Elastix Research Papers - Academia.edu (original) (raw)

Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance, the interception of conversations, the theft of important and confidential information, and the generation of large expenses in any... more

Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance, the interception of conversations, the theft of important and confidential information, and the generation of large expenses in any organization, if they do not have the correct security mechanisms. VoIP is based on existing layers and protocols and therefore inherits their security issues. In relation to signalization, different protocols have been proposed for VoIP. However, the Session Initiation Protocol (SIP) tends to be the favorite one because it is standardized by the IETF and has many features. Similarly to any other Internet protocol, SIP is susceptible to security threads, and can be involved in different kinds of attacks. In this paper, we propose three basic scenarios, representing common fundamental network architectures for VoIP, from which more complex systems can be built. We also establish a set of policies and guidelines focused on the aforementioned architectures, in order to mitigate security threads and provide more effective solutions for existing vulnerabilities in VoIP.

In this work we show how a simple algorithm such as ode45, can be used to get solutions of special Cosserat rods subjected to arbitrary external forces. This is done by integrating at once Kirchhoff and reference system equations under... more

In this work we show how a simple algorithm such as ode45, can be used to get
solutions of special Cosserat rods subjected to arbitrary external forces. This is done by
integrating at once Kirchhoff and reference system equations under appropriate initial boundary
conditions. We display several numerical solutions for rods including cases showing the effect of
gravity. The solution provided using our formulation converges to the deformed centerline
predicted by Euler’s theory of the elastica.

Reseting root password of CentOS/Redhat/Elastix Box

The increasing number of employees and clients, that are associated with each organization, has motivated them to extend their technological platform with the implementation of unified communications servers, with the goal of... more

The increasing number of employees and clients, that are associated with each organization, has motivated them to extend their technological platform with the implementation of unified communications servers, with the goal of significantly improve their communication processes. On the one hand, people usually look for easy and fast methods for their communications. On the other hand, social networks have experienced an exponential boom in the last few years. Hence, in this research work, we propose a solution that allows the integration of a unified communications system with a social network. For the unified communications system, we choose Elastix, since it has become very popular and many companies worldwide have already based they communications system on it, whereas Twitter has been our selection for the social network, since it is commonly used for the exchange of short and accurate information among people. Our proposal is focused on the customer services offered by organizations to people, using Twitter.