As soon as I have installed asterisk I saw some hackers trying to break in to the system. Can someone recommend some guide to prevent hackers getting in by using bruteforce attacks?
Hi,
Some incoiming external e-mails, like invitation for scheduled Zoom meeting, comes with special attachement .ics to create an event in calendars. When such e-mail is received by SERP mail syste...
Hi,
I checked option "Use External Mail Software" in setting "Mail and Conferences Settings" in module "Mail and Conferences". When I create an invoice email I have a ...