Security in VoIP has not been a very popular subject so far, but with the increasing demand for VoIP, it is becoming an important concern. VoIP security threats are increasing in number.
VoIP Security Threats -
Making Your VoIP Secure
VoIP Phishing - What It Is And How It Works
Do Softphones Make My Network or Machine More Vulnerable?
Getting the Most out of VoIP!
Here are some things you need to know to be able to make your VoIP experience as great as possible. These include materials and equipment, tips and tricks, security and some other things. VoIP can also handles voice, but also video and data. Here are your resources.
Requirements and Setting Up | VoIP | Equipment/Hardware | Tips And How To's | VoIP Security | Faxing over IP | Recording Your Calls
With VoIP, you use an IP network through an ADSL Internet connection or other, to make or receive calls to / from terrestrial PSTN. You can even talk to people with a landline number using your computer, for example using the SkypeIn and SkypeOut service. PSTN includes telephone numbers and IP networks have IP addresses. How these two work together?
Answer: The answer is address translation. Your computer or VoIP device connected to the Internet has an IP address assigned to it. When you call a person on a fixed PSTN phone, your call is forwarded to the PSTN network via the telephone number of the person you call. And vice versa.
For phone users who want a type of VoIP is more or less as their existing fixed line with traditional phones, the most appropriate types of VoIP services are subscription and equipment services. They are intended mainly to households and small businesses. Upon subscription, the user is sent an adapter (ATA) and is given a phone number. This requires an Internet connection, which adds cost, but the overall cost is relatively much weaker. Added benefits are the many features that come with VoIP.
Factors Affecting VoIP Voice Quality
Running VoIP on a Wireless LAN