What?s Your IQ on Basic PC Phone (VoIP) Knowledge

Short T/F quiz

1. T / F You can save a significant amount of money using VoIP rather than traditional telephone/cell phone calling methods.

2. T / F The minimum requirement for VoIP is a broadband (high speed) connection.

3. T / F VoIP security is not an issue to be concerned about because most computers are protected with firewalls.

4. T / F Over 75% of the world will be using VoIP for communication within the next 3-4 years.

5. T / F You can make all your phone calls anywhere in the world from your computer.

6. T / F Peer-to-peer (P2P) networks are perfectly safe to use, especially if your computer is protected with firewalls.

Answers

1. The answer is True. In fact, it is the tremendous savings of up to 80% off traditional phone calling that makes VoIP attractive to consumers and businesses. The only equipment needed for VoIP is your PC and a microphone (if one is not built into your PC). Beware of VoIP service providers that require you to purchase additional equipment and/or sign contracts.

2. The answer is False. Although the public has been fed a steady diet that the minimum requirement for VoIP is a high speed (broadband) connection, this is absolutely false.

Over 90% of the VoIP providers have used this false premise as a smokescreen to take your focus off the fact that their priority was and is to line their own pockets rather than expend the time, effort, and funds to develop technology that incorporates dial up capability.

The technology required for dial up connections to use VoIP involves the ability to compress data packets down to a minimum size of 8 kbps prior to traveling over the Internet.

3. The answer is False. Security should be the most important feature of any VoIP solution provider. Firewalls do not incorporate protection for VoIP. VoIP security should incorporate protection against identity theft, Trojan horses, viruses, and worms.

Craig Pollard of Siemens advised that "Voice must be protected like any other application". He further stated that, "Along with IT directors and telecom managers, a number of financial directors came to our road shows, which may not be surprising considering the damaging potential of VoIP threats if a network is not properly protected."

Over 90% of VoIP solution providers do not operate on secure lines. These providers, in order to save a few dollars at your expense, operate on industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable. Hacker friendly providers offer hacker manuals, software, programs, and even processor chips that makes accessibility to your computer from these industry standards ? as enticing as chum is to sharks in a feeding frenzy.

When a computer hacker gains unauthorized access to your computer, their sole purpose is to steal your identity and sell your personal and confidential information to other criminal entities. In addition, they often plant Trojan horses, viruses, and worms into your computer.

4. The answer is True. Industry insiders such AT&T says, "VoIP traffic is projected to account for approximately 75% of the world's voice traffic by 2007". This suggests a major paradigm shift in communication.

5. The answer is True. Not only can you make all your phone calls anywhere in the world from your computer, you can also travel with your computer phone. Simply by bringing your unique number and password, you can download your phone with your entire contact list. Of course, PC to PC is usually free between subscribers. PC to telephones and cell phones typically involves fees at drastically reduced rates when compared to traditional calling rates.

6. The answer is False. P2P networks use industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable.

John Ashcroft, Attorney General, in remarks at the High Technology Crime Investigation Association 2004 International Training Conference held on September 13, 2004 stated, "We have seen worms and viruses attack?disrupting basic services?And with the increased use of the Internet and especially peer-to-peer networking, we have seen malicious code spread more quickly and infect more personal computers than ever before. The cost of these worms, viruses, and denial-of-service attacks?reaches into the billions of dollars."

P2P networks such as Skype operate by taking bandwidth (information carrying capacity) from customers on their service to assist other customers using their service - analogous to a symbiotic relationship. The tools that enable them to accomplish this are bundled in the software their customers agree to in order to download and access their VoIP service.

Another grave concern for both individuals and businesses when using P2P systems is unknowingly having your computer used as a supernode. A supernode occurs when your computer is arbitrarily assigned as a hub.

When you are running the software for P2P services, your computer's disk space, bandwidth, and processing power are used to help other users on the same system operate their software more efficiently because of their own network or firewall constraints.

We as consumers still have a lot to learn about VoIP, as this technology is the new era of communication and is continuously being changed.

All VoIP service providers need to incorporate the protection, needs, and desires of its customers, as well as address security and dial up capability.

All VoIP service providers should invest in developing a proprietary patented technology that incorporates compression of data packets so that their VoIP can be used on dial up connections, as well as cable, satellite, and wireless.

All VoIP service providers should develop and create their own proprietary high end encryption codec with patented technology, simply because they do not want their customers to be victims of viruses, worms, Trojan horses, or have their identity stolen as a result of using their VoIP service.

Simply put, all VoIP service providers should place the protection, security, and needs of their customers FIRST. Of course, they are in business to earn profits, but it should not be at the expense of exposing their customers to unscrupulous entities.

Want to hear and experience what exceptional sound quality on optimally secure lines sounds like? Download a 7 day free trial at http://www.free-pc-phone.com and see for yourself.

**Attn Ezine editors / Site owners **
Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include the resource box as listed above.

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com

kitchen deep cleaning Deerfield ..
In The News:

Unlike robotaxi competitors, Tensor focuses on consumer-owned self-driving cars that adapt to highways and urban roads with full redundancy systems for safety.
Medicare scams cost $54 billion in 2024 as fraudsters target beneficiaries with fake calls demanding payments and personal information to steal benefits.
Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.

Get a ?Virtual Phone Number? - Eliminate Long Distance Charges with VoIP Phone Service

There's a revolution brewing in the telephone industry. But it's... Read More

Broadband Phone Technology - Top 5 Reasons You Should Take Notice

For the uninitiated, the term broadband phone is loosely used... Read More

VoIP in the Home

VoIP is set to revolutionise home communications. With VoIP you... Read More

VoIP - A Laymans Look - Should You Or Shouldnt You?

"As business people we manufacture shin pads, or we distribute... Read More

The Dangers of Peer-to-Peer Systems

Peer-to-Peer (P2P) systems do not operate on secure lines, thus... Read More

How to Never Pay a Hotel Phone Bill Again

The protocol is increasingly being adopted as the standard means... Read More

Consumer Review on CallWave Call Alert Service

Missing phone calls while you are online?Are you thinking of... Read More

Voip - Voice Over IP and Business: Is It For You?

VoIP allows users to make phone calls using their high-speed... Read More

Take Your Home or Business Phone With You When You Travel

Voice Over Internet Protocol (VoIP) telephone service uses a broadband... Read More

Things You Should Consider When Selecting a VoIP Provider

The following are very important factors to consider when you... Read More

Introduction to VoIP

What is VoIP?First things first, VoIP stands for Voice over... Read More

Making PC to Phone VoIP Calls over Dial-Up Internet Connections

There's a lot of hype these days surrounding Internet-based voice... Read More

World On IP Community versus Telecoms Monopoly

World on IP community versus the TELECOMS' monopoly or a... Read More

How VoIP Will Affect Every Household and Business in the World

Seattle venture capitalist, Greg Gottesman, calls it "?one of the... Read More

VOIP Questions and Answers

Voice over Internet Protocol, or VoIP, has grown in popularity... Read More

Faxing over VoIP

As far as VoIP has come in Voice telephone calls,... Read More

VoIP is Less Taxing than Traditional Telephone Service

When it comes to VoIP Broadband Telephone service, there are... Read More

What can a VoIP Phone System Do for a Small Business?

Voice over Internet Protocol, or VoIP, is a term used... Read More

Lower Videophone Prices Allow Individuals Accessibility

VoIP service providers are now offering videophone at the lowest... Read More

Why VoIP is not Going to Fail

VoIP is an almost constant topic in our daily dose... Read More

Try VoIP for Free - No Commitment, No Hardware

Try VoIP Before BuyingSo you like the concept of 'cutting'... Read More

VoIP - What is the Problem?

In the beginning, when the Internet Protocol was first designed,... Read More

Text To Speech - Its Simple

Looking for a natural voice speech engine? Curious about what... Read More

The Calling Card Alternative

For a few years now, the calling cards business is... Read More

Security, Stability, and Interoperability Issues on VoIP Implementation

Now we have accepted that VoIP is no longer just... Read More

interior house cleaning Highland Park ..