It is rather interesting to know that we are surrounded by dishonest hackers, wanting to take over our important and personal information for illegal purposes. All of us who regularly make use of our computers, and utilize VoIP or computer phone services to communicate with our friends and family in various locations are particularly being targeted on the day-to-day basis by hackers. Assistant US Attorney, Computer and Telecommunications Coordinator with the District of Nebraska Daniel A. Morris mentioned an article titled in “Tracking a Computer Hacker” that hackers today are bigger robbers since they are using technology, to achieve their targets.

The sole aim of these hackers is to target our correspondence on the Internet considering that it makes it rather easy to attain access to our computers, send in worms and viruses and particularly acquire our personal information that is rather dear to us. So, let’s just have a more deep look on this technology and tell about IP telephony for dummies.

Can it really be stopped?

Since VoIP uses voice signals, it needs a scheme that will alter the voice into facts, numbers, and packets to journey over the Internet and then alter back to voice at the destination. However, VoIP phones are not just an application that is dependent upon information network, it demands for a genuine time service due to presentation anticipations, particularly when it comes to sound quality.


Most of the VoIP computer telephones and VoIP phone service need at least 20 kbps of bandwidth in order to make it easy for data packets to journey over the Internet. This is the reason we require a rather high-speed Internet connection in properly function without corrupting the quality of the voice.

What is most interesting to know is that there are a few VoIP computer telephony providers, some of which are rather reputable, need a smallest of less than 10 kbps of bandwidth. That is why their services can be utilized with dial-up connections, cable internet, wireless connections or satellite connection, for that matter.

Adapting widely open and interpretable commercial standards

Above 95% of VoIP computer telephony services rely on standard encryption codes along with certain vital standard protocols. Computers are allotted a distinct numeric Internet Protocol (IP) address as soon as they are connected to the internet, which is similar to sending snail mails to your residential location with your name, street number, city, district, and zip code accurately filed in. The IP address or what is known as an Internet Protocol address is a numeric figure that identifies the client and their system. Standard codec and protocols are rather open and can easily be understood by the general public. As for your knowledge, hackers often attack contrary to VoIP (Voice over Internet Protocol) services that function on publicly visible/open networks.

P2P and IM Services

P2P is yet another rather unsafe whereas. IM services furthermore generated vulnerability to vicious hacker attacks by a basic supervising program made accessible that makes it easy for electrical devices to eavesdrop. Information can easily be transformed into data packets, without the user knowing about it and can then be accessed by vicious hackers to carry out their bad deeds.