How To Counter SpIT
|
|
|
- Kelly Reed
- 5 years ago
- Views:
Transcription
1 Countering SPAM over Internet Telephony (SPIT) Markus Hansen Independent Centre for Privacy Protection Schleswig-Holstein International Symposium Privacy and Security in Internet Telephony / VoIP Berlin IFA
2 Countering SPIT: Motivation Internet Telephony has developed, allows costsaving use of VoIP technology. VoIP will affect audio communication as affected written communication. Unsolicited calls are already annoying PSTN customers. => SPAM over Internet Telephony (SPIT) will become a problem similar to SPAM.
3 Countering SPIT: Motivation SPIT is expected to increase dramatically with cheaper calls. => Privacy protection needed. Laws prohibiting such calls are most often effectless against calls from other countries. => Technical approach needed. Telecommunication is regulated by several laws. Sanctions are up to five years in prison. => Legal compliance needed.
4 Legal Aspects of Filtering SPAM & SPIT Secrecy of Telecommunication (European level): Art. 8 ECHR: Respect for private life and correspondence Secrecy of Telecommunication and SPAM: c.f. Art 29 Data Protection Working Party Opinion 2/2006 on privacy issues related to the provision of screening services (WP118).
5 Art. 29 Group: WP 118 European regulations concerning SPAM filtering derive from the interpretation of Dir. 95/46/EC and Dir. 2002/58/EC in compliance with the ECHR and the corresponding case law of the Court of Human Rights. Other Directives (as e.g., e-privacy) can be relevant as well. Equivalent application to telephone calls as far as no differences derive from the syncronism of the medium.
6 Art. 29 Group: WP 118 Art. 4, 5 Dir. 2002/58/EC: Confidentiality of electronic communication has to be secured (e.g., by technical-organisational means). Personal data processing in the course of filtering viruses can be justified for the purpose of safeguarding the security of applications and services. Personal data processing in the course of filtering spam can be justified for the purpose of safeguarding the security of applications and services under certain requirements.
7 Art. 29 Group: WP 118 Personal data processing in the course of detecting any predetermined content CANNOT be justified for the purpose of safeguarding the security of applications and services. In all cases transparency and adequate user information has to be secured.
8 SPIT-AL: Legal Aspects Secrecy of Telecommunication, e.g. in Germany: Art. 10 GG, 88 TKG, 206 StGB Protecting content of communication and fact that it has taken place (or been unsuccessful). Binding any person involved in providing telecommunication services Control over any SPIT filter therefore has to be in hands of user as one of the communication partners.
9 SPIT-AL: Legal Aspects Telecommunication law (TKG) 88 Secrecy of Telecommunication 148 f. Suppression of Communication (Reject call, Greylisting) VoIP has not yet gone through courts.
10 SPIT-AL: Legal Aspects Privacy Law (aka: Data Protection Law) TKG Different SPIT-AL actions and configuration presets for private citizens, companies oder administrations. (Administrative Law: Right to be heard) Whitelists / Blacklists is processing of personal data => Infrastructure für consent / withdrawel => web interface => Teleservices Law
11 SPIT-AL: Legal Aspects Consequences for Development: Completely user-controlled filtering! Transparency and control of data processing and its consequences. Configuration presets for different types of users. Configuration options fine-grained.
12 The SPIT-AL Project SPIT-AbwehrLösung Public Funding : e-region Plus (Schleswig-Holstein) ERDF European Regional Development Fund Project Partners: TNG The Net Generation AG Internet Service Provider and Telecommunication Company ICPP Independent Centre for Privacy Protection Privacy Protection Authority of Schleswig-Holstein
13 The SPIT-AL Project White Paper download at Prototype Implementation in progress <= Test Run with 1000 users by end of 2006 Open Source Project Public funding, public benefit! Diploma Thesis at Dresden University of Technology
14 SPITting into your Ear Calls from Humans: Call Centres Calls from Automated Devices: Spam Bots Ringtone SPIT: Alert-Info Header Combinations
15 SPIT-AL: Technical Approach SPAM: Header & Content Analysis Content Analysis of Audio Communication: Synchronous Communication, impossible to do before call is established. Technically complex, binding resources. (C.f.: Microsoft V-Priorities. Patents?) Unneccessary once caller and callee talk. Not planned within SPIT-AL.
16 SPIT-AL: Technical Approach Analyze Information about Caller: Caller ID? (Lacking Authenticity with SIP) Origin: PSTN / SIP (Proxy, IP Range)? On Whitelists / Buddylists / Blacklists? Recursive Lists / Web of Trust Statistiscal Analysis (backbone) Analyze Information about Call: E.g.: 6 a.m.? Sorry, Mum. Weighten results, sum up.
17 SPIT-AL: Technical Approach Different Actions according to results: Establish call. (implementation: easy) Busy on first try. (greylisting) Challenge the caller: Please press *42#. (simple voice menu) What is 10 devided by 2? (tricky :-)) Voice Box => asynchronous Announce alternate reachability
18 SPIT-AL: Technical Approach Different Actions according to results: Simulate Callee (c.f. Telecrapper2000) binding your resources! Honeyphones (as in Honeypots, Honeynets) collect and analyse information on SPIT Reject call Implementation: Easy Legal: Suppression of Communication All not in SPIT-AL 'Filtering' not appropriate. Therefore: Reachability Management to counter SPIT
19 INCOMING CALL INCOMING CALL 1 VOICE DATA
20 Conclusions The SPIT problem will increase, countermeasures are needed. Countermeasures have to take effect before caller and callee talk to each other. Reachability management is a possible approach. Can be expanded/integrated into identity management system.
21 Future VoIP needs Security and Privacy Enhancements! E.g. strong end-to-end encryption E.g. end-to-end authentication VoIP could use a lot of other development, too. Thanks for listening! :-) Project: Contact: [email protected]
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60
SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein
Privacy and Data Protection (and more) for Big Data
Privacy and Data Protection (and more) for Big Data Marit Hansen Deputy Privacy and Information Commissioner Schleswig-Holstein, Germany [email protected] Madrid, 25 February 2015 Setting
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
R&S IP-GATE IP gateway for R&S MKS9680 encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE
8x8 Virtual Office Mobile User Guide for ios
8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 3.0, August 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4
Fact Sheet. N-fon Case Study
Fact Sheet. N-fon Case Study nfon AG, a service provider based in Munich, Germany is successfully providing hosted PBX services for the corporate market. These services offer an attractive option for organisations
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
The user interface of SIPPS is fully skinnable
- THE ULTIMATE SOFTWARE TELEPHONE - SIPPS : Voice over IP for everybody SIPPS is a professional Voice over IP client software SIPPS is fully SIP-compliant Fully customizable softphone The user interface
optipoint 410/420 S General configuration instructions for VoIP suppliers
optipoint 410/420 S General configuration instructions for VoIP suppliers bktoc.fm Inhalt Inhalt 0 1 Introduction........................................................... 3 1.1 Prerequisites for the
VoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
ABC SBC: Software Defined Communication Networks. FRAFOS GmbH
ABC SBC: Software Defined Communication Networks FRAFOS GmbH Introduction SIP was designed with the vision of revolutionizing the way communication services are developed, deployed and operated. Following
ARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party 00451/06/EN WP 118 Working Party 29 Opinion 2/2006 on privacy issues related to the provision of email screening services Adopted on 21 February 2006 This Working
Release Notes for MyPBX SOHO 70.20.0.X
Release Notes for MyPBX SOHO 70.20.0.X ===Firmware Version: V70.20.0.20==== Applicable Model: MyPBX SOHO Release Date: January 6th, 2015 http://www.yeastar.com 1/12 1. Announcement We are pleased to announce
IP-PBX Buyers Guide 2006
IP-PBX Buyers Guide 2006 Produced by: Contents PBX Basics What s Different about IP-PBX Basic Features of IP-PBX Advanced Features Other Issues Conclusion IP-PBX Guide 2 PBX Basics A PBX is essentially
VoIP Fraud and Misuse
DFN Tagung 15.10.2013 VoIP Fraud and Misuse Detection and Mitigation Prof. Dr.-Ing. Erwin P. Rathgeb Dirk Hoffstadt, M.Sc. Networking Technology Group Institute for Experimental Mathematics & Institute
Quick Reference Guide for Avaya Distributed Office voice mail
IP Telephony Contact Centers Mobility Services Quick Reference Guide for Avaya Distributed Office voice mail 03-602108 Issue 1 May 2007 This guide explains how to use Avaya Distributed Office voice mail.
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback.
SIP Messages 100 Trying This response indicates that the request has been received by the next-hop server and that some unspecified action is being taken on behalf of this call (for example, a database
NCAS National Caller ID Authentication System
NCAS National Caller ID Authentication System The National Telecom Security Border Controller OmniBud INC. 2003 2013 Dedicate to Internet Communication and Access Security NCAS Registration Module PSTN
VoIPOffice. VoIPOffice Hosted Edition provides advanced features such as Unified Messaging, Automatic Call Distribution,
Telappliant Hosted Edition is the next generation call management solution providing ultimate flexibility and features, all via a high speed Internet connection. Hosted Edition provides all of the benefits
Avaya IP Office 8.1 Configuration Guide
Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.
SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
6 Steps to SIP trunking security. How securing your network secures your phone lines.
6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate
Direct IP Calls. Quick IP Call Mode
Unicorn3112 Tips Direct IP Calls...1 Quick IP Call Mode...1 PSTN Pass Through...2 VoIP-to-PSTN Calls...2 PSTN-to-VoIP Calls...3 Route Calls to PSTN...4 Forward Calls to PSTN...4 Forward Calls to VoIP...4
MICROSOFT FULL ACCESS MAILBOX (50GB) MICROSOFT OUTLOOK CLIENT ROARING PENGUIN SPAM FILTER ROARING PENGUIN 3-YEAR ARCHIVING UNIQUE FEATURES
SOLUTION BUNDLE OVERVIEW 2016 EMAIL BUNDLES EMAIL 1 MICROSOFT FULL ACCESS MAILBOX (50GB) MICROSOFT OUTLOOK CLIENT EMAIL 2 $8/SEAT $3 50 /SEAT Automatic Updates on Spam Software *Applicable across all bundles:
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate
Mark and Sweep Robocall Detection and Prevention. By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz
Mark and Sweep Robocall Detection and Prevention By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz Background of the Robocall Problem Current Solution Attempts Solution Deployability Incentives
VoIP SPAM and a Defence against this Type of Threat
VoIP SPAM and a Defence against this Type of Threat MIROSLAV VOZNAK FILIP REZAC Department of Telecommunications CESNET, z.s.p.o. Zikova 4, 160 00 Prague 6 CZECH REPUBLIC [email protected], [email protected]
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR
How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR This document explains how to build a simple virtual office PBX system using TekSIP and TekIVR. In this example following components
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
Vonage Business Solutions for Android User Guide
Vonage Business Solutions for Android User Guide 1 Vonage Business Solutions, Inc. 1375 Peachtree Street, NE Suite 200 Atlanta, GA 30309 Sales 1-877-862-2562 Support 1-866-901-0242 www.vonagebusiness.com
Extension Manual. 3CX Assistant, MyPhone User portal, Dial codes & Voice mail for 3CX Phone System Version 8.0
Extension Manual 3CX Assistant, MyPhone User portal, Dial codes & Voice mail for 3CX Phone System Version 8.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
D3 TECHNOLOGIES SPAM FILTER
D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,
Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
Using Advanced Phone Features
Using Advanced Phone Features This chapter describes how to configure advanced features on your IP Phone. It contains the following sections: Configuring Privacy and Security, page 9 Enabling and Using
Extension Manual. User portal, Dial codes & Voice mail for 3CX Phone System Version 7.0
Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 7.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without
VoIP Resilience and Security Jim Credland
VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture Panos STAMATIOU 1 and Dimitris GRITZALIS 1,2 1 Hellenic Open University (HOU), Dept. of Informatics, Patras, Greece 2 Athens
SERVICE DESCRIPTION Web Proxy
SERVICE DESCRIPTION Web Proxy Date: 14.12.2015 Document: Service description: Web Proxy TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 Web Filter
THINKTEL COMMUNICATIONS 3CX PHONE SYSTEM V.11. 3CX Phone System THINKTEL SIP TRUNK from scratch
THINKTEL COMMUNICATIONS 3CX PHONE SYSTEM V.11 3CX Phone System THINKTEL SIP TRUNK from scratch TA B L E O F C O N T E N T S 1.1 INTRODUCTION... 3 2.1 REQUIREMENTS... 4 2.2 3CX PHONE SYSTEME INSTALLATION...
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
8x8 Virtual Office Mobile User Guide for ios
8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 4.0, October 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4
Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis
Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat
R&S IP-GATE IP gateway for ISDN encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
Spam goes VoIP. Number Harvesting for Fun and Profit. Hack in The Box 2007 Dubai Hendrik Scholz [email protected]
Spam goes VoIP Number Harvesting for Fun and Profit Hack in The Box 2007 Dubai Hendrik Scholz [email protected] 1 Agenda VoIP Threads Difference between Spam and SPIT Use Cases for VoIP numbers Number Harvesting
CONFIGURING TALKSWITCH FOR RUBICON SERVICE
TALKSWITCH TECH NOTE CONFIGURING TALKSWITCH FOR RUBICON SERVICE CONFIGURING TALKSWITCH FOR RUBICON SERVICE CT.TS005.004502 Before proceeding, we recommend that you follow the steps outlined in the Start
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
Visocall IP PBX Connection
Visocall IP PBX Connection Specification Authors: V 2.1 Buchmüller Seite 1 von 8 Table of Contents DOCUMENT STATUS... 3 1 INTRODUCTION... 4 2 FUNCTIONALITY... 4 2.1 PAT TELEPHONE FUNCTION... 4 2.2 EVENT
Dramatically simplifying voice and data networking. IVR Editor HOW-TO Guide
Dramatically simplifying voice and data networking IVR Editor HOW-TO Guide 2 edgebox How-To Guide IVR Editor HOW-TO Guide Table of Contents Introduction... 3 IVR...3 The edgebox IVR Editor...3 Understanding
Call-Blocking Technology
Call-Blocking Technology MODERATOR: Bikram Bandy, FTC PANELISTS: Andrew Whitt, Verizon Communications Jeff Stalnaker, PrivacyStar Matt Stein, Primus Telecommunications Canada Inc. Andrew Whitt Director
Eliac Call Recording - Configurator Guide. Eliac. Call Recording System Ver. 2.x. www.smartsoft-eg.com
Eliac Call Recording System Ver. 2.x 1 System Overview Eliac Call Recording is a complete system that records both incoming and outgoing calls for any analog telephone lines, and can record either internal
Swisscom Service description for Microsoft Office 365
1 Scope Swisscom (Switzerland) AG makes available Microsoft Online Services and Microsoft Office applications for your (Company) use as a customer. They can be used on PC s running a current Windows or
Connecting with Vonage
Connecting with Vonage Vonage (http://www.vonage.com/) offers telephone service using the VoIP (Voice over Internet Protocol) standard SIP (Session Initiation Protocol). The service allow users making
Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005
Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher [email protected] [email protected] 2005
Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 6.0
Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 6.0 Copyright 2006-2008, 3CX ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change
EZLoop IP-PBX Enterprise SIP Server
EZLoop IP-PBX Enterprise SIP Server Copyright 2007 Teletronics International, Inc. 2 Choke Cherry Road, Rockville, MD 20850 [email protected] www.teletronics.com CH1. Overview...4 1.1 Specifications...4
Configuring Quadro IP PBXs with "SIP Connect"
Configuring Quadro IP PBXs with "SIP Connect" Revision: 1.0 Abstract: This document describes how to configure the Quadro IP PBXs to use the IP-PSTN service from SIP Connect PAGE 1 Document Revision History
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
How To Protect Your Privacy On The Net
International Working Group on Data Protection in Telecommunications Report and Guidance on Data Protection and Privacy on the Internet "Budapest - Berlin Memorandum" adopted at the 20th Meeting in Berlin,
Auto Attendants. Call Management
Auto Attendants Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level Auto Attendants Web based user interface
Connecting with Free IP Call
Connecting with Free IP Call Free IP Call (http://www.freeipcall.com/) offers telephone service using the VoIP standard SIP. The service allow users making/receiving VoIP calls to/from VoIP telephone numbers
