1. Voice over IP (VoIP) Protocol Review

    Posted on in voice

    Protocol Basics


    Layer: Application Transport: <acronym title="Transmission Control Protocol">TCP</acronym> or <acronym title="User Datagram Protocol">UDP</acronym> Port(s): 5060, 5061 RFC(s): 2543, 3261

    SIP (Session Initiation Protocol)

    SIP is by far the most popular protocol used in VoIP communication today. SIP was designed as a …

  2. Gmail Search Power

    Posted on in Software

    Gmail logoSomehow, I have let my Gmail inbox get totally out of control. I don't know if it was the holidays or what, but as of this morning, I had over 800 unread messages in my Gmail inbox. I decided a little while ago that it was time to focus on …

  3. Mac OS X: Migrating bookmarks from Firefox to Safari

    Posted on in Software

    Importing Mozilla Firefox bookmarks into Safari on your Mac is really easy. Firefox stores its bookmarks in an HTML file that can be parsed by Safari. In Safari, simply click on the File menu and select Import Bookmarks. This will open a file selection dialog box. Firefox stores its bookmarks …

  4. No such table: django_admin_log

    Posted on in Programming

    If you get this error when trying to save something in the Django admin, it's probably because you forgot to synchronize the database after adding the admin application. If you are using a pre-1.2 version of Django, you can simply:

    $ ./managy.py syncdb
    

    Django 1.2 (which is currently …

  5. Changing Unread Messages to Red in Outlook's Message Lists

    Posted on in Software

    Former Lotus Notes users may prefer to see unread messages in red rather than just bold. Microsoft Outlook uses two different views to display message lists to the user: Messages and Messages with AutoPreview. We will need to change the font color to red in both views to ensure that …

  6. Crashing Android Contacts App

    Posted on in voice

    Android DollsFor about a month, I've had a problem with my Contacts app crashing on my T-Mobile G1. Whenever this would happen, I would be forced to close the Contacts application. This was a pretty major pain in the butt since I tend to use the Contacts and Favorites tab to …

  7. Scrolling in screen

    Posted on in System Administration

    I use screen for various purposes. It's nice to be able to sit down at a different terminal and attach to my same session, for example. I also occasionally run some long-term commands that will blow up if my session is disconnected. The one thing I need to do with …

  8. Sorting dictionary keys in Python

    Posted on in Programming

    For some reason, sorting a dictionary by its keys seems to be one of the most frequently asked Python questions. I'm not sure if this is because it's just much easier to do in other languages, or if the semantics of the language just confuse new Python developers. I guess …

  9. Sipura 2100 ATA Factory Reset Procedure

    Posted on in voice

    This information is contained in the documentation for the ATA, but I never have that handy when I need it. Here are the steps for performing a factory reset on a Sipura 2100 ATA:

    1. Plug an analog phone into either phone port.
    2. Dial ****
    3. Dial 73738#
    4. Dial 1#
    5. Hangup
  10. Bleeding Edge Technology in the Enterprise

    Posted on in Information Systems

    As new technology breakthroughs happen, there is always an enterprise willing to be an early adopter. Bleeding edge technology is hardware, software, or concepts that are new and untested. My enterprises choose to become early adopters in the hope of gaining a competitive advantage over their competitors. Two examples of …

  11. IS Trends for SMBs

    Posted on in Information Systems

    Due to their size, small businesses are often behind the curve when it comes to trends in information systems. Fortunately, their small size also imparts on them the ability to respond quickly when an opportunity presents itself. In today's rapidly changing marketplace, SMBs must be prepared to deploy decision support …

  12. Computer Crime

    Posted on in Information Systems

    Along with its ability to enhance collaboration and proliferate information, the Internet has introduced a new level of computer crime. Computer crime consists of a wide array of issues including identity theft and privacy violations, misuse of intellectual property, theft and espionage, and general computer-based attacks. Of the threats facing …

Slaptijack's Koding Kraken