Too true.  Which is why I prefer running VoIP on separate wiring.


On Thu, Dec 31, 2009 at 10:33 AM, Kurt Buff <[email protected]> wrote:

> Among about 30 other tools for subverting, intercepting and DoSing them,
> yes...
>
> On Thu, Dec 31, 2009 at 07:02, Philip Brothwell
> <[email protected]> wrote:
> > Like the joys of dealing with people running vomit?
> http://vomit.xtdnet.nl/
> >
> >
> >
> >
> > On Thu, Dec 31, 2009 at 9:47 AM, Wilhelm, Scott <[email protected]>
> > wrote:
> >>
> >> Also, think about the added switch if you’re using phones like Cisco
> where
> >> you connect the phone to the wall & then the computer to the phone.
> What
> >> are the added possibilities there?
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >> From: David Lum [mailto:[email protected]]
> >> Sent: Thursday, December 31, 2009 9:36 AM
> >> To: NT System Admin Issues
> >> Subject: VoIP
> >>
> >>
> >>
> >> Would it be accurate to state that going to VoIP you are now adding
> phone
> >> calls to the same security concerns as data over IP and you’re
> effectively
> >> adding nodes? Say, 300 VoIP devices now means your switches, routers and
> >> firewalls need to be configured and operated as if you have 300 new data
> >> systems (servers ,PC’s) on your wire, but now with a different OS
> pushing
> >> data over the wire? Sure, it might be over different CAT5 and physical
> >> hardware, but conceptually it’s the same, right?
> >>
> >> David Lum // SYSTEMS ENGINEER
> >> NORTHWEST EVALUATION ASSOCIATION
> >> (Desk) 971.222.1025 // (Cell) 503.267.9764
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >
> >
> >
> >
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to