Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.
This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.
What people are saying - Write a review
Chapter 2 Setting Up Asterisk
Chapter 3 Configuring Asterisk
Chapter 4 Writing Applications with Asterisk
Chapter 5 Understanding and Taking Advantage of VolP Protocols