Search:
Type: Posts; User: w-mellon; Keyword(s):
Search:
Search took 0.04 seconds.
-
I'm not a programmer nor script writer (working to correct script part) but I would investigate a script that could capture and record (more append) the voip packets to a file which at the same time...
-
This is all a theoretical exercise...
One would assume part of this task is getting to/at the voip packets. Physical access to the wire - insert a hub, MAC flood the switch, etc. a man-in-the-middle...
-
March 3rd, 2006, 07:05 PM
One thing stood out in a previous message...
The test equipment the telco used was T-bird equipment. They run 0's 1's and a mix of it...if they set it to Terminate they got all kinds of errors,...
-
October 6th, 2005, 04:26 PM
If thats the way you think you can learn best then go ahead - personnally I agree and I'm trying to go down the same track (or as I say moving up the stack). May I recommend several tools to assist...
-
September 19th, 2005, 05:55 PM
It was only a matter of time as VoIP deployments continued to increase over the past two years in both the home and business marketplace.
-
September 12th, 2005, 03:33 PM
Recently received an email with a word in it underlined by a dotted red line....strange. Further investigation denotes this as a Microsoft 'smart tag'. Further reading (on Microsoft website) shows...
-
July 31st, 2005, 08:53 PM
If anyone has seen and reviewed his (Lynn's) information - what impact does/would this have on the Cisco security products such as the PIX? I can only guess that the underlying IOS is similar in some...
-
February 14th, 2005, 04:28 PM
Interesting!
First off - do you know for certain that this gent being transferred to IT is doing anything your company believes criminal? I don't think you have established that..
However for the...
-
January 13th, 2005, 06:46 PM
Try searching for these at www.pbxinfo.com (alittle old but good)
"Breaking through IP telephony" and "VoIP security tools are lacking"
Also lookup "http://www.ee.oulu.fi/research/ouspg/" they...
-
January 5th, 2005, 05:22 PM
Best book I have ever seen/read on IKE and IPSec was " IPSec - the new security standard for the internet, intranets and virtual private networks" ISBN - 0-13-011898-2. Helped me out several times in...
-
I'm new to wireless but ...(o'reilly book very good and I think they produce a wireless hacks book too)
My understanding of WEP cracking is that you need multiple captures of the associations and...
-
May I suggest you change the situation to a rogue wireless pc driving thru a major metroplitan area (having previously gained info on sites thru the route and already prepared to access thru them at...
-
I had read some time ago on the securityfocus website about certain hardware equipment vulnerabilities in the tcp/ip stack concerning port 0 (old code in use on equipment could reset by port 0...
-
DoS is a serious concern in VoIP networks. Its unlikely a vendors voip code will be virus infected (but you never know). As mentioned by Lansing you could separate your voip servers on a different...
-
April 30th, 2004, 09:37 PM
You will need to treat the voip gateway pc as any other pc asset in the network (maybe even tighter security). Schedule OS upgrades and patches, install anti-virus (run it, upgrade it) and you should...
-
March 29th, 2004, 05:06 PM
I haven't used the cisco vpn equipment but have used the nortel CES equipment in the past. If the cisco is as scalable as the nortel you shouldn't have expansion issues with either, its just a matter...
-
March 26th, 2004, 07:36 PM
You mentioned a past attempt at voip - if you don't mind i'm curious as to who's voip equipment was deployed that didn't work over the frame and when?
-
March 26th, 2004, 03:08 PM
I don't think mpls is qos aware on it's own - provider will still need to traffic engineer this with you. mpls has several standards -rfc's - already at the ieft.
-
September 22nd, 2003, 07:46 PM
loaded any new software or freeware lately?
had a problem once with nic software being messed up by recent freeware install (port / socket conflict).
Removed freeware, removed nic and drivers and...
-
August 12th, 2003, 04:22 PM
Recently downloaded Nmapwin and ran scan tests on my local communications equipment. I have found open ports that really shouldn't be there. Next step is to test vulnerability (can they be connected...
|
|