What?s Your IQ on Basic PC Phone (VoIP) Knowledge

Short T/F quiz

1. T / F You can save a significant amount of money using VoIP rather than traditional telephone/cell phone calling methods.

2. T / F The minimum requirement for VoIP is a broadband (high speed) connection.

3. T / F VoIP security is not an issue to be concerned about because most computers are protected with firewalls.

4. T / F Over 75% of the world will be using VoIP for communication within the next 3-4 years.

5. T / F You can make all your phone calls anywhere in the world from your computer.

6. T / F Peer-to-peer (P2P) networks are perfectly safe to use, especially if your computer is protected with firewalls.

Answers

1. The answer is True. In fact, it is the tremendous savings of up to 80% off traditional phone calling that makes VoIP attractive to consumers and businesses. The only equipment needed for VoIP is your PC and a microphone (if one is not built into your PC). Beware of VoIP service providers that require you to purchase additional equipment and/or sign contracts.

2. The answer is False. Although the public has been fed a steady diet that the minimum requirement for VoIP is a high speed (broadband) connection, this is absolutely false.

Over 90% of the VoIP providers have used this false premise as a smokescreen to take your focus off the fact that their priority was and is to line their own pockets rather than expend the time, effort, and funds to develop technology that incorporates dial up capability.

The technology required for dial up connections to use VoIP involves the ability to compress data packets down to a minimum size of 8 kbps prior to traveling over the Internet.

3. The answer is False. Security should be the most important feature of any VoIP solution provider. Firewalls do not incorporate protection for VoIP. VoIP security should incorporate protection against identity theft, Trojan horses, viruses, and worms.

Craig Pollard of Siemens advised that "Voice must be protected like any other application". He further stated that, "Along with IT directors and telecom managers, a number of financial directors came to our road shows, which may not be surprising considering the damaging potential of VoIP threats if a network is not properly protected."

Over 90% of VoIP solution providers do not operate on secure lines. These providers, in order to save a few dollars at your expense, operate on industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable. Hacker friendly providers offer hacker manuals, software, programs, and even processor chips that makes accessibility to your computer from these industry standards ? as enticing as chum is to sharks in a feeding frenzy.

When a computer hacker gains unauthorized access to your computer, their sole purpose is to steal your identity and sell your personal and confidential information to other criminal entities. In addition, they often plant Trojan horses, viruses, and worms into your computer.

4. The answer is True. Industry insiders such AT&T says, "VoIP traffic is projected to account for approximately 75% of the world's voice traffic by 2007". This suggests a major paradigm shift in communication.

5. The answer is True. Not only can you make all your phone calls anywhere in the world from your computer, you can also travel with your computer phone. Simply by bringing your unique number and password, you can download your phone with your entire contact list. Of course, PC to PC is usually free between subscribers. PC to telephones and cell phones typically involves fees at drastically reduced rates when compared to traditional calling rates.

6. The answer is False. P2P networks use industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable.

John Ashcroft, Attorney General, in remarks at the High Technology Crime Investigation Association 2004 International Training Conference held on September 13, 2004 stated, "We have seen worms and viruses attack?disrupting basic services?And with the increased use of the Internet and especially peer-to-peer networking, we have seen malicious code spread more quickly and infect more personal computers than ever before. The cost of these worms, viruses, and denial-of-service attacks?reaches into the billions of dollars."

P2P networks such as Skype operate by taking bandwidth (information carrying capacity) from customers on their service to assist other customers using their service - analogous to a symbiotic relationship. The tools that enable them to accomplish this are bundled in the software their customers agree to in order to download and access their VoIP service.

Another grave concern for both individuals and businesses when using P2P systems is unknowingly having your computer used as a supernode. A supernode occurs when your computer is arbitrarily assigned as a hub.

When you are running the software for P2P services, your computer's disk space, bandwidth, and processing power are used to help other users on the same system operate their software more efficiently because of their own network or firewall constraints.

We as consumers still have a lot to learn about VoIP, as this technology is the new era of communication and is continuously being changed.

All VoIP service providers need to incorporate the protection, needs, and desires of its customers, as well as address security and dial up capability.

All VoIP service providers should invest in developing a proprietary patented technology that incorporates compression of data packets so that their VoIP can be used on dial up connections, as well as cable, satellite, and wireless.

All VoIP service providers should develop and create their own proprietary high end encryption codec with patented technology, simply because they do not want their customers to be victims of viruses, worms, Trojan horses, or have their identity stolen as a result of using their VoIP service.

Simply put, all VoIP service providers should place the protection, security, and needs of their customers FIRST. Of course, they are in business to earn profits, but it should not be at the expense of exposing their customers to unscrupulous entities.

Want to hear and experience what exceptional sound quality on optimally secure lines sounds like? Download a 7 day free trial at http://www.free-pc-phone.com and see for yourself.

**Attn Ezine editors / Site owners **
Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include the resource box as listed above.

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com

weekly home cleaning Lake Forest ..
In The News:

A personal data protection guide revealing 10 signs your information is circulating among data brokers and practical strategies to regain control of your digital footprint.
New Android security updates include smarter scam detection, Key Verifier for identity confirmation, Find Hub tracking and Advanced Protection to safeguard your phone and data.
Tech expert Kurt “CyberGuy" Knutsson reports that scammers made a fake Venmo that mimics a real cancer nonprofit’s handle.
Tech expert Kurt “CyberGuy" Knutsson says Hugging Face has launched affordable open-source humanoid robots for home AI exploration.
Tech expert Kurt “CyberGuy" Knutsson tells how one person almost fell for a phishing scam despite strong security. Learn to spot and stop scammers.
Tech expert Kurt “CyberGuy" Knutsson takes a look at the Mercedes Vision V luxury van and its 65-inch screen, 42 speakers and first-class comfort.
A third-party dental marketing agency's unsecured database exposed millions of patient profiles with personal information that could be exploited for identity theft and insurance fraud.
New York-based Aircela unveils refrigerator-size device that converts air and water into fossil-free gasoline, with initial deployments planned for 2025.
Your home address is easily accessible on people finder sites, putting you at risk for stalking and identity theft, but data removal services can help protect your personal information.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Robot combat evolves at Unitree's Iron Fist King event as G1 robots face off in China, featuring knockouts, precise strikes and agile machines that can perform side flips.
Take control of your digital privacy with actionable tips like Facebook privacy checkup, location tracking management and data removal services to protect your personal information.
Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power them on; infections have been detected in 222 countries.
The lightweight, 15-pound Tenniix tennis robot mimics pro playing styles like Nadal and Federer, using AI trained on 8,000 hours of professional tennis data.
Oak Ridge's uranium enrichment facility supports America's AI ambitions amid concerns that China's aggressive nuclear reactor construction could give it an edge in powering data centers.
Facebook scam ads now leverage AI and deepfakes to create convincing celebrity endorsements, targeting specific demographics with sophisticated schemes.
Apple unveils iOS 26, macOS 26 Tahoe and iPadOS 26 with translucent Liquid Glass design at WWDC 2025, featuring ChatGPT integration as competitors advance rapidly.
The Atom Touch prosthetic arm combines an AI neural interface with EMG sensors, allowing amputees to control individual fingers with precision at an affordable $25,000.
Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data the AI technology gives.
Tech expert Kurt “CyberGuy" Knutsson says iPads are usually secure, but hackers can access them. Spot warning signs early to protect your data.
Tech expert Kurt Knutsson reveals how to easily move photos and videos off your iPhone or Android to securely protect your favorite moments.
The Social Security Administration is launching digital SSN access this summer. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to use it and protect your identity.
Glide underwater with CudaJet and make the ocean your playground. Kurt “CyberGuy" Knutsson discusses the redesigned tech that might be your next big thrilling adventure.
Protect yourself from login alert scams with five security steps, including avoiding suspicious links, checking account activity and enabling two-factor authentication
Skip the usual Father's Day gifts with personalized ideas for tech enthusiasts, home brewers, pool owners, seniors, outdoor lovers and privacy-conscious dads.

How to Choose VoIP Service Without Losing Your Shirt

Voip.Just mentioning the word to yourself either brings up images... Read More

Alarm Systems & VoIP (Voice over Internet Protocol) Phone Lines

An astounding and unexpected number of people are dropping their... Read More

Take Advantage of Internet Phone Calls (VOIP)

Voice Over IP (VOIP) is a relatively new technology. Voice... Read More

VOIP Questions and Answers

Voice over Internet Protocol, or VoIP, has grown in popularity... Read More

The Dangers of Peer-to-Peer Systems

Peer-to-Peer (P2P) systems do not operate on secure lines, thus... Read More

What Do You Know About VoIP?

What is VoIPVoIP is an acronym for voice over internet... Read More

Should You ,VoIP?

My friend in Florida, Samuel, called me last week and... Read More

How Much Bandwidth is Required for VoIP Phones?

A long-standing question for potential VoIP (Voice over Internet Protocol)... Read More

Does Voice Over IP Telephony Spell the End for Traditional Telephones?

Just What is Voice Over IP Telephony?Voice over Internet Telephony... Read More

Bluetooth Computer Headsets - Enjoy Wireless Freedom

Wireless Computer HeadsetsTill recently, few options were available to people... Read More

Get a ?Virtual Phone Number? - Eliminate Long Distance Charges with VoIP Phone Service

There's a revolution brewing in the telephone industry. But it's... Read More

Security, Stability, and Interoperability Issues on VoIP Implementation

Now we have accepted that VoIP is no longer just... Read More

Benefits of VoIP

You may not have considered it but there are many... Read More

Try VoIP for Free - No Commitment, No Hardware

Try VoIP Before BuyingSo you like the concept of 'cutting'... Read More

Will the Bell System Survive? A Massive Transfer of Wealth from Bell to VoIP is Underway

Will the Bell System Survive? A Massive Transfer of Wealth... Read More

VOIP For Your Business

Many companies are now beginning to look into alternatives to... Read More

VoIP: Finally Worth a Look

Dear Internet Friends, Hundreds of thousands of consumers collectively save... Read More

Text To Speech - Its Simple

Looking for a natural voice speech engine? Curious about what... Read More

VoIP (Computer Phone) Warning

Warning! Warning! Warning!Beware of VoIP internet service providers that operate... Read More

Voice over IP Offers Your Business an Inexpensive Alternative To Toll Free Numbers

New businesses can now let their customers contact them for... Read More

Why Over 90% of VoIP Services Are Vulnerable to Attack

John Ashcroft, Attorney General, in remarks at the High Technology... Read More

VOIP

This article contains the excellent information about the Voice Over... Read More

What can a VoIP Phone System Do for a Small Business?

Voice over Internet Protocol, or VoIP, is a term used... Read More

VoIP - A Laymans Look - Should You Or Shouldnt You?

"As business people we manufacture shin pads, or we distribute... Read More

Needless HIGH RISK Exposure For Business Using Computer Phones

The Facts? Computer phones (VoIP) offer the most optimal means... Read More

best cleaning company Arlington Heights ..