too-many-calls.jpg

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

In the old good days, when the PSTN was rocking, people only had one phone line (or two if they could afford it). This means that regardless of who called who or how many phone extensions your home had, there could only be one call. Some VoIP Service owners find that translating the same behaviour to customers who come from PSTN may be the best approach, after all, they are not used to all the goodies VoIP offers. Personally, I find that as the right approach. You just skip all the drama trying to explain someone the different call flows. Keep it simple.

I will explain here how to accomplish that.

webp.png

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

WebP is an image format employing both lossy and lossless compression. It is currently developed by Google, based on technology acquired with the purchase of On2 Technologies.

As a derivative of the VP8 video format, it is a sister project to the WebM multimedia container format. The webp-related software is released under a BSD license.

For us, as Webmasters, what it makes this interesting is that using the WebP format correctly, you can downsize your image files from 10% to 90%. I will write here how I managed to use this format in an agnostic website. You won't need to mess with your software.

fail2ban-firewall.png

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

Don't take it wrong, Fail2ban is an excellent tool to prevent brute-force attacks. However, sometimes there are production scenarios where you need to keep your door slightly open. It is the classic dilemma security vs utilization; in pro fo the security, you may have a lot of countermeasures that will block many things, depending your paranoia, you may close as much as you want to a point that you may start to have false positives; in pro of the production you may need to keep up and running your service no matter what, you even will need to accept some brute-force attacks from "clean" IPs.