What?s Your IQ on Basic PC Phone (VoIP) Knowledge

Short T/F quiz

1. T / F You can save a significant amount of money using VoIP rather than traditional telephone/cell phone calling methods.

2. T / F The minimum requirement for VoIP is a broadband (high speed) connection.

3. T / F VoIP security is not an issue to be concerned about because most computers are protected with firewalls.

4. T / F Over 75% of the world will be using VoIP for communication within the next 3-4 years.

5. T / F You can make all your phone calls anywhere in the world from your computer.

6. T / F Peer-to-peer (P2P) networks are perfectly safe to use, especially if your computer is protected with firewalls.

Answers

1. The answer is True. In fact, it is the tremendous savings of up to 80% off traditional phone calling that makes VoIP attractive to consumers and businesses. The only equipment needed for VoIP is your PC and a microphone (if one is not built into your PC). Beware of VoIP service providers that require you to purchase additional equipment and/or sign contracts.

2. The answer is False. Although the public has been fed a steady diet that the minimum requirement for VoIP is a high speed (broadband) connection, this is absolutely false.

Over 90% of the VoIP providers have used this false premise as a smokescreen to take your focus off the fact that their priority was and is to line their own pockets rather than expend the time, effort, and funds to develop technology that incorporates dial up capability.

The technology required for dial up connections to use VoIP involves the ability to compress data packets down to a minimum size of 8 kbps prior to traveling over the Internet.

3. The answer is False. Security should be the most important feature of any VoIP solution provider. Firewalls do not incorporate protection for VoIP. VoIP security should incorporate protection against identity theft, Trojan horses, viruses, and worms.

Craig Pollard of Siemens advised that "Voice must be protected like any other application". He further stated that, "Along with IT directors and telecom managers, a number of financial directors came to our road shows, which may not be surprising considering the damaging potential of VoIP threats if a network is not properly protected."

Over 90% of VoIP solution providers do not operate on secure lines. These providers, in order to save a few dollars at your expense, operate on industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable. Hacker friendly providers offer hacker manuals, software, programs, and even processor chips that makes accessibility to your computer from these industry standards ? as enticing as chum is to sharks in a feeding frenzy.

When a computer hacker gains unauthorized access to your computer, their sole purpose is to steal your identity and sell your personal and confidential information to other criminal entities. In addition, they often plant Trojan horses, viruses, and worms into your computer.

4. The answer is True. Industry insiders such AT&T says, "VoIP traffic is projected to account for approximately 75% of the world's voice traffic by 2007". This suggests a major paradigm shift in communication.

5. The answer is True. Not only can you make all your phone calls anywhere in the world from your computer, you can also travel with your computer phone. Simply by bringing your unique number and password, you can download your phone with your entire contact list. Of course, PC to PC is usually free between subscribers. PC to telephones and cell phones typically involves fees at drastically reduced rates when compared to traditional calling rates.

6. The answer is False. P2P networks use industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable.

John Ashcroft, Attorney General, in remarks at the High Technology Crime Investigation Association 2004 International Training Conference held on September 13, 2004 stated, "We have seen worms and viruses attack?disrupting basic services?And with the increased use of the Internet and especially peer-to-peer networking, we have seen malicious code spread more quickly and infect more personal computers than ever before. The cost of these worms, viruses, and denial-of-service attacks?reaches into the billions of dollars."

P2P networks such as Skype operate by taking bandwidth (information carrying capacity) from customers on their service to assist other customers using their service - analogous to a symbiotic relationship. The tools that enable them to accomplish this are bundled in the software their customers agree to in order to download and access their VoIP service.

Another grave concern for both individuals and businesses when using P2P systems is unknowingly having your computer used as a supernode. A supernode occurs when your computer is arbitrarily assigned as a hub.

When you are running the software for P2P services, your computer's disk space, bandwidth, and processing power are used to help other users on the same system operate their software more efficiently because of their own network or firewall constraints.

We as consumers still have a lot to learn about VoIP, as this technology is the new era of communication and is continuously being changed.

All VoIP service providers need to incorporate the protection, needs, and desires of its customers, as well as address security and dial up capability.

All VoIP service providers should invest in developing a proprietary patented technology that incorporates compression of data packets so that their VoIP can be used on dial up connections, as well as cable, satellite, and wireless.

All VoIP service providers should develop and create their own proprietary high end encryption codec with patented technology, simply because they do not want their customers to be victims of viruses, worms, Trojan horses, or have their identity stolen as a result of using their VoIP service.

Simply put, all VoIP service providers should place the protection, security, and needs of their customers FIRST. Of course, they are in business to earn profits, but it should not be at the expense of exposing their customers to unscrupulous entities.

Want to hear and experience what exceptional sound quality on optimally secure lines sounds like? Download a 7 day free trial at http://www.free-pc-phone.com and see for yourself.

**Attn Ezine editors / Site owners **
Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include the resource box as listed above.

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com

Elk Grove (east OF 53) limousine shuttle .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A humanoid robot named CUE6 has got game. The basketball-playing robot, produced by Toyota, claimed a Guinness World Record for longest shot.
With electronic signatures becoming more common, Kurt the CyberGuy explains how to produce your digital John Hancock for online documents.
Kurt the CyberGuy walks through steps he recommends immediately taking after getting new electronics — like phones or TVs — as gifts this holiday season.
When speaking becomes physically challenging, you can preserve your unique voice using Apple's Personal Voice and Live Speech technology.
Google Maps is deleting location history soon. Tech expert Kurt “CyberGuy" Knutsson shows you how to back it up before it's gone.
iOS 18.2 lets AirTag owners securely share item locations with trusted individuals. Tech expert Kurt “CyberGuy" Knutsson examines the powerful new feature.
The FBI is warning timeshare owners of a telemarketing scam tied to a Mexican drug cartel. Tech expert Kurt “CyberGuy" Knutsson provides steps to stay safe.
Protecting your home network includes securing your router, just like your phone or laptop. Kurt “CyberGuy" Knutsson reveals six ways to protect your Wi-Fi router from hackers.
Kurt “CyberGuy" Knutsson: ConnectOnCall breach leaks sensitive data of 910,000+ patients.
Rising elder scams: How to recognize them and protect yourself and your loved ones. Tech expert Kurt “CyberGuy" Knutsson helps you outsmart the scammers.
There are common habits and oversights that could leave your financial information vulnerable to cybercriminals, according to Kurt the CyberGuy.
Counting calories just got easier with The Drop, the world's first automated nutrition tracker using advanced computer vision and artificial intelligence.
A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.

Voice over IP (VoIP) Features

Because with VOIP you can make calls from anywhere you... Read More

Try VoIP for Free - No Commitment, No Hardware

Try VoIP Before BuyingSo you like the concept of 'cutting'... Read More

Is VoIP the ?Next Big Thing? in Telecommunications?

VoIP or Voice Over Internet Protocol has been simmering for... Read More

How VoIP Works -- Busting Out of Long Distance Rates

VoIP is the newest advancement in audio communications technology, and... Read More

The Future of Communications - Voice Over Internet

When was the last time that you were able to... Read More

How VoIP Will Affect Every Household and Business in the World

Seattle venture capitalist, Greg Gottesman, calls it "?one of the... Read More

How Much Bandwidth is Required for VoIP Phones?

A long-standing question for potential VoIP (Voice over Internet Protocol)... Read More

Why VoIP is not Going to Fail

VoIP is an almost constant topic in our daily dose... Read More

Needless HIGH RISK Exposure For Business Using Computer Phones

The Facts? Computer phones (VoIP) offer the most optimal means... Read More

Is VoIP Good For The Home?

There is no doubt that you have heard about VoIP... Read More

A Look at Internet Voice Technology (VoIP) for Residential

Today's TechnologyOver the years, the technology has made remarkable progress.... Read More

Benefits of VoIP

You may not have considered it but there are many... Read More

Voice Over IP ? Saving Money

I was on a tech support call with a client... Read More

Should You ,VoIP?

My friend in Florida, Samuel, called me last week and... Read More

6 Important Things You Should Consider When You Are Selecting A VoIP Provider

The following are 6 very important factors to consider when... Read More

Take Your Home or Business Phone With You When You Travel

Voice Over Internet Protocol (VoIP) telephone service uses a broadband... Read More

Making PC to Phone VoIP Calls over Dial-Up Internet Connections

There's a lot of hype these days surrounding Internet-based voice... Read More

Does Voice Over IP Telephony Spell the End for Traditional Telephones?

Just What is Voice Over IP Telephony?Voice over Internet Telephony... Read More

Use your Computer to make Cheap Long-Distance Telephone Calls

What is 'VoIP'?Simply put, VoIP refers to the carriage of... Read More

Consumer Review on CallWave Call Alert Service

Missing phone calls while you are online?Are you thinking of... Read More

Do You Text Chat (IM) Online?

IM (Instant Messaging) - man, we thought we had it... Read More

Alarm Systems & VoIP (Voice over Internet Protocol) Phone Lines

An astounding and unexpected number of people are dropping their... Read More

VoIP and 911 Warning

Be leery of your VoIP phone system in case of... Read More

The Calling Card Alternative

For a few years now, the calling cards business is... Read More

How Voip Can Mask The Size Of Your Business And Save You A Bundle

Have you heard the buzz about VOIP (Voice Over Internt... Read More

Dekalb transportation to O'Hare ..