Inspecting signaling over TLS/ SSL

Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret.

For TCP connections, the de facto standard is Transport Layer Security (TLS) and, its predecessor, Secure Sockets Layer (SSL). Both of these are frequently referred to collectively as “SSL” and are cryptographic protocols that provide communications security over a computer network.

The primary goal of the TLS protocol is to provide privacy and data integrity between two communicating computer applications. When secured by TLS, connections between an SIP, XMPP, or HTTP client (for example, a web browser) and a server (for example, wikipedia.org) have one or more of the following properties:

Continue reading “Inspecting signaling over TLS/ SSL”

The 6 obstacles that block the growth of the system integrator

wildix blog hurdlesThere is a common uneasiness among “classic” system integrators:

“We are unable to grow”

Regardless of the daily effort, abilities and experience, year after year profit is stagnant.

Sales never really take-off as you would like, and the books cry month after month.

Have you ever thought about the obstacles that prevent you from growing like other companies in your area? Continue reading “The 6 obstacles that block the growth of the system integrator”

A French Case Study: Carpe Diem Nursing Home

A contribution to the health sector and the Wildix solution become a fundamental part in a nursing home

Establishing a quality nursing home on all levels was the objective of Clotilde Hautrive, director of the CARPE DIEM nursing home, located in Compiègne.

From the construction of the building by Spie Batignoles group to the study of the information and telephone service needs, nothing was left to chance. This new medical structure, built in August of 2017, can accommodate 48 residents living with Alzheimer’s. These are patients who require a continuous and quality communication service, that is able to guarantee the wellness of the residents and that of the healthcare personnel. Continue reading “A French Case Study: Carpe Diem Nursing Home”

Your target is the dictator of your activities

Over the years, I’ve studied, put into practice and questioned a great number of activities that were aided and assisted by books, courses and consultations. Some actions worked, others not so much.

Today, I would like to share with you the teaching that everyone who approaches marketing must always keep in mind, because it is that on which every activity is built.

No, it is not one of those super complex topics from a college textbook… Continue reading “Your target is the dictator of your activities”

What is SCRAM Authentication Type?

In the previous blog article (Basic and Digest Authentication Types) we have started reviewing authentication types . This time we will focus on SCRAM which is a family of HTTP authentication mechanisms.

XMPP supports plaintext, digest password exchanges and also SCRAM (Salted Challenge Response Authentication Mechanism). SCRAM introduces advantages over Digest, since it allows the server to store password hashes in an irreversible format.

This feature protects against offline attacks on the password and user database. The client can also save a hash-only version of the password, making it more difficult for attackers (who may have access to the PC where the password is stored) to understand the password in plaintext format.

Furthermore, SCRAM protects from man-in-the-middle attacks when certificates are used. This is done by allowing the server to prove to the client that, not only is the certificate signed by a CA (Certification Authority), but that it also knows the password.

Continue reading “What is SCRAM Authentication Type?”