TMCnet News
Podcast - SIP/VoIP AttacksBy Tom Cross Technology Columnist Most importantly, understand your opponent has more time, is more focused and is more eager to attack you. While SIP brings advancement in VoIP call connections, SIP faces the same security attacks as other IP protocols like HTTP and SMTP such as:
…and other known and yet to be created attacks.
The animated tutorial helps explain how the process works. More in-depth discussion and analysis can be found in the course. Hacker comes from the term hack, which is slang that software programmers use to describe writing computer programs. Cracker comes from safe/vault crackers to break/crack into a vault safe. White Hat Hacker is a good or trusted programmer and Black Hat is a bad or untrusted disgruntled person whose desire is to cause injury or disrupt computer systems. Grey Hat is a programmer of uncertain intent.
This free presentation is produced and presented by TECHtionary.com and is available in Adobe Flash (.swf), Quicktime (.mov), audio-only (.mp3) and iPod/iPhone (News - Alert) (.mv4) formats for download at: http://www.bizcastingonline.com/educate/media/podcasts/security for the next week when it will be removed unless you are part of the TECHtionary dealer program where there is no expiration. Podcast tutorials, animations and online courses are free to channel partners — see terms and conditions at http://www.techtionary.com/techu/.
This is also included in TMC (News - Alert) University special course on Microsoft OCS at ITEXPO.com. For more go here: http://www.tmcnet.com/voip/conference/west-08/tmc-university-microsoft-ocs.htm
|