Too true. Which is why I prefer running VoIP on separate wiring.
On Thu, Dec 31, 2009 at 10:33 AM, Kurt Buff <[email protected]> wrote: > Among about 30 other tools for subverting, intercepting and DoSing them, > yes... > > On Thu, Dec 31, 2009 at 07:02, Philip Brothwell > <[email protected]> wrote: > > Like the joys of dealing with people running vomit? > http://vomit.xtdnet.nl/ > > > > > > > > > > On Thu, Dec 31, 2009 at 9:47 AM, Wilhelm, Scott <[email protected]> > > wrote: > >> > >> Also, think about the added switch if you’re using phones like Cisco > where > >> you connect the phone to the wall & then the computer to the phone. > What > >> are the added possibilities there? > >> > >> > >> > >> > >> > >> > >> > >> From: David Lum [mailto:[email protected]] > >> Sent: Thursday, December 31, 2009 9:36 AM > >> To: NT System Admin Issues > >> Subject: VoIP > >> > >> > >> > >> Would it be accurate to state that going to VoIP you are now adding > phone > >> calls to the same security concerns as data over IP and you’re > effectively > >> adding nodes? Say, 300 VoIP devices now means your switches, routers and > >> firewalls need to be configured and operated as if you have 300 new data > >> systems (servers ,PC’s) on your wire, but now with a different OS > pushing > >> data over the wire? Sure, it might be over different CAT5 and physical > >> hardware, but conceptually it’s the same, right? > >> > >> David Lum // SYSTEMS ENGINEER > >> NORTHWEST EVALUATION ASSOCIATION > >> (Desk) 971.222.1025 // (Cell) 503.267.9764 > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
