Announcement Announcement Module
Collapse Forum Guidelines

Welcome to the Forums! The purpose of this forum is to allow you to discuss topics relating to hosting and topics of interest with other Customers. The primary focus should relate to issues not generally included in our Wiki or Control Panel, or information not provided by our Customer Support Team. Some examples include programming and coding support, web site design ideas and SEO practices.

The forum is not meant as a replacement to our Wiki or Customer Support. We highly recommend searching our Wiki before posting on the forum. Also, if you have a question for our Customer Support team, please contact them as you would normally.

We ask that if you have any complaints or questions relating specifically to your account, that you address them to our Customer Support department. Do not post personal account information such as passwords or other sensitive and private information the forum, as this type of information is best kept secret. Also, please be respectful of other users and refrain from defamatory comments or use of coarse language.

We will visit the forum from time to time, and contribute to various topics. We reserve the right to delete any posts which are deemed offensive or against the spirit of the forum. Any spamming or illegal activity will not be tolerated. We also reserve the right to block any user who violates these guidelines.

To get started, we welcome you to sign up at our User Management site. Any account created there will have access to these forums, our Wiki, our Ideas site and commenting permission on our Status Blog.
See more
See less
VOIP hackers Page Title Module
Move Remove Collapse
Conversation Detail Module
  • Filter
  • Time
  • Show
Clear All
new posts

  • VOIP hackers

    How can you tell if someone has hacked into your VOIP and can listen in on your conversations? Any good way to prevent this from happening?

  • #2
    There are a number of steps that companies can take to protect themselves against VoIP hackers:

    * Keep the VoIP network separate from the data network. Although this does negate some advantages of VoIP ó such as simplified administration through convergence ó it also provides a smaller attack surface and exposes the VoIP network to fewer threats. You can use virtual LAN (VLAN) technology to create a logical separation if you donít want to go with a full-fledged physical separation.
    * Use authentication to ensure that those connecting to the VoIP network from the outside are really who they purport to be.
    * Use encryption so that if hackers manage to capture VoIP packets, they wonít be able to easily decipher them.
    * Use VoIP-aware firewalls and an intrusion detection system/intrusion prevention system (IDS/IPS).
    Keep hackers from eavesdropping on VoIP calls | IT Security |