How to use MD5 authentication on Asterisk SIP endpoints
What are the advantages of using MD5 authentication when creating an endpoint in Asterisk? The main advantage (perhaps the only
Read MoreWhat are the advantages of using MD5 authentication when creating an endpoint in Asterisk? The main advantage (perhaps the only
Read MoreWhen we work with WebRTC in Asterisk, normally the packets (REGISTER, OPTIONS, INVITE, etc) do not appear in Sngrep by
Read MoreError: Failed to download metadata for repo ‘appstream’: Cannot prepare internal mirrorlist The CentOS 8 distribution has stopped receiving updates
Read MoreHSTS stands for HTTP Strict Transport Security and is a security header that was created as a way to force
Read MoreAn efficient way to read Json files on Linux is through the ‘jq’ command. The jq command is a powerful
Read MoreSSH is a network protocol that allows secure communication between two devices. SSH (Secure Shell) is a network protocol that
Read More