The Wayback Machine - https://web.archive.org/all/20060617042356/http://www.gmsoftwarelinks.com:80/softwarelinks-insight-Whats+Your+IQ+on+Basic+PC+Phone+VoIP+Knowledge-section-1-id-124.html

Software Links

Software Links

Our Network Websites
real estate links
insurance guide
software links
health links
travel links
What’s Your IQ on Basic PC Phone (VoIP) Knowledge
Publish Date : 1/11/2006 6:25:41 PM   Source : Dee Scrip

Short T/F quiz

  1. T / F You can save a significant amount of money using VoIP rather than traditional telephone/cell phone calling methods.

  2. T / F The minimum requirement for VoIP is a broadband (high speed) connection.

  3. T / F VoIP security is not an issue to be concerned about because most computers are protected with firewalls.

  4. T / F Over 75% of the world will be using VoIP for communication within the next 3-4 years.

  5. T / F You can make all your phone calls anywhere in the world from your computer.

  6. T / F Peer-to-peer (P2P) networks are perfectly safe to use, especially if your computer is protected with firewalls.

Answers

1. The answer is True. In fact, it is the tremendous savings of up to 80% off traditional phone calling that makes VoIP attractive to consumers and businesses. The only equipment needed for VoIP is your PC and a microphone (if one is not built into your PC). Beware of VoIP service providers that require you to purchase additional equipment and/or sign contracts.

2. The answer is False. Although the public has been fed a steady diet that the minimum requirement for VoIP is a high speed (broadband) connection, this is absolutely false.

Over 90% of the VoIP providers have used this false premise as a smokescreen to take your focus off the fact that their priority was and is to line their own pockets rather than expend the time, effort, and funds to develop technology that incorporates dial up capability.

The technology required for dial up connections to use VoIP involves the ability to compress data packets down to a minimum size of 8 kbps prior to traveling over the Internet.

3. The answer is False. Security should be the most important feature of any VoIP solution provider. Firewalls do not incorporate protection for VoIP. VoIP security should incorporate protection against identity theft, Trojan horses, viruses, and worms.

Craig Pollard of Siemens advised that “Voice must be protected like any other application". He further stated that, "Along with IT directors and telecom managers, a number of financial directors came to our road shows, which may not be surprising considering the damaging potential of VoIP threats if a network is not properly protected."

Over 90% of VoIP solution providers do not operate on secure lines. These providers, in order to save a few dollars at your expense, operate on industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable. Hacker friendly providers offer hacker manuals, software, programs, and even processor chips that makes accessibility to your computer from these industry standards – as enticing as chum is to sharks in a feeding frenzy.

When a computer hacker gains unauthorized access to your computer, their sole purpose is to steal your identity and sell your personal and confidential information to other criminal entities. In addition, they often plant Trojan horses, viruses, and worms into your computer.

4. The answer is True. Industry insiders such AT&T; says, “VoIP traffic is projected to account for approximately 75% of the world’s voice traffic by 2007”. This suggests a major paradigm shift in communication.

5. The answer is True. Not only can you make all your phone calls anywhere in the world from your computer, you can also travel with your computer phone. Simply by bringing your unique number and password, you can download your phone with your entire contact list. Of course, PC to PC is usually free between subscribers. PC to telephones and cell phones typically involves fees at drastically reduced rates when compared to traditional calling rates.

6. The answer is False. P2P networks use industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable.

John Ashcroft, Attorney General, in remarks at the High Technology Crime Investigation Association 2004 International Training Conference held on September 13, 2004 stated, “We have seen worms and viruses attack…disrupting basic services…And with the increased use of the Internet and especially peer-to-peer networking, we have seen malicious code spread more quickly and infect more personal computers than ever before. The cost of these worms, viruses, and denial-of-service attacks…reaches into the billions of dollars.”

P2P networks such as Skype operate by taking bandwidth (information carrying capacity) from customers on their service to assist other customers using their service - analogous to a symbiotic relationship. The tools that enable them to accomplish this are bundled in the software their customers agree to in order to download and access their VoIP service.

Another grave concern for both individuals and businesses when using P2P systems is unknowingly having your computer used as a supernode. A supernode occurs when your computer is arbitrarily assigned as a hub.

When you are running the software for P2P services, your computer’s disk space, bandwidth, and processing power are used to help other users on the same system operate their software more efficiently because of their own network or firewall constraints.

We as consumers still have a lot to learn about VoIP, as this technology is the new era of communication and is continuously being changed.

All VoIP service providers need to incorporate the protection, needs, and desires of its customers, as well as address security and dial up capability.

All VoIP service providers should invest in developing a proprietary patented technology that incorporates compression of data packets so that their VoIP can be used on dial up connections, as well as cable, satellite, and wireless.

All VoIP service providers should develop and create their own proprietary high end encryption codec with patented technology, simply because they do not want their customers to be victims of viruses, worms, Trojan horses, or have their identity stolen as a result of using their VoIP service.

Simply put, all VoIP service providers should place the protection, security, and needs of their customers FIRST. Of course, they are in business to earn profits, but it should not be at the expense of exposing their customers to unscrupulous entities.

Want to hear and experience what exceptional sound quality on optimally secure lines sounds like? Download a 7 day free trial at http://www.free-pc-phone.com and see for yourself.

By Dee Scrip © All Rights Reserved.

**Attn Ezine editors / Site owners **

Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include the resource box as listed above.

About The Author

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com

deescrip48@comcast.net

Premium Link Partners




Become a Premium Link Partner
Premium Link Partners




Become a Premium Link Partner

More Real Estate Guides


What the Heck is Server Side HTML?        
If you're stuck in the dark ages and are still editing the pages of your web site by hand, there's an easy way to change the look of your web site on a moment's notice, by editing only one file. I know, there are all kinds of brand new...

What’s Your IQ on Basic PC Phone (VoIP) Knowledge        
Short T/F quiz T / F You can save a significant amount of money using VoIP rather than traditional telephone/cell phone calling methods. T / F The minimum requirement for VoIP is a broadband (high speed) connection. T / F VoIP security...

Your Website - Your Virtual Business Card        
To make one thing clear way ahead, without a website you will not survive on this market. And while you are at it, make sure the website is user-friendly because you will need to make changes once in a while and if only to promote some new...

Short Messaging Service (SMS) for Enterprise Messaging        
Short Messaging Service (SMS) for Enterprise Messaging SMS for Enterprise Messaging – Value added services Short message service, usually called SMS, is a globally accepted wireless service for enterprise messaging (mobile value added services)...

Should You Use a Free or Paid Blogging Service 1        
Blogging is an abbreviation of "web-logging". The simplest definition of a blog is that it is an online log that is organized in reverse chronological order. It comprises of comments, declarations, links, or anything else of interest to the blog...

Show Your Customers You Care        
I recently went to a major computer/electronics store to buy an expensive software package. I felt good that I was able to find the software at a substantial discount. But by the time I was through paying for my purchase I never wanted to come...

Spyware : An Internet Plague        
As spyware threats continue to grow the methods by which users are infected becomes less and less difficult. It no longer takes physical access to a computer nor do users have to click on an ad or email attachment to install the malicious...

Spyware Programs Are Out To Get You        
The average computer is packed with hidden software that can secretly spy on online habits. The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. There are...

Starting Your Desktop Publishing Project At The End        
The only place where you can find the beginning to start at the end is during a typical desktop publishing project. As one designer would relate, for all practical purposes, the process of culling information starts at the end in the printing...

Staying Cool When the Job Heats Up        
Jobs are heating up. We're all feeling the pinch of hiring freezes and information overload. Workplace stress is increasing right along with the workload. Headaches are turning into migraines; back pains are driving us to the chiropractor, and...

Total Results : 125  
More News (Opens in New Window) :    [1]   2   3   4   5   6   7   8   9   10   11   12   13      Next Page
Our Network Websites >>> real estate links | insurance guide | software links | health links | travel links mens clothing | bargain cruises | hotel reviews | used cars | wedding favors | extended stay hotels | condos buying tips | laptop guide | bargain holidays | best mortgage deals | dental insurance | auto insurance quotes | cheap life insurance | car insurance quotes | life insurance quotes | ireland golf vacation packages | golf vacations | ireland vacations | hawaii vacation packages | vacation packages | digital camera review | digital video camera | security camera | home security cameras | disposable cameras | digital printing | digital photo software | digital projectors | digital photo processing | surveillance cameras | electronic stores | home electronics | diet supplements | zone diet | eating disorders guide | fsbo | learn spanish | learn italian | business brokers | commercial real estate |

:: SiteWide Links :: Hotel Reviews :: discount hotel :: vacation packages : wedding favors :: mens clothing ::