security
-
Janus Installation and Echo Test: A Complete Walkthrough

Janus is a general-purpose WebRTC server designed to be highly customizable and extensible. It acts as a bridge between WebRTC clients and various backend services or other communication protocols. Its power lies in its plugin architecture, allowing you to add specific functionalities (like SIP gateways, video rooms, streaming, etc.) without modifying the core server. In… Continue reading
-
Easily Manage SSH Access with One-Click iTerm2 Profiles
iTerm2 simplifies SSH connection management by enabling users to create custom profiles for single and multiple server access. This blog post outlines the steps to configure iTerm2 profiles, optimizing remote session handling. Utilizing the Toolbelt feature allows for quick access, enhancing productivity and efficiency for users frequently connecting to remote servers. Continue reading
-
How to enable RTPEngine debug Log Level: A Quick Guide

RTPEngine is a powerful media relay for VoIP applications, and effective logging is crucial for monitoring and troubleshooting. This post covers how to manage RTPEngine log levels, including setting them at startup and/or adjusting them dynamically. Understanding RTPEngine Log LevelsRTPEngine uses the standard syslog log levels, defined as follows: Value Name Description 0 LOG_EMERG System Continue reading
-
Guide: Protect Your Privacy by deleting uploaded files in ChatGPT

The ability to upload files in platform like ChatGPT allows for a more dynamic and interactive experience. But what happens once you’re done with a file? In this post, we’ll explain how you can delete them ensuring your data is securely managed. Continue reading
-
Using Trivy to Check for Vulnerabilities in Docker Images

Introduction: In the world of containerisation, security is paramount. Ensuring the images you deploy are free from vulnerabilities is crucial. Trivy, an open-source tool by Aqua Security, is a simple and comprehensive vulnerability scanner for containers and other artifacts. In this post, we’ll walk through the process of using Trivy to scan a Docker image Continue reading
-
Integrating OpenID Connect with GitHub Actions: A Secure Path to CI/CD Automation

Explore the seamless integration of OpenID Connect (OIDC) with GitHub Actions in this blog post. We break down how this powerful combination enhances CI/CD workflows, offering a secure and streamlined approach to cloud services. Discover the simple steps to connect your GitHub Actions with cloud providers like AWS, Azure, and GCP, ensuring your development process… Continue reading
-
Stir/Shaken: Understanding the SIP Identity header

A key component of this protocol is the SIP (Session Initiation Protocol) Identity header. This article will delve into the intricacies of the STIR/SHAKEN protocol and the crucial role of the SIP Identity header. Continue reading
Recent Posts
- Real-Time Speech-to-Speech with OpenAI & Twilio: Full SIP Integration Guide
- Step-by-Step Guide to SIPp : Build and Install from Source
- Explore KittenTTS with Gradio: Easy Text-to-Speech
- Janus Installation and Echo Test: A Complete Walkthrough
- Chat with Your Kubernetes Cluster Locally: Setting up kubectl-ai with Ollama