Among about 30 other tools for subverting, intercepting and DoSing them, yes...

On Thu, Dec 31, 2009 at 07:02, Philip Brothwell
<[email protected]> wrote:
> Like the joys of dealing with people running vomit?  http://vomit.xtdnet.nl/
>
>
>
>
> On Thu, Dec 31, 2009 at 9:47 AM, Wilhelm, Scott <[email protected]>
> wrote:
>>
>> Also, think about the added switch if you’re using phones like Cisco where
>> you connect the phone to the wall & then the computer to the phone.  What
>> are the added possibilities there?
>>
>>
>>
>>
>>
>>
>>
>> From: David Lum [mailto:[email protected]]
>> Sent: Thursday, December 31, 2009 9:36 AM
>> To: NT System Admin Issues
>> Subject: VoIP
>>
>>
>>
>> Would it be accurate to state that going to VoIP you are now adding phone
>> calls to the same security concerns as data over IP and you’re effectively
>> adding nodes? Say, 300 VoIP devices now means your switches, routers and
>> firewalls need to be configured and operated as if you have 300 new data
>> systems (servers ,PC’s) on your wire, but now with a different OS pushing
>> data over the wire? Sure, it might be over different CAT5 and physical
>> hardware, but conceptually it’s the same, right?
>>
>> David Lum // SYSTEMS ENGINEER
>> NORTHWEST EVALUATION ASSOCIATION
>> (Desk) 971.222.1025 // (Cell) 503.267.9764
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to