You are here: hacking technology > network management > Content
Hot Articles
Recommend Articles
New Articles
VoIP security crack analysis and protection method
  Add date: 12/26/2008   Publishing date: 12/26/2008   Hits: 64
Total 4 pages, Current page:1, Jump to page:
 
Along with the data net width's unceasing expansion, already became 100,000,000,000,000 even milliardfolds to the tabletop possibly. The band width promotion also for transmitted the voice in the data net to provide the powerful prerequisite. At the same time, the VoIP technology day by day is also mature, the similar voice compression, the Qos quality safeguard and so on topic and achieves by everybody widespread discussion the mutual recognition. Might say the VoIP technology already from the original experiment nature true specially to for the mature commercial use.
  Although VoIP makes the circuit switching in the Chinese earliest application in the operator the supplement, but already had many enterprise users already to start now to pay attention to VoIP this application. Regarding the emerging small work enterprise, uses the newly built data net the abundant band width to come the load bearing pronunciation, must compared to reconstruct a set of independent voice system to facilitate many, in the function has also had the function which such as traditional voice switchboards and so on motion work do not have. Regarding profession user, because has connects each branch node the data net, carries on the headquarters and the branch node interconnection using the IP relaying may omit rents the soaring expense which the toll circuit relays. Therefore, the VoIP technology will have the broad application in the enterprise user community.
  But, in the implementation project or in the use process, how the user and the supply of equipment factory more will place the energy to improve the voice quality and with above the existing data net fusion, very little considered VoIP will exist safe hidden danger. Will be similar to we the important application server will put in within firewall's protection to be the same; Actually, in the VoIP situation, the voice is also and the data application is the same, also has become one each one “Packet”, will similarly also withstand each kind of viral and the hacker attack puzzle. No wonder some people teased: “this is throughout history first time, the computer virus can enable your telephone the normal work.”
  Actually to have how many kind of factors to affect VoIP? First is product's question. At present the VoIP technology most commonly used voice establishment and the control signaling are H.323 and the SIP agreement. Although between them has certain differences, but is a set of open agreement system as a whole. The equipment factory will have the independence module to come the load bearing including the IP terminal debarkation registration, Guan Shou and the signaling connection. These product some use Windows NT operating system, also some are based on Linux or VxWorks. More is the open operating system, is also easier to receive viral and the malicious attack influence. Especially certain equipment need to provide based on Web management contact surface time, will have the opportunity to use Microsoft IIS or Apache provides the service, but these applications will be in product leaving the plant time already installed in the middle of the equipment, will be unable to guarantee that was the newest edition perhaps the pledge had already made up certain security crack.

 
Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:VoIP security crack analysis and protection method Next:Fights the WEB server security fortification fight

Comment:

Category: Home > network management