Thanks A.J I know and I can assure you no one will get that physical access to the system.
A J Stiles wrote: > On Friday 14 October 2011, Muro, Sam wrote: >> Hi there >> >> Consider this. You have three SIP extension 200, 201 and 202 and you >> have >> configured your phones, say Polycom 331 to those accounts. 200 being one >> very sensitive individual. >> >> Lets say, an insider, get a new phone or perhaps an xlite and configure >> it >> with the same extension, 200. Asterisk will register it as 200 to the >> new >> IP address. Now extension 202 call 200. The hacker answers it and >> pretend >> is the same person. Do what he want to do and thats it. >> >> Question; >> How can i stop this type of threat > > Be careful who you employ and how you treat them :) > > Once someone has physical access to your equipment, all bets are off ..... > > -- > AJS > > Answers come *after* questions. > > -- > _____________________________________________________________________ > -- Bandwidth and Colocation Provided by http://www.api-digital.com -- > New to Asterisk? Join us for a live introductory webinar every Thurs: > http://www.asterisk.org/hello > > asterisk-users mailing list > To UNSUBSCRIBE or update options visit: > http://lists.digium.com/mailman/listinfo/asterisk-users > -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
