Tag Archives: SIP
“Surprise is the greatest gift which life can grant us.” Boris Pasternak Until the pandemic changed everything, I was a regular attendee at in-person IAUG chapter meetings across the country. Most of the time I presented a topic, but on a few occasions, I was simply there to listen and learn. Although I have never […]
I have been working with IP technology for a long time. I can’t tell you the exact year of my first exposure, but it was sometime between 1985 and 1987. I was working at Northern Telecom as a software developer and was tasked with adding a TCP/IP stack to a version of Unix that ran on a Motorola […]
In my latest guest blog post for Assertion, I take a look at the NSA guidelines for securing VoIP and UC. I learned a few new tricks and expect that you will, too. Take a look at let me know what you think about it. Deploying VoIP the NSA Way
In my latest guest article for Assertion I ask you How Vulnerable is Your VoIP? It’s worth a look if only for a photograph of an 18-year-old me.
There’s an old saying that goes, “If you can’t beat ’em, join ’em.” While I am not advocating that you become a SIP hacker, it’s important that you become familiar with the tools they use. In my latest guest blog, I take a look at one of the most popular SIP hacking tools — SIPVicious. […]
I keep getting asked to guest blog post about SIP and I just can’t seem to say “no.” If you are planning a SIP migration or want to tune your existing configuration, this is the article for you. Planning a Successful SIP Trunk Migration
In my latest video, I show you how easy it is to configure and deploy SIP trunks on Avaya CPaaS. To make it simple to understand, I give you a step-by-step way to PSTN-enable a free SIP soft client. Check it out!
“Never let the same dog bite you twice.” Chuck Berry Before I discuss securing SIP, I want you to imagine a bank. Every bank I know has a sturdy door equipped with a good lock and some form of alarm system. Inside the bank, it’s not uncommon to have a trained security guard. The tellers […]
Every so often I am asked to write an article for a blog other than my own. I usually respond with “no.” There are only so many hours in the day and those few are already over-scheduled without taking on additional work. However, I said “yes” to this one. After all these years, I still […]
I finished my third and final (for now) No Jitter article about SIP security. This time I take a look at what should be done at the SBC. If you are serious about security, and you should be, please take a look. Attention, Vigilance: Securing Your SBC the Right Way