April 25, 2007

How to: Encrypt Your VoIP

VoIP traffic flows across the Internet in unencrypted packets, which means anyone that has access to the network between sender and recipient can intercept them. Here are 5 methodologies to secure yourself against these attacks: Zfone, Built-in Encryption, Transport Layer Security and IP Security, Secure Real-Time Transfer Protocol and VPN.

read more | digg story

Add to any service

No comments: