Wednesday, April 25, 2007

How to: Encrypt Your VoIP

VoIP traffic flows across the Internet in unencrypted packets, which means anyone that has access to the network between sender and recipient can intercept them. Here are 5 methodologies to secure yourself against these attacks: Zfone, Built-in Encryption, Transport Layer Security and IP Security, Secure Real-Time Transfer Protocol and VPN.-=-=-=-=-=-=-=-welcome to my's not that bad

read more | digg story

No comments: