eSATA: A doomed stopgap? The kiss of USB 3.0 death By Chris Mellor Posted in Storage, 20th March 2009 08:02 GMT Comment The external SATA (eSATA) interconnect is merely an interim idea and the coming of USB 3.0 will kill it off, according to Verbatim’s EMEA business development manager Hans Christoph Kaiser. The background is […]
Gmail offers ‘undo’ email option Stupid POP tricks By Austin Modine Posted in Applications, 20th March 2009 19:05 GMT The folks at Gmail Labs obviously dedicate a healthy amount of brainpower to the prevention of regrettable emails sent through their service. Custodial hearts at Google who’ve brought us Mail Goggles to stave off late-night drunken […]
Cybercrime server exposed through Google cache UK and US IDs exposed to world By John Leyden Posted in Crime, 23rd March 2009 15:30 GMT A reported 22,000 card records have been exposed through cached copies of data stored on a defunct cybercrime server. iTnews in Australia reports that 19,000 of the 22,000 exposed details referred […]
corporate Twitter snooping Cloudy conversations By Gavin Clarke in San Francisco Posted in Applications, 23rd March 2009 17:32 GMT Twitter has become Salesforce.com’s latest Web 2.0 darling, with a plug-in to the company’s customer relationship management (CRM) system. On Monday the company announced Salesforce.com CRM for Twitter, which it said would let CRM users search, […]
Denial of Service One of the simplest forms of network attack is a Denial of Service (DoS) attack. Instead of trying to steal information, a DoS attack simply prevents access to a service or resource. There are two general forms of DoS attacks: those that crash services and those that flood services. Denial of Service […]
TCP/IP Hijacking : TCP/IP hijacking is a clever technique that uses spoofed packets to take over a connection between a victim and a host machine. This technique is exceptionally useful when the victim uses a one-time password to connect to the host machine. A one-time password can be used to authenticate once and only once, […]
Physical layer : This layer deals with the physical connection between two points. This is the lowest layer, whose primary role is communicating raw bit streams. This layer is also responsible for activating, maintaining, and deactivating these bit-stream communications. Data-link layer : This layer deals with actually transferring data between two points. In contrast with […]
The template for the notification email is stored in the ${emailbody} variable, defined in voicemail.conf or one of its includes. You just have to define it. Feel free to mix in any of these system variables while you’re at it: VM_NAME The name of the subscriber for whom the message was left VM_DUR The duration, […]
Dial Plans: The dialplan is the meat and bones of any Asterisk system, because it defines how Asterisk handles inbound and outbound calls. Basically, it consists of a list of instructions or steps that Asterisk will follow. Differing from traditional phone systems, Asterisk’s dialplan is fully customizable. To successfully run your own Asterisk system, you […]