Wednesday, December 28, 2022

Aplikasi android untuk SMTP & PO3 untuk akses tesemail@namadomain.com

 Aplikasi android untuk SMTP & PO3 untuk akses tesemail@namadomain.com


bisa gunakan blue mail


1. Install

2. Pilih Tambah account

3. Pilih other

4. Masukkan user dan password

5. Incoming : POP3, Pilih StarTTLS certified, port  995 jika tdk bisa pilih 995

6. outgoing : StarTTLS , port 587

7. masukkan keterangan

Thursday, December 22, 2022

Cara Mengatasi Web Wordpress yang Terserang hacker..

 



Ketika membuka website : websitesaya.com/wp-admin
Muncul sesperti foto diatas.

cara mengatasinya :

Install Ulang Core WordPress Melalui FTP

https://www.niagahoster.co.id/blog/cara-install-ulang-core-wordpress/

Bagaimana jika dashboard WordPress Anda error atau tidak bisa diakses? Tenang saja, Anda masih dapat melakukan install ulang core WordPress melalui FTP kok. Langsung saja ikuti langkah-langkah berikut ini :

1. Download WordPress Versi Terbaru

Anda harus mendownload WordPress versi terbaru yang tersedia di website resmi WordPress.org terlebih dahulu. Setelah masuk ke halaman website, temukan dan klik tombol Download WordPress

Download WordPress untuk Install Ulang Core WordPress

2. Ekstrak File WordPress

Jika proses download telah selesai, Anda akan melihat file berekstensi .zip di dalam folder download pada komputer Anda. Silahkan ekstrak seluruh konten yang terdapat pada file .zip tersebut.

Agar konten wordpress Anda tidak ter-overwrite ketika proses upload file, hapuslah folder wp-content dengan cara klik kanan pada folder, lalu klik Delete. Anda juga bisa menghapusnya dengan langsung menekan tombol delete di keyboard.

Ekstrak file wordpress untuk install ulang core wordpress

3. Upload File WordPress

Terakhir, Anda perlu mengupload file wordpress Anda dengan menggunakan FTP Client.  Unggah file ke folder tempat Anda menginstall WordPress. Secara default, biasanya WordPress tersimpan pada folder root dengan nama public atau public_html.

Baca Juga : Cara Menggunakan FileZilla

Ketika proses upload dimulai, aplikasi FTP Client Anda akan menampilkan prompt dengan pesan Target file already exists.  Pilih opsi Overwrite dan ceklis pilihan Apply to current queue only, lalu klik OK untuk melanjutkan upload file.

Install Ulang Core WordPress Melalui FTP

Karena Anda sudah menghapus folder wp-content di langkah sebelumnya, maka tema maupun plugin WordPress Anda tidak akan terpengaruh saat dilakukan overwrite terhadap semua file core WordPress.

Jika proses upload telah selesai, harusnya sekarang core WordPress baru sudah terinstall dan berjalan dengan baik pada website Anda.


Biasanya nanti website akan kembali normal.

Untuk mengamankan dan scan website gunakan plugin wordfence.

Aplikasi untuk Memindah File besar antar HP Seperti ketika Punya HP Baru

 Ketika punya HP baru, tentu akan butuh untuk memindah file dari HP lama.

tentu butuh file ber giga".

- Pernah saya coba pakai kabel data menyambung ke komputer dan kemudian memindah dengan mengcopy dari HP lama ke HP baru. Cara ini lama proses transfernya.

- Menggunakan aplikasi SHAREit , ini sangat cepat, dia tidak menggunakan data seluler HP saat proses transfer.


https://play.google.com/store/apps/details?id=com.lenovo.anyshare.gps&hl=id&gl=US&pli=1



Wednesday, December 14, 2022

There has been a critical error on this website. Learn more about troubleshooting WordPress.

 Jika muncul pesan di wordpress:

There has been a critical error on this website.


Learn more about troubleshooting WordPress.


maka : 

aktifkan atau set ke true debug di wp-config.php


nanti akan muncul pesan kesalahan seperti :

Fatal error: Uncaught Error: Call to undefined function mysql_connect() in /home/namadomain.com/public_html/wp-includes/class-wpdb.php:1807 Stack trace: #0 /home/namadomain.com/public_html/wp-includes/class-wpdb.php(734): wpdb->db_connect() #1 /home/namadomain.com/public_html/wp-includes/load.php(562): wpdb->__construct() #2 /home/namadomain.com/public_html/wp-settings.php(124): require_wp_db() #3 /home/namadomain.com/public_html/wp-config.php(99): require_once('/home/namadomai...') #4 /home/namadomain.com/public_html/wp-load.php(50): require_once('/home/namadomai...') #5 /home/namadomain.com/public_html/wp-admin/admin.php(34): require_once('/home/namadomai...') #6 /home/namadomain.com/public_html/wp-admin/index.php(10): require_once('/home/namadomai...') #7 {main} thrown in /home/namadomain.com/public_html/wp-includes/class-wpdb.php on line 1807

There has been a critical error on this website.


Learn more about troubleshooting WordPress.


Solusi :

masuk ke dashboard hosting yg menggunakan cyberpanel 

ubah versi php ke 7.4 atau yg sesuai

kemudian rewrite rule diklik dan save


hasil

hasilnya akan normal kembali.



Wednesday, December 7, 2022

How To Install Jitsi Meet on Ubuntu 22.04

https://www.digitalocean.com/community/tutorials/how-to-install-jitsi-meet-on-ubuntu-22-04


The author selected the Open Internet/Free Speech Fund to receive a donation as part of the Write for DOnations program.

Introduction

Jitsi Meet is an open-source video-conferencing application based on WebRTC. A Jitsi Meet server provides multi-person video conference rooms that you can access using with just your browser while providing comparable functionality to a Zoom or Skype conference call. The benefit of a Jitsi conference is that all your data only passes through your server. The end-to-end TLS encryption ensures that no one can snoop on the call. With Jitsi, you can ensure that your private information stays that way.

In this tutorial, you will install and configure a Jitsi Meet server on Ubuntu 22.04. The default Jitsi configuration allows anyone who can browse the server to create a new conference room, which is not ideal for a publicly available server on the internet. You will also configure Jitsi Meet so that only registered users can create new conference rooms. After creating the conference room, anyone can join it if they have the unique address and optional password.

Prerequisites

Before you begin this guide, you will need the following:

  • One Ubuntu 22.04 server with a non-root sudo-enabled user and a firewall, which you can set up by following the Initial Server Setup with Ubuntu 22.04. The size of the server you need will depend on the available bandwidth and the number of participants you expect to in the conferences. The table below will give you an idea of what is required.
  • A domain name configured to point to your server. Use the DNS Quickstart Guide to point domains to DigitalOcean servers. This guide uses the example domain name jitsi.your_domain.

When choosing a server to run your Jitsi Meet instance, you need to consider the system resources for hosting conference rooms. The following benchmark information was collected from a single-core virtual machine using high-quality video settings:

CPUServer Bandwidth
Two Participants     5%     30Kbps Up, 100Kbps Down
Three Participants     15%     5Mbps Up, 3Mbps Down

The jump in resource use between two and three participants is because Jitsi will route the call data directly between the clients when there are two of them. Call data is routed through the Jitsi Meet server when more than two clients are present.

Log in to your server as the non-root, sudo-enabled user before starting Step 1.

Step 1 — Setting the System Hostname

In this step, you will change the system’s hostname to match the domain name you intend to use for your Jitsi Meet instance. You will also locally resolve that hostname to your server’s public IP. Jitsi Meet uses both settings when it installs and generates its configuration files.

First, set the system’s hostname to the domain name that you will use for your Jitsi instance. The following command will set the current hostname and modify the /etc/hostname that holds the system’s hostname between reboots:

  1. sudo hostnamectl set-hostname jitsi.your_domain

Enter your password when prompted. The command that you ran breaks down as follows:

  • hostnamectl: A utility from the systemd tool suite to manage the system hostname.
  • set-hostname: Sets the system hostname.

Check that the hostname was set with the following command:

  1. hostname

This command will return the hostname you set with the hostnamectl command:

Output
jitsi.your-domain

Next, you will set a local mapping of the server’s hostname to its public IP address. Do this by opening the /etc/hosts with nano or your favorite text editor:

  1. sudo nano /etc/hosts

The contents of this file look like the following:

/etc/hosts
# Your system has configured 'manage_etc_hosts' as True.
# As a result, if you wish for changes to this file to persist
# then you will need to either
# a.) make changes to the master file in /etc/cloud/templates/hosts.debian.tmpl
# b.) change or remove the value of 'manage_etc_hosts' in
#     /etc/cloud/cloud.cfg or cloud-config from user-data
#
127.0.1.1 server1 server1
127.0.0.1 localhost

# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

Then, add the following line under the 127.0.0.1 localhost line:

/etc/hosts
...
public_ip jitsi.your_domain
...

For example, if the public IP of your server is 1.2.3.4, the updated file would look like the following:

/etc/hosts
# Your system has configured 'manage_etc_hosts' as True.
# As a result, if you wish for changes to this file to persist
# then you will need to either
# a.) make changes to the master file in /etc/cloud/templates/hosts.debian.tmpl
# b.) change or remove the value of 'manage_etc_hosts' in
#     /etc/cloud/cloud.cfg or cloud-config from user-data
#
127.0.1.1 server1 server1
127.0.0.1 localhost
1.2.3.4 jitsi.your_domain

# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

Save and close the file.

Your server now has the hostname and IP address setting Jitsi requires when installed. In the next step, you will open the firewall ports needed by Jitsi and the TLS certificate installer.

Step 2 — Configuring the Firewall

When you followed the Initial Server Setup with Ubuntu 22.04, you enabled the UFW firewall and opened the SSH port. The Jitsi server needs some additional ports open to communicate with the call participants. The TLS installation process also requires a port open to authenticate the certificate registration request.

If you have not yet allowed SSH traffic through UFW, run the following command:

  1. sudo ufw allow OpenSSH

Next, open the following ports for Jitsi:

  • 80/tcp: Port used in the TLS certificate registration request.
  • 443/tcp: Port used for the conference room creation web page.
  • 10000/udp 3478/udp 5349/tcp: Ports that will transmit and receive the encrypted call traffic.

Run the following ufw commands to open these ports:

  1. sudo ufw allow 80/tcp
  2. sudo ufw allow 443/tcp
  3. sudo ufw allow 3478/udp
  4. sudo ufw allow 5349/tcp
  5. sudo ufw allow 10000/udp

Check that they were all added with the ufw status command:

  1. sudo ufw status

You will receive the following output to indicate these ports are open (including OpenSSH):

Output
Status: active To Action From -- ------ ---- OpenSSH ALLOW Anywhere 80/tcp ALLOW Anywhere 443/tcp ALLOW Anywhere 3478/udp ALLOW Anywhere 5349/tcp ALLOW Anywhere 10000/udp ALLOW Anywhere OpenSSH (v6) ALLOW Anywhere (v6) 80/tcp (v6) ALLOW Anywhere (v6) 443/tcp (v6) ALLOW Anywhere (v6) 3478/udp (v6) ALLOW Anywhere (v6) 5349/tcp (v6) ALLOW Anywhere (v6) 10000/udp (v6) ALLOW Anywhere (v6)

You may see the following inactive status instead of the ports if you have not enabled UFW:

Output
Status: inactive

If so, you need to enable ufw. Run the following command and answer y when prompted to enable ufw:

  1. sudo ufw enable

Recheck the status to ensure that the ports are open.

With the ports open, the server is ready for the Jitsi installation, which you will complete in the next step.

Step 3 — Installing Jitsi Meet

You will now add the Jitsi and the Prosody APT repositories to your server. Prosody is an open-source XMPP chat server that Jitsi uses for messaging and admin authentication. You will then install the Jitsi Meet package from its repository, which will ensure that you are always running the latest stable Jitsi Meet package.

First, download the Jitsi GPG key with the curl downloading utility:

  1. curl https://download.jitsi.org/jitsi-key.gpg.key -o jitsi-key.gpg.key

In this command, -o specifies the name of the file where the downloaded key data will be saved. The apt package manager will use this GPG key to validate the packages you will download from the Jitsi repository.

Next, add the GPG key to your system’s keyring with the following gpg command:

  1. sudo gpg --output /usr/share/keyrings/jitsi-key.gpg --dearmor jitsi-key.gpg.key

With this gpg command, you use --output to generate a file name to save the keyring in and --dearmor to unpack the key into a format usable by APT.

You will now add the Jitsi repository to your server by creating a new APT sources file that contains the Jitsi repository. Open and create the new file with the following command:

  1. sudo nano /etc/apt/sources.list.d/jitsi-stable.list

Add this line to the /etc/apt/sources.list.d/jitsi-stable.list file:

/etc/apt/sources.list.d/jitsi-stable.list
deb [signed-by=/usr/share/keyrings/jitsi-key.gpg] https://download.jitsi.org stable/

Save and exit the editor.

Next, you will follow the same steps to add the Prosody package. Download the Prosody GPG key:

  1. curl https://prosody.im/files/prosody-debian-packages.key -o prosody-debian-packages.key

Then, add the key to your server’s keyring:

  1. sudo gpg --output /usr/share/keyrings/prosody-keyring.gpg --dearmor prosody-debian-packages.key

Next, open a new sources file for Prosody:

  1. sudo nano /etc/apt/sources.list.d/prosody.list

Add the following line to the currently empty Prosody sources file:

/etc/apt/sources.list.d/prosody.list
deb [signed-by=/usr/share/keyrings/prosody-keyring.gpg] http://packages.prosody.im/debian jammy main

Save and exit the editor.

You can now delete the GPG keys that you downloaded as they are no longer needed:

  1. rm jitsi-key.gpg.key prosody-debian-packages.key

Finally, perform a system update to collect the package list from the new repositories and then install the jitsi-meet package:

  1. sudo apt update
  2. sudo apt install jitsi-meet

Press y to confirm the installation of the packages when prompted.

During the installation of jitsi-meet you will be prompted to enter the domain name (for example, jitsi.your-domain) that you want to use for your Jitsi Meet instance.

Image showing the jitsi-meet installation hostname dialog

Use the TAB key to move the cursor from the hostname field to highlight the <OK> button. Press ENTER when <OK> is highlighted to submit the hostname.

You will then be shown a new dialog box that asks if you want Jitsi to create and use a self-signed TLS certificate or use an existing one:

Image showing the jitsi-meet installation certificate dialog

If you do not have a TLS certificate for your Jitsi domain, select the Generate a new self-signed certificate option.

Your Jitsi Meet instance is now installed using a self-signed TLS certificate. You will receive browser warnings if you don’t yet have a TLS certificate, so you will get a signed TLS certificate in the next step.

Step 4 — Obtaining a Signed TLS Certificate

Jitsi Meet uses TLS certificates to encrypt the call traffic so that no one can eavesdrop on your call as it travels over the internet. TLS certificates are the same mechanism used by websites to enable HTTPS-protected pages.

Jitsi uses the certbot utility to obtain and manage free but industry standard and secure TLS certificates. You need to install this utility before Jitsi can get the certificate it needs.

Install certbot with the following command:

  1. sudo apt install certbot

Press y to confirm the installation of the certbot package when prompted.

Jitsi Meet supplies a script to download a TLS certificate for your domain automatically. Run this certificate installation script provided by Jitsi Meet at /usr/share/jitsi-meet/scripts/install-letsencrypt-cert.sh with the following command:

  1. sudo /usr/share/jitsi-meet/scripts/install-letsencrypt-cert.sh

The script prints the following information when you run it and asks you to supply an email address:

Output
------------------------------------------------------------------------- This script will: - Need a working DNS record pointing to this machine(for domain jitsi.your_domain) - Download certbot-auto from https://dl.eff.org to /usr/local/sbin - Install additional dependencies in order to request Let’s Encrypt certificate - If running with jetty serving web content, will stop Jitsi Videobridge - Configure and reload nginx or apache2, whichever is used - Configure the coturn server to use Let's Encrypt certificate and add required deploy hooks - Add command in weekly cron job to renew certificates regularly You need to agree to the ACME server's Subscriber Agreement (https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf) by providing an email address for important account notifications Enter your email and press [ENTER]:

This email address will be submitted to the certificate issuer https://letsencrypt.org and will be used to notify you about security and other matters related to the certificate. You must enter an email address here to proceed with the installation.

The script will complete the installation and configuration of an SSL certificate for your Jitsi server without any more user input.

The default configuration for Jitsi Meet is that anyone visiting your Jitsi Meet server homepage can create a new conference room. This default mode will use your server’s system resources to run the conference room and is not desirable for unauthorized users. In the next step, you will update those settings.

Step 5 — Locking Conference Room Creation

You will now configure your Jitsi Meet server to allow only registered users to create conference rooms.

The files you will edit were generated by the installer and configured with your domain name. The variable jitsi.your_domain will be used in place of your domain name in the following examples.

First, open /etc/prosody/conf.avail/jitsi.your_domain.cfg.lua with a text editor:

  1. sudo nano /etc/prosody/conf.avail/your_domain.cfg.lua

Next, find the line you need to edit in this file using nano’s search function: CTRL+W. Press CTRL+W then enter authentication = "anonymous" into the search field. Press ENTER to run the search. Your search entry should look like the content in the red box below:

Image showing nano's search box

This search will take the cursor to the line that you need to edit. Edit the following line from its current setup:

/etc/prosody/conf.avail/jitsi.your_domain.cfg.lua
        authentication = "anonymous"

To a new setup:

/etc/prosody/conf.avail/jitsi.your_domain.cfg.lua
        authentication = "internal_plain"

This configuration tells Jitsi Meet to force username and password authentication before allowing conference room creation by a new visitor.

In the same file, add the following section to the end of the file:

/etc/prosody/conf.avail/your_domain.cfg.lua
...
VirtualHost "guest.jitsi.your_domain"
    authentication = "anonymous"
    c2s_require_encryption = false
    modules_enabled = {
            "bosh";
            "ping";
            "pubsub";
            "speakerstats";
            "turncredentials";
            "conference_duration";
    }

This configuration allows any user to join conference rooms that an authenticated user created. However, the guest must have the unique URL (and an optional password) to enter it.

Here, you added guest. to the front of your domain name. For example, the correct name to put here for jitsi.your_domain is guest.jitsi.your_domain. The guest. hostname is used internally by Jitsi Meet, so you will never enter it into a browser or need a separate DNS record for the guest. hostname.

When finished, save and close the /etc/prosody/conf.avail/jitsi.your_domain.cfg.lua file.

Next, open another configuration file at /etc/jitsi/meet/jitsi.your_domain-config.js with a text editor:

  1. sudo nano /etc/jitsi/meet/jitsi.your_domain-config.js

Use the search tool CTRL+W again to search for anonymousdomain:, which will take you to the following line:

/etc/jitsi/meet/your_domain-config.js
        // anonymousdomain: 'guest.example.com',

Edit this line to look like the following by removing the double slashes // at the start of the line:

/etc/jitsi/meet/your_domain-config.js
        anonymousdomain: 'guest.jitsi.your_domain',

You will use the guest.jitsi.your_domain hostname that you used previously. This configuration tells Jitsi Meet what internal hostname to use for the un-authenticated guests. Save and close the file.

Next, create and open /etc/jitsi/jicofo/sip-communicator.properties:

  1. sudo nano /etc/jitsi/jicofo/sip-communicator.properties

Add the following line to complete the configuration changes:

/etc/jitsi/jicofo/sip-communicator.properties
org.jitsi.jicofo.auth.URL=XMPP:jitsi.your_domain

This configuration points one of the Jitsi Meet processes to the local server that performs the user authentication that is now required. When finished, save and close the file.

Your Jitsi Meet instance is now configured so that only registered users can create conference rooms. After creating a conference room, anyone can join it without being a registered user. All they need is the unique conference room address and an optional password set by the room’s creator.

Now that Jitsi Meet is configured to require authenticated users for room creation, you need to register these users and their passwords. You will use the prosodyctl utility to do this.

Run the following command to add a user to your server:

  1. sudo prosodyctl register user your_domain password

The user that you add here is not a system user. They will only be able to create a conference room and cannot log in to your server via SSH.

When you run this command, you may see the following warning:

lua5.1 warning
general             warn        Lua 5.1 has several issues and support is being phased out, consider upgrading

The lua5.1 package is still a required dependency for Prosody and poses no security risk to your system using it. The dependency on lua5.1 will be phased out as Prosody and Jitsi Meet are developed further.

Finally, restart all the Jitsi Meet processes to load the new configuration:

  1. sudo systemctl restart prosody.service jicofo.service jitsi-videobridge2.service

Your Jitsi Meet server is now fully installed, configured, and running. You will create a new conference room in the final step.

Step 6 - Opening a Conference Room and Inviting Participants

You can now browse to and start using your new Jitsi Meet server. Open your browser and enter your Jitsi domain name (with https) into the address bar.

To start a meeting, press the Start Meeting button on the landing page:

Image showing the Start Meeting button on the landing page

When you click the Start Meeting button, it will begin a new meeting. You will immediately be asked if you are the host (the admin of the meeting) in the following dialog box:

Image showing the Start Meeting button on the landing page

You must click on the I am the host button to proceed. After you click on that button, you will be prompted to enter your admin username and password in the following field:

Image showing the username and password dialog

The username and password are the ones that you set in Step 5 with the prosodyctl utility. Enter the username and password and click Login, which will create the new meeting and set you as the moderator.

Now that the meeting is open and running, you can invite participants. Click on the participants icon in the bottom panel:

Image showing the participants button highlighted in the bottom panel

This action opens a right-hand panel. Click on the Invite Someone button:

Image showing the Invite Somone button

This action will open the Invite more people dialog. Copy the unique URL of the meeting by clicking on the copy icon:

Image showing the copy URL icon

You can now paste the meeting URL into an email or chat program to send to anyone you want to attend the meeting. They will not need a username and password to access the meeting after you have created it.

You can test this yourself after you have created a meeting by opening a new, incognito browser tab and pasting the meeting URL into it. You will be able to join the meeting as a new participant without needing a username and password.

Conclusion

In this article, you deployed a Jitsi Meet server that you can use to host secure and private video conference rooms. You can extend your Jitsi Meet instance with instructions from the Jitsi Handbook. In addition to accessing your conferences in a browser, you can also join conferences with an app from Apple and Google.

If you’ve enjoyed this tutorial and our broader community, consider checking out our DigitalOcean products which can also help you achieve your development goals.




Cara Install Jitsi Meet di Ubuntu 20.04

Cara Install Jitsi Meet di Ubuntu 20.04

Jitsi Meet adalah perangkat lunak open source untuk video conferencing berbasis WebRTC (Web Real-Time Communication). Pada tutorial ini kita akan belajar bagaimana cara install Jitsi Meet di Ubuntu 20.04.

Konfigurasi Hostname

Konfigurasi hostname server sesuaikan dengan nama domain/subdomain yang digunakan, misalnya menggunakan subdomain jitsi.musaamin.my.id.

Verifikasi hostname.

Hasilnya.

Masukkan juga ke dalam file /etc/hosts.

Tambahkan baris di bawah ini.

Install Jitsi Meet

Download Jitsi GPG Key.

Masukkan Jitsi GPG key ke apt keyring.

Membuat file Jitsi repository.

Tambahkan baris link Jitsi repository.

Jalankan update.

Install jitsi-meet.

  1. Masukkan hostname, jitsi.musaamin.my.id
  2. Generate a new self-signed certificate

Install SSL Let’s Encrypt

Install certbot.

Jalankan script install-letsencrypt-cert.sh.

Mengaktifkan Autentikasi Pembuatan Ruang Konferensi

Mengaktifkan autentikasi pembuatan ruang konferensi sehingga mengharuskan login terlebih ketika membuat ruang konferensi.

Buka file konfigurasi Prosody untuk jitsi.musaamin.my.id.

Ubah baris ini

Menjadi

Tambahkan di baris paling bawah.

Konfigurasi ini mengijinkan user anonim untuk join ke ruang konferensi.

Buka file konfigurasi jitsi.musaamin.my.id-config.js.

Ubah baris ini

Menjadi

Konfigurasi sip-communicator.

Tambahkan

Membuat user sebagai admin pembuat ruang konferensi.

Restart Jitsi service.

Browse https://jitsi.musaamin.my.id.

Mengubah Title dan Logo

Buka file interface_config.js.

Ubah konfigurasi berikut.

Buka file app.bundle.min.js.

Cari dan ubah konfigurasi headerTitle dan headerSubtitle.

Replace file watermark.svg untuk logo ukuran 32×32 pixel, welcome-background.png untuk background ukuran 1280×400 pixel, dan favicon.ico untuk favorite icon ukuran 32×32 pixel. Lokasi file di folder /usr/share/jitsi-meet/images.

Jitsi Meet welcome page
Jitsi Meet welcome page

Selamat mencoba 🙂