password. You can increase security even more by protecting the private key with a passphrase. Continue reading
May 25 2016
Install Bash-Shell in favour of Ash-Shell on Padavan’s firmware
,The thing I needed is an amazing Dropbox-Uploader script from Andrea Fabrizi be installed on my Asus RT-N14U router with Padavan’s firmware. Dropbox-Uploader needs Bash shell to run so i had to install it. I assume Entware is already enabled in your router in Advanced Settings –> USB Apllication –> Allow Run Optware? as on the screenshot below:
May 25 2016
You Do Not Appear to Have the Sources for Kernel Installed
If you get the following error “You Do Not Appear to Have the Sources for Kernel Installed” (or similar) when trying to build Asterisk or DAHDI you have to install the kernel devel / kernel headers. This post covers kernel headers and kernel source installation for Debian, Ubuntu, Red Hat/Fedora/CentOS systems.
Asterisk Build Errors Related to Kernel Headers / Devel: Continue reading