Among about 30 other tools for subverting, intercepting and DoSing them, yes...
On Thu, Dec 31, 2009 at 07:02, Philip Brothwell <[email protected]> wrote: > Like the joys of dealing with people running vomit? http://vomit.xtdnet.nl/ > > > > > On Thu, Dec 31, 2009 at 9:47 AM, Wilhelm, Scott <[email protected]> > wrote: >> >> Also, think about the added switch if you’re using phones like Cisco where >> you connect the phone to the wall & then the computer to the phone. What >> are the added possibilities there? >> >> >> >> >> >> >> >> From: David Lum [mailto:[email protected]] >> Sent: Thursday, December 31, 2009 9:36 AM >> To: NT System Admin Issues >> Subject: VoIP >> >> >> >> Would it be accurate to state that going to VoIP you are now adding phone >> calls to the same security concerns as data over IP and you’re effectively >> adding nodes? Say, 300 VoIP devices now means your switches, routers and >> firewalls need to be configured and operated as if you have 300 new data >> systems (servers ,PC’s) on your wire, but now with a different OS pushing >> data over the wire? Sure, it might be over different CAT5 and physical >> hardware, but conceptually it’s the same, right? >> >> David Lum // SYSTEMS ENGINEER >> NORTHWEST EVALUATION ASSOCIATION >> (Desk) 971.222.1025 // (Cell) 503.267.9764 >> >> >> >> >> >> >> >> >> >> > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
