SHOCK! New software for phishing does not win the normal 2FA (two-factor authentication)

Last month, all those who feel like they write that 2FA (two-factor authentication) is in danger because of the quality of the fake pages. Actually, the title of the article parodies one of these posts on Habré. Of course, 2FAs are different. In some "very advanced" European banks, you can still get hold of a sheet of disposable TAN-codes.
 3r33333. But for several years the industry has not stood still, and instead of disposable TAN /PIN codes arriving by SMS or through applications like RSA Token, Steam Guard, Google Authenticator, there are other options.
 3r33333. Here is ...
+ 0 -

Traffic monitoring systems in VoIP networks. Part One - Overview

3r3-31. In this article we will try to consider such an interesting and useful element of IT infrastructure as a monitoring system for VoIP-traffic.
Traffic monitoring systems in VoIP networks. Part One - Overview 3r388.
The development of modern telecommunication networks is striking: they have advanced far from signal fires, and what seemed unthinkable earlier is now simple and commonplace. And only professionals know what lies behind everyday life and the wide use of the achievements of the information technology industry. The variety of transmission media, switching methods, protocols of interaction between devices and coding algorithms affects the mind of ...
+ 0 -

Snom D725 IP Phone Review

Snom D725 IP Phone Review 3r3108.
We continue a series of articles with reviews of multifunctional office IP-phones by Snom. This time the story will be about the model D72? relating to the average price segment.

Features model

The ergonomic keyboard has all the main keys to control the phone and calls. In addition to them, there is also a block of eighteen additional function keys, thanks to which the D725 has turned out to be a little more than the younger models in the D7xx lineup, and it is no longer inferior in size to the older ones.
The display is monochrome, with adjustable brightness. It is only slightly larger than the youngest models. Recall that in the D7xx line, the angle of inclination of the display can be ...[/h]
+ 0 -

Transferring PBX configuration to 3CX PBX Express service

In this article we will explain how to restore backup copies of existing PBX installations when using 3CX PBX Express. The ability to restore the configuration allows, for example, to move the local server to the cloud, change hosting or restore the PBX in the cloud after a serious local failure. The only requirement when moving the configuration is the option “License data and FQDN name” in the backup must be enabled. 3r3145.  
Before moving your PBX to the PBX Express service, please note the following: and select restore backup. Insert the archive link ...
+ 0 -

Place of jazz in the IT department

Imagine that you are the head of a small IT department, and the ideal engineers who work for him are
3r376. are engineers 3r311. 3 - 4 levels
3r376. able to independently decide not only 3r318. difficult task
, but also to build a process, it is necessary to solve complex tasks
3r376. disciplined and responsible 3r377.  
3r376. motivated and eager to improve what they touch
3r376. respect and get along with each other
3r376. your department is small, you constantly communicate, discuss and know who lives with what in terms of work at this point in time
+ 0 -

Check Point for Check Point Security Settings

Check Point for Check Point Security Settings  
Relatively recently, we published an open-access mini-course "3r3-39. Check Point for a maximum of 3r3-3209.". There we tried briefly and with examples to consider the most frequent errors in the Check Point configuration from the point of view of information security. In fact, we told you what the default settings are bad for and how to tighten the screws. The course (unexpectedly for us) received pretty good reviews. After that, we received several requests for a brief “squeeze” of this material - 3r3144. security checklist [/b] . We decided that this is a good idea, and therefore we publish this ...
+ 0 -

PSEFABRIC is a new approach to network management and automation. Step to the ideal

Before you start

All that is referred to here is more related to data centers and office networks 3r-3295.  
it will be about the project.
See also 3r3187. article
which outlines the basic principles of PSEFABRIC.

The ideal network management system

I dare say that from the point of view of control and automation 3r33340. PSEFABRIC
Now the closest of all other solutions is to what could be called the “ideal network manager.”
If you have a good car, then you know what a good control system is. You, as a user, need to know only how ...[/h][/h]
+ 0 -

3CX Video Conferencing WebMeeting - the complete guide

3CX Video Conferencing WebMeeting - the complete guide 3r33412. 3r3-31. For our customers, who often use 3CX WebMeeting video conferencing, we have prepared a detailed guide that will guide you from creating a conference to creating a webinar video for Youtube. System administrators can use it as a cheat sheet, especially when introducing new employees to the course. We will look at the various ways to create a conference, the tools you can use, and the management of participants.
 3r33412. [h3] Creating a videoconference 3r3-3322.
 3r33412. The 3CX web client uses 3r310. WebRTC technology
, which allows you to create video conferencing in ...[/h]
+ 0 -

7 best free programs for conducting webinars in 2018

 3r3-3559. 3r3-31. 3r33544. 7 best free programs for conducting webinars in 2018
3r33542.  3r3-3559. 3r33544. At the most basic level, the webinar software includes video conferencing and audio conferencing. Some also offer features such as screen sharing, video recording, file sharing, and integration with other software, such as Microsoft PowerPoint. 3r33547. 3r33542.  3r3-3559. 3r33544. Most of the webinar software is paid and many users come to traditional video conferencing software. Video conferencing software and webinar software are often very similar, but differ in the number of participants and functionality. However, many find the functionality ...
+ 0 -

The real speed of Wi-Fi (throughput)

The real speed of Wi-Fi (throughput) 3r33333. 3r3-31. The continuous hyip around the gigabit Wi-Fi speeds of modern standards provokes engineers to clarify this topic in a way that everyone can understand. 3r33524.  3r33333. What are marketers trying to pull behind their ears? What do engineers say? Where is the truth? 3r33524.  3r33333. As always, somewhere nearby. What bandwidth is expected in real conditions and why - you will find the answer in this article. If there is absolutely no time to read, but I want to know the magic number - 75 Mbps per dual band access point, on all 3r3496. . Who are interested in the details, read ...
+ 0 -