Continued from page 1
6.The answer is False. P2P networks use industry standard codec (encryption codes) and industry standard protocols which are publicly open and interpretable.
John Ashcroft, Attorney General, in remarks at
High Technology Crime Investigation Association 2004 International Training Conference held on September 13, 2004 stated, “We have seen worms and viruses attack…disrupting basic services…And with
increased use of
Internet and especially peer-to-peer networking, we have seen malicious code spread more quickly and infect more personal computers than ever before. The cost of these worms, viruses, and denial-of-service attacks…reaches into
billions of dollars.”
P2P networks such as Skype operate by taking bandwidth (information carrying capacity) from customers on their service to assist other customers using their service - analogous to a symbiotic relationship. The tools that enable them to accomplish this are bundled in
software their customers agree to in order to download and access their VoIP service.
Another grave concern for both individuals and businesses when using P2P systems is unknowingly having your computer used as a supernode. A supernode occurs when your computer is arbitrarily assigned as a hub.
When you are running
software for P2P services, your computer’s disk space, bandwidth, and processing power are used to help other users on
same system operate their software more efficiently because of their own network or firewall constraints.
We as consumers still have a lot to learn about VoIP, as this technology is
new era of communication and is continuously being changed.
All VoIP service providers need to incorporate
protection, needs, and desires of its customers, as well as address security and dial up capability.
All VoIP service providers should invest in developing a proprietary patented technology that incorporates compression of data packets so that their VoIP can be used on dial up connections, as well as cable, satellite, and wireless.
All VoIP service providers should develop and create their own proprietary high end encryption codec with patented technology, simply because they do not want their customers to be victims of viruses, worms, Trojan horses, or have their identity stolen as a result of using their VoIP service.
Simply put, all VoIP service providers should place
protection, security, and needs of their customers FIRST. Of course, they are in business to earn profits, but it should not be at
expense of exposing their customers to unscrupulous entities.
Want to hear and experience what exceptional sound quality on optimally secure lines sounds like? Download a 7 day free trial at http://www.free-pc-phone.com and see for yourself.
**Attn Ezine editors / Site owners ** Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify
content and include
resource box as listed above.

Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com