These are scam websites. They will send you some $10 Chinese shoes/boots, from China. Not the $200 – $500 shoes that you order.

All of these websites were created in the past couple of months and registered through a German registrar.


These are scam websites. They will send you some $10 Chinese shoes/boots, from China. Not the $200 – $500 shoes that you order.

All of these websites were created in the past couple of months and registered through a German registrar.

Cisco SPA BLF Call Pickup not working with Asterisk 13

(update: I think I realised that this only applies to PJSIP. With chan_sip it works the same as the rest of the Internet would tell you).

6 hrs later, I discovered that Cisco SPA5xx with firmware 7.6.1, and Asterisk 13, require the ‘system type’ in the attendant console settings, setting to Broadsoft. It doesn’t work when set to Asterisk (Directed Call Pickup doesn’t work). This has been a long night.

I also had to set the function as below:


without the ext= it still doesn’t work.

It needs both, sub= and ext=, and system type = broadsoft

So, broadsoft as system type, directed pickup code **# or whatever, disable lines 2 – 7 or whatever, set type to private, and use above extended function.

This applies whether you have an attendant console are just using the spare line keys.

My SIP attack IP blocklist

Thanks to fail2ban (with correct new “security” log and regex enabled on asterisk 1.8+ (they don’t try to register any more!)), I collect IP addresses of people attempting to hack/fraud SIP systems. I then block the closest, widest IP subnet. I don’t care if I’m blocking a continent at a time. As and when my handful of external users report problems (overlap of bad/good IP addresses), I will correct, but for now my block list at the router looks like this. Fail2ban blocks using iptables on the Asterisk box itself, but I then kill connections and add to my Mikrotik address-list on the router, after whois’ing the IP and looking if the provider has a wider netblock – then I go for that, otherwise I go for what looks like a good fit the for culprit. Thankfully we also pay for fraud insurance. Ideally, the external handsets would have VPN clients inbuilt, but alas this is not the case. I have configured small mikrotiks to travel with the handset but this seems like a cumbersome offering.

To begin with, this list was called “PlusServer”, because the majority of attacks were coming from PlusServer AG. Next in line was This killed off the most severe attacks, but since then I’ve had everything from Denmark to Palastine (twice) and Russia. Anyway here’s the list, from my Mikrotik address-list.

0 SipAttack
1 SipAttack
2 SipAttack
3 SipAttack
4 SipAttack
5 SipAttack
6 SipAttack
7 SipAttack
8 SipAttack
9 SipAttack
10 SipAttack
11 SipAttack
12 SipAttack
13 SipAttack
14 SipAttack
15 SipAttack
16 SipAttack
17 SipAttack
18 SipAttack
19 SipAttack
20 SipAttack
21 SipAttack
22 SipAttack
23 SipAttack
24 SipAttack
25 SipAttack
26 SipAttack
27 SipAttack
28 SipAttack
29 SipAttack
30 SipAttack
31 SipAttack
32 SipAttack
33 SipAttack
34 SipAttack
35 SipAttack
36 SipAttack
37 SipAttack
38 SipAttack
39 SipAttack
40 SipAttack
41 SipAttack
42 SipAttack
43 SipAttack
44 SipAttack
45 SipAttack
46 SipAttack
47 SipAttack
48 SipAttack
49 SipAttack
50 SipAttack
51 SipAttack
52 SipAttack
53 SipAttack
54 SipAttack
55 SipAttack
56 SipAttack
57 SipAttack
58 SipAttack
59 SipAttack
60 SipAttack
61 SipAttack
62 SipAttack
63 SipAttack
64 SipAttack
65 SipAttack
66 SipAttack
67 SipAttack
68 SipAttack
69 SipAttack
70 SipAttack
71 SipAttack
72 SipAttack
73 SipAttack
74 SipAttack
75 SipAttack
76 SipAttack
77 SipAttack

Remove windows 10 appx packages, but retain store

$Packages = “Microsoft.SkypeApp_3.2.1.0_x86__kzf8qxf38zg5c” , `
“Microsoft.People_1.10241.0.0_x64__8wekyb3d8bbwe” , `
“Microsoft.BingFinance_4.4.200.0_x86__8wekyb3d8bbwe” , `
“Microsoft.WindowsCalculator_10.1507.15010.0_x64__8wekyb3d8bbwe” , `
“Microsoft.BingNews_4.4.200.0_x86__8wekyb3d8bbwe” , `
“Microsoft.BingSports_4.4.200.0_x86__8wekyb3d8bbwe” , `
“Microsoft.Getstarted_2.2.7.0_x64__8wekyb3d8bbwe” , `
“Microsoft.WindowsMaps_4.1506.50715.0_x64__8wekyb3d8bbwe” , `
“Microsoft.BingWeather_4.4.200.0_x86__8wekyb3d8bbwe” , `
“Microsoft.WindowsSoundRecorder_10.1507.7010.0_x64__8wekyb3d8bbwe” , `
“Microsoft.WindowsAlarms_10.1507.17010.0_x64__8wekyb3d8bbwe” , `
“Microsoft.XboxApp_7.7.29027.0_x64__8wekyb3d8bbwe” , `
“Microsoft.Windows.Photos_15.803.16240.0_x64__8wekyb3d8bbwe” , `
“Microsoft.ZuneVideo_3.6.12101.0_x64__8wekyb3d8bbwe” , `
“Microsoft.ZuneMusic_3.6.12101.0_x64__8wekyb3d8bbwe” , `
“Microsoft.MicrosoftSolitaireCollection_3.3.8040.0_x64__8wekyb3d8bbwe” , `
“Microsoft.WindowsCamera_5.42.3008.0_x64__8wekyb3d8bbwe” , `
“Microsoft.MicrosoftOfficeHub_17.6106.23501.0_x64__8wekyb3d8bbwe” , `
“Microsoft.windowscommunicationsapps_17.6106.42001.0_x64__8wekyb3d8bbwe” , `

ForEach ($package in $Packages)
remove-AppxProvisionedPackage -online -packagename $package
remove-AppxPackage -package $package

owncloud restrict download of entire root as zip

in /var/www/owncloud/lib/private/files.php

In this case, the workspace/store is called Savills. We also want to cover when the other download button is chosen from the root itself (


Look for the code starting with “try”, and modify like below. Dirty but does the job for now.

try {
if ($name ===’’) {
header(“HTTP/1.0 403 Forbidden”);
die(“Please choose a smaller selection to download. Use your back button to return.”);
if (($name ===’’) && (count($files) == “1”)) {
header(“HTTP/1.0 403 Forbidden”);
die(“Tried to download whole of root, as Not allowed.”);

Apple Mail (Mavericks) autocomplete / previous recipients will not remove

This is actually down to Exchange’s Suggested Contacts, I think.


If you open up Contacts, choose the Exchange account, you can search and remove the offending contact there. the actual list of “Suggested Contacts” appeared empty to me, but searching overall did return the contact in question, and removing it has finally removed it from the autocomplete list in Apple Mail.