VoIP (Computer Phone) Warning

Written by By Dee Scrip ©All rights reserved


Continued from page 1

Viruses, Worms, and Trojan Horses

On January 28, 2005, a press Release issued byrepparttar Department of Justice reported that a 19 year old was convicted for his criminal activity by “…creating and unleashing a variant ofrepparttar 107914 MS Blaster computer worm.” Christopher Wray, Attorney General – Criminal Division stated that,

"This … malicious attack onrepparttar 107915 information superhighway caused an economic and technological disruption that was felt aroundrepparttar 107916 world.”

On February 11, 2005, in a Press Release issued byrepparttar 107917 Department of Justice, reported that another criminal was sentenced for circulating a worm. This worm,

“directedrepparttar 107918 infected computers to launch a distributed denial of service (DOS) attack against Microsoft's main web site causingrepparttar 107919 site to shutdown and thus became inaccessible torepparttar 107920 public for approximately four hours.” March 7, 2005, Symantec.com posted discovery of a worm named “W32.Serflog.B” that spread through file-sharing networks and MSN Messenger – networks that operate on publicly open and interpretable industry standard codec and protocols, including P2P systems, as well as Instant Messaging systems—none of which are protected, regardless ofrepparttar 107921 anti virus software on your computer. The W32.Serflog.B worm also lowers security settings and appears as a blank message window onrepparttar 107922 MSN Messenger. If you don’t want to berepparttar 107923 next victim ofrepparttar 107924 devastation created by worms, STOP using services that operate on industry standard codec and protocols, and/or services that incorporate P2P systems.

Anti virus software does not incorporate protection for Instant Messaging services. In addition, Instant Messaging services, in and of themselves, do not include protection for their users.

If you likerepparttar 107925 convenience of text chatting via Instant Messaging, then use a VoIP internet service provider that includesrepparttar 107926 Instant Messaging feature -- one that does not operate on industry standard codec or industry standard protocols that are publicly open and accessible.

Optimally secure VoIP service providers that incorporate a secure Instant Messaging feature, operate from their own proprietary high end encryption codec on patented technology that is hosted in a professional facility. Simply put, when a VoIP internet service provider operates on optimally secure platforms,repparttar 107927 Instant Messaging feature onrepparttar 107928 VoIP softphone, is also protected with their technology.

A Trojan horse is a program that internet criminals use to interrupt and interfere with your security software and producesrepparttar 107929 following results

·Terminates processes ·Removes registry entries ·Stops services ·Delete files

Hackers, who have gained access to your computer, because ofrepparttar 107930 programs and software as mentioned above, are having a field day incorporating this nasty little program into their arsenal of weapons.

As recently as March 4, 2005, a new Trojan horse was discovered that modified settings in Internet Explorer. Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP wererepparttar 107931 reported systems that could be affected.

Here’srepparttar 107932 bottom line.

1.If you are currently using a VoIP internet solution provider that operates on industry standard codec and industry standard protocols that are publicly open and interpretable, you need to make a decision: a. Continue enticing criminal hackers and remain on their service, or b.Take immediate corrective action. 2.If you are currently using Instant Messaging of any sort, you need to make a decision a. Continue enticing criminal hackers and remain as a user of their service, or b.Take immediate corrective action.

If you decide to take immediate corrective action:

1.Find a VoIP internet solution provider that has their own proprietary high end encryption codec 2.Find a VoIP internet solution provider that has their own proprietary patented technology 3.Find a VoIP internet solution provider that hosts their proprietary patented technology in a professional facility 4.Find a VoIP internet solution provider that includesrepparttar 107933 Instant Messaging feature in their proprietary patented technology

Here’s a place you can look over to see what a VoIP internet solution provider looks like that operates on their own proprietary high end encryption codec with their own proprietary patented technology hosted in a professional facility, AND that incorporatesrepparttar 107934 Instant Messaging feature. http://www.free-pc-phone.com

**Attn Ezine editors / Site owners ** Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modifyrepparttar 107935 content and includerepparttar 107936 resource box as listed above.

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com


Instant Messaging – Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Written by By Dee Scrip ©All rights reserved


Continued from page 1

A Trojan horse is a program that Internet criminals use to interrupt and interfere with your security software and producerepparttar following results

·Terminates processes ·Removes registry entries ·Stops services ·Deletes files

Hackers, who have gained access to your computer, because ofrepparttar 107913 easily accessible programs and software as mentioned above, are enthusiastically incorporating this venomous little program into their arsenal of weapons.

As recently as March 4, 2005, a new Trojan horse was discovered that modified settings in Internet Explorer. Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP wererepparttar 107914 reported systems that could be affected.

On January 28, 2005, a press Release issued byrepparttar 107915 Department of Justice reported that a 19 year old was convicted for his criminal activity by “…creating and unleashing a variant ofrepparttar 107916 MS Blaster computer worm.” Christopher Wray, Attorney General – Criminal Division stated that,

"This … malicious attack onrepparttar 107917 information superhighway caused an economic and technological disruption that was felt aroundrepparttar 107918 world.”

Byrepparttar 107919 way, “malicious” is defined by Webster as “…intentionally mischievous or harmful”.

On February 11, 2005, in a Press Release issued byrepparttar 107920 Department of Justice, reported that another criminal was sentenced for circulating a worm. This worm,

“…directedrepparttar 107921 infected computers to launch a distributed denial of service (DOS) attack against Microsoft's main web site causingrepparttar 107922 site to shutdown and thus became inaccessible torepparttar 107923 public for approximately four hours.” March 7, 2005, Symantec.com posted discovery of a worm named “W32.Serflog.B” that spread through file-sharing networks and MSN Messenger – networks that operate on publicly open and interpretable industry standards administered by P2P systems that host Instant Messaging clients—none of which are protected, regardless ofrepparttar 107924 anti virus software on your computer. The W32.Serflog.B worm also lowers security settings and appears as a blank message window onrepparttar 107925 MSN Messenger. SOLUTION

Avoid at all costs, P2P file sharing networks as they operate on publicly open and interpretable industry standards. (Instant Messaging services run on P2P file sharing networks.)

If you likerepparttar 107926 convenience of text chatting via Instant Messaging, then why not consider an optimally secure VoIP (voice over internet protocol), also known as a Computer Phone, that incorporatesrepparttar 107927 Instant Messaging feature. Make surerepparttar 107928 VoIP internet service provider does not operate on P2P file sharing networks that use industry standard codec or industry standard protocols that are publicly open and accessible. (Don’t forget, these standards createrepparttar 107929 vulnerability which hackers are capitalizing on because of their easy accessibility.)

Optimally secure VoIP service providers that incorporate a secure Instant Messaging feature, operate from their own proprietary high end encryption codec on patented technology which is hosted in a professional facility. Simply put, when a VoIP internet service provider is optimally secure,repparttar 107930 Instant Messaging feature onrepparttar 107931 VoIP softphone is also incorporated in their optimally secure technology.

Here’srepparttar 107932 bottom line.

If you are currently using Instant Messaging of any sort, you need to make a decision:

a.Continue enticing hacker mercenaries and remain as a user of an Instant Messaging service, or b.Take immediate corrective action.

If you decide to take immediate corrective action:

1.Find an optimally secure VoIP internet solution provider that includesrepparttar 107933 Instant Messaging feature in their proprietary patented technology. 2.Find an optimally secure VoIP internet solution provider that has their own proprietary high end encryption codec. 3.Find an optimally secure VoIP internet solution provider that has their own proprietary patented technology. 4.Find an optimally secure VoIP internet solution provider that hosts their proprietary patented technology in a professional facility.

Here’s a place you can look over to see what an optimally secure VoIP internet solution provider looks like--one that operates on their own proprietary high end encryption codec with their own proprietary patented technology hosted in a professional facility, AND one that incorporatesrepparttar 107934 Instant Messaging feature. http://www.free-pc-phone.com

**Attn Ezine editors / Site owners ** Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modifyrepparttar 107935 content and includerepparttar 107936 resource box as listed above

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use