Security in VoIP has not been a very popular subject so far, but with the increasing demand for VoIP, it is becoming an important concern. VoIP security threats are increasing in number.
VoIP Security Threats -
Making Your VoIP Secure
VoIP Phishing - What It Is And How It Works
Do Softphones Make My Network or Machine More Vulnerable?
With VoIP, you use an IP network through an ADSL Internet connection or other, to make or receive calls to / from terrestrial PSTN. You can even talk to people with a landline number using your computer, for example using the SkypeIn and SkypeOut service. PSTN includes telephone numbers and IP networks have IP addresses. How these two work together?
Answer: The answer is address translation. Your computer or VoIP device connected to the Internet has an IP address assigned to it. When you call a person on a fixed PSTN phone, your call is forwarded to the PSTN network via the telephone number of the person you call. And vice versa.
Getting the Most out of VoIP!
Here are some things you need to know to be able to make your VoIP experience as great as possible. These include materials and equipment, tips and tricks, security and some other things. VoIP can also handles voice, but also video and data. Here are your resources.
Requirements and Setting Up | VoIP | Equipment/Hardware | Tips And How To's | VoIP Security | Faxing over IP | Recording Your Calls
Simple VoIP requires very little equipment. More advanced communication Voice over IP requires more sophisticated equipment. What is the equipment for VoIP?
Common VoIP Hardware Devices
IP Phones - Special Phones for VoIP
What is an ATA?
What The Lights On Your Phone Adapter (ATA) Mean
What is a Router? - The Functions of a PBX