Security in a Box Guide

Total Page:16

File Type:pdf, Size:1020Kb

Security in a Box Guide HO KK =J O<=G@JA>JIO@ION P @ P U = ? ? = P ? E ? K O R @ B = K N Diomj_p^odji 1 Oa_qnepuej)])^ktwas developed by the Tactical Technology Collective and Front Line in collaboration with: ,) Cjrojkmjo`^otjpm^jhkpo`m Coordination, writing & editing Wojtek Bogusz Dmitri Vitaliev amjhh\gr\m`\i_c\^f`mn 9 Chris Walker Viruses 10 Additional writing Cormac McGuire Benji Pereira Spyware 12 English proofreading Caroline Kraabel Firewalls 13 & copy editing Benji Pereira Keeping your sofware up-to-date 15 Lead tester Rosemary Warner Design Lynne Stuart -)Cjrojkmjo`^otjpmdiajmh\odji Curriculum development Pamela Teitelbaum Dmitri Vitaliev amjhkctnd^\gocm`\on 21 Coordination of Louise Berthilson Assessing your risks 21 software localisation Alberto Escudero Pascual Protecting your information from Spanish team Translation Phol Edward Paucar Aguirre physical intruders 23 Editing Katitza Rodríguez Pereda Webmaster Angelin Venegas Ramírez Maintaining a healthy environment Localisation Diego Escalante Urrelo for your computer hardware 26 Proofreading Carlos Wertheman Creating your physical security policy 27 French Team Editing, translation & localisation Patrick Cadorette Translation & localisation Alexandre Guédon Proofreading Miriam Heap-Lalonde .)Cjroj^m`\o`\i_h\dio\di Editing Fabian Rodriguez n`^pm`k\nnrjm_n 33 Russian Team Selecting and maintaining secure passwords 33 Translation Emin Akhundov Translation Alexei Bebinov Remembering and recording secure passwords 35 Translation Alexander Lapidus Proofreading Ksenia Shiryaeva Editing, translation & localisation Sergei Smirnov /)Cjrojkmjo`^ooc`n`indodq`Ùg`n Arabic Team Editing, translation & localisation Ahmad Gharbeia jitjpm^jhkpo`m 43 Editing Manal Hassan Translation & localisation Khaled Hosny Encrypting your information 44 Translation Mahammad F Kalfat Hiding your sensitive information 46 Special Thanks to The Citizen Lab, Robert Guerra, Internews, RiseUp,The Tor Project & VaultletSoft Funder ee eee 0)Cjrojm`^jq`mamjhdiajmh\odjigjnn 53 Identifying and organising your information 54 Defning your backup strategy 56 Creating a digital backup 58 Recovering from accidental fle deletion 61 1)Cjroj_`nomjtn`indodq`diajmh\odji 67 Deleting information 68 Wiping information with secure deletion tooll 69 Tips on using secure deletion tools efectively 71 Tips on wiping the entire contents of a storage device 72 2) Cjrojf``ktjpmDio`mi`o ^jhhpid^\odjikmdq\o` 77 Securing your email 78 Tips on responding to suspected email surveillance 83 Securing other Internet communication tools 84 Advanced email security 85 3)Cjrojm`h\di\ijithjpn\i_ ]tk\nn^`injmncdkjioc`Dio`mi`o 93 Understanding Internet censorship 94 Understanding censorship circumvention 96 Anonymity networks and basic proxy servers 97 Specifc circumvention proxies 101 Bgjnn\mt 107 er r Diomj_p^odji Advocates are increasingly concerned about their digital security, and with good reason. While computers and the Internet can be extremely powerful tools for advocacy, they also expose groups (that may already be quite vulnerable) to new risks. As more advocates have begun to rely on digital technology to achieve their outreach, data-collection, information design, communication and mobilisation objectives, these risks have become greater. If you are an advocate who focuses on sensitive issues, or you work closely with such people, then you have probably experienced (or heard stories about) digital security and privacy threats. Computers and backup drives that were confscated, passwords that changed mysteri- ously, local websites that were hacked or overloaded by malicious Inter- net trafc, foreign websites that can no longer be accessed and emails that appear to have been forged, blocked, modifed or read by someone other than the intended recipient. Tese are true stories, and many of them are set in an environment that makes maters even worse, one in which computer operating systems are frequently out-of-date, sofware is ofen pirated and viruses run rampant. Tis toolkit provides explanations of, and solutions for, threats like these. It was created by a diverse team of experts who understand not only the conditions under which advocates work, but also the resource restrictions they face. While Security in-a-box is designed primarily to address the grow- ing needs of advocates in the global South, particularly human rights defenders, the sofware and strategies in this toolkit are relevant to digital security in general. It has something to ofer anyone who works with sensitive information. Tis may include vulnerable minorities and independent journalists or ‘whistle-blowers’, in addition to advocates working on a range of issues, from environmental justice to anti-corrup- tion campaigns. CJROJPN@OC@N@>PMDOTDI(<(=JSOJJGFDO Tis toolkit has three major components: j the How-to Booklet j the Hands-on Guide j a selection of freeware and Open Source sofware Tis How-to Booklet is designed to explain the issues that you must understand in order to safeguard your own digital security. It seeks to identify and describe the risks you face and help you make informed re - decisions about how best to reduce those risks. To this end, it answers order. Security is a process, and there is ofen litle point in trying to eight broad questions related to basic security, data protection and com- defend yourself against an advanced threat to your communication munication privacy. privacy, for example, if you have not yet ensured that your computer At the beginning of each chapter, you will fnd a background is free of viruses and other malware. In many cases, this would be like scenario populated by fctional characters who will reappear in brief locking your door afer a burglar is already in your home. Tis is not to conversations throughout the chapter in order to illustrate certain say that any one of these eight topics is more important than any other, points and answer common questions. You will also fnd a short list it is simply that the later chapters make certain assumptions about what showing what you can learn fom this chapter. It is a good idea to scan you already know and about the state of the computer on which you are through this list before you begin reading. As you work through a chap- about to install sofware. ter, you will encounter a number of technical terms that are highlighted Of course, there are many good reasons why you might want to in green and defned in the glossary at the end of the booklet. You will work through these chapters out of sequence. You might need advice also fnd references to the specifc sofware discussed in the toolkit’s on how to back up your important fles before you begin installing the Hands-on Guides. tools described in the frst Hands-on Guide. You might fnd yourself Tese Hands-on Guides are included, along with an electronic faced with an urgent privacy threat that justifes learning How to protect copy of the How-to Booklet, on the accompanying CD (or USB the sensitive fles on your computer, which is covered in Chapter 4, as memory stick, if you have a version of the toolkit that contains one). quickly as possible. Perhaps you are working from an Internet café, on Each guide explains how to use a particular freeware or Open Source a computer whose security is not your responsibility and from which sofware tool. Te Hands-on Guides highlight potential difculties, sug- you do not intend to access any sensitive information. If you want to use gest helpful tips and, most importantly, walk you through the process this computer to visit a website that is blocked in your country, there of confguring and using these tools securely. Tey include screenshots is nothing to prevent you from skipping ahead to Chapter 8: How to and step-by-step instructions for you to follow as you go along. remain anonymous and bypass censorship on the Internet. All of this sofware can be installed directly from the toolkit or Whatever path you take through the toolkit, we hope it answers downloaded free of charge from the Internet. In most cases, you can some of your questions, helps you understand some of your vulnerabili- install a tool simply by clicking on the appropriate link at the begin- ties and shows you where to look for solutions. ning of whichever guide explains that tool, then telling your browser to Open or Run the install program. If a Hands-on Guide provides special <=JPOOC@N@>PMDOTDI(<(=JSKMJE@>O installation instructions, you may have to save a fle to your Desktop, or Digital security and privacy threats are always unique to the work that some other location, in order to install that tool. Te Security in-a-box an advocate does and the environment in which that person operates. disc also includes a section called Portable Security, where you will fnd Furthermore, the collection of sofware that might help address those ‘portable’ versions of a few Security in-a-box tools. Tese versions are threats is constantly changing, and the tools themselves are frequently meant to be installed directly onto a USB memory stick so that you can updated. For these reasons, it is extremely difcult to create an ‘of- use them on any computer. the-shelf’ toolkit like Security in-a-box. Nothing stated in this toolkit Any single chapter or guide in this toolkit can be read individually, is absolute, and there is no replacement for a trusted, local expert who or formated in your browser for easy printing, or shared electronically. understands the environment you work in, is sympathetic to your cause However, you will get more out of Security in-a-box if you can follow and can help you identify the most up-to-date tools with which to the relevant links and references that are scatered throughout both the protect yourself. booklet and the sofware guides. Ideally, you will have this booklet in Nevertheless, we hope that Security in-a-box will give you an idea front of you while you work through the Hands-on Guides.
Recommended publications
  • Amazfit Bip S FAQ
    Amazfit Bip S FAQ Technical Specs. Product Weight 30 g Water proof 5ATM rating Display Size 1.28” Display 176x176 px Resolution Display Type Trans-reflective color LCD touch screen, Backlight luminance Display Material Corning Gorilla Glass screen, AF Coating Wristband Width 20mm Band Material TPU Wristband Length 11+8.5 cm PPG Heart Rate Sensor Sensor Acceleration Sensor Geomagnetic Sensor GPS GPS + GLONASS Connection Bluetooth 5.0 / BLE Battery 190mAh Lithium Polymer Battery Charging Time 2.5 h Standby Time About 3 Months basic use/ 30 days regular use/ 12 hours GPS + Running mode Vibration Motor Rotor Motor Case Material Polycarbonate APP Amazfit System Support iOS 10.0 and Android 5.0 above Main Features ● Steps & Distance Tracking (track daily steps, mileage, and calories burning data) ● Heart Rate Tracking ● Activity & Sports Tracking ● Sleep Monitoring ● Weather Forecast ● Alarms ● Stopwatch & countdown Timer ● Notifications (receive notifications for incoming calls, messages, SMS, emails, and other apps. Remind you when you reach your goal) ● Idle Alert ● Compass ● Silent Mode ● Screen Unlock ( only for smart lock phones) Get Started 1. Package Contents Watch, Charger, User Manual 2. Charging your watch Please fully charge your watch before use. It takes about 2.5 hour to fully charge it. To charge your Amazfit Bip S Insert the watch into its charging base, attach the USB end of the charger to your PC or a normal charging adaptor. Once clipped in, the watch face will light up and show that the watch as “charging”. Note: Charger adapter output values is DC 5.0V. 3. Download the APP & Sign in The Amazfit Bip S companion app is available for iOS in the App Store and for Android in the Google Play Store.
    [Show full text]
  • OTT and Related On-Line Services in Arab Region
    OTT and related on-line services in Arab Region Release 1.1 31/01/2017 Reality of OTTs in Arab Region The objective of the study is: 1- to have a global view on OTT and on-line services worldwide with the impact and trends of these services on national players and economies, 2- to have an overview on associated practices and relevant public policies worldwide and in the Region, 3- to propose recommendations on methods and approaches for preparation of associated policies and frameworks. _____________________________ The present document is the first release of the report. A draft questionnaire is proposed with this release and is intended to be submittedfor a survey to Regulators/policy Makers and Operators in the Region. The outcome of the survey with the related findings will be commented and included in a next version of this report. It is to note that, as the subject of OTT is being regularly debated in almost all regions with potential move and change in the related positions and decisions, some information reported in the present report may become outdated. __________________________________________________________________ OTT and related on-line services in Arab Region Executive Summary With the increase of global mobile broadband penetration, as well as the rapid adoption of connected devices, consumers have been provided with an access to a wide variety of on-line services which go beyond the traditional voice and messaging services provided by telecom operators (alias telcos *). These on-line services are reshaping the entire telecommunication eco-system, and are of great benefit to consumers worldwide, to the global economy and ubiquitous connectivity.
    [Show full text]
  • Mi Band Whatsapp Notification Iphone
    Mi Band Whatsapp Notification Iphone Malacostracan and unpossessed Renard always sonnetizing decidedly and swingles his airfields. Hydrophobic Nels terraces intemerately and boundlessly, she binge her Coventry blesses stately. Is Sawyere sea or polemical when euphemises some kinships legitimatized tardily? How to a flat while loading the main pubg mobile apps work better details for mi band app appears to whatsapp notification from the norm with an image url and How to activate WhatsApp notifications on a Galaxy Watch. And band off all international community members. Xiaomi Mi 9T Means you not also track iphone user via your Android device. Xiaomi Mi Mix 4 Coming This goal Along two New customer Report Says. Apple iPhone Users on iOS 14 Report Problems With. Whatsapp galaxy watch Confsalcom Campania. How they Send Disappearing Messages on WhatsApp. Buy Realme Classic Watch online at Flipkartcom. Mi band display and the gadget you need to look bad on the glued area. Mbm with mi bands. In mi bands. The Mi Band users complained that they obey not receiving notifications from apps like WhatsApp WeChat and others The wearable also did. Constructive discussions about whatsapp. It shows weather information and notifications from stop phone You visit use it. Pin and whatsapp is stored on android keeps you can enable the order is still a year ago that? The WhatsApp iOS users can keep the availability of the feature by going at the Setting Notifications In-app notifications The users will. Mi band 4 watch faces ios FIM. You get WhatsApp Facebook TikTok Instagram and authorities other app notifications on.
    [Show full text]
  • Turkcell the Digital Operator
    Turkcell the Digital Operator Turkcell Annual Report 2018 About Turkcell Turkcell is a digital operator headquartered in Turkey, serving its customers with its unique portfolio of digital services along with voice, messaging, data and IPTV services on its mobile and fixed networks. Turkcell Group companies operate in 5 countries – Turkey, Ukraine, Belarus, Northern Cyprus, Germany. Turkcell launched LTE services in its home country on April 1st, 2016, employing LTE-Advanced and 3 carrier aggregation technologies in 81 cities. Turkcell offers up to 10 Gbps fiber internet speed with its FTTH services. Turkcell Group reported TRY 21.3 billion revenue in FY18 with total assets of TRY 42.8 billion as of December 31, 2018. It has been listed on the NYSE and the BIST since July 2000, and is the only NYSE-listed company in Turkey. Read more at www.turkcell.com.tr/english-support All financial results in this annual report are prepared in accordance with International Financial Reporting Standards (IFRS) and expressed in Turkish Lira (TRY or TL) unless otherwise stated. TABLE OF CONTENTS TRY Turkcell Group 16 Chairman’s Message 21.3 20 Board of Directors 22 Message from the CEO billion 26 Executive Officers 28 Top Management of Subsidiaries REVENUES 30 Turkcell Group 31 Our Vision, Target, Strategy and Approach 32 2018 at a Glance 34 2018 Highlights 36 The World’s 1st Digital Operator Brand: Lifecell 37 Turkcell’s Digital Services 2018 Operations 38 Exemplary Digital Operator 40 Our Superior Technology 41.3% 46 Our Consumer Business EBITDA 52 Our
    [Show full text]
  • For Dummies Gizmo5
    For Dummies Gizmo5 2.9.1 Apt and Package Basics. 2.9.1.1 Installing.deb packages 9.2.2 Installing Skype repository. 9.3 Wengophone, 9.4 Gizmo5, 9.5 Asterisk VOIP PBX system. the call proceeds without using encryption. Skype and Amicima use only secure connections and Gizmo5 attempts a secure connection between its clients. An interview with Michael Robertson, founder of MP3.com, Gizmo5, MP3Tunes and there are no attempts at calibration puns or "for dummies" instructions. Elwood Gizmo 5 days ago. God, I hate hate. And you are Power to the people, down. The very basics. Free VOIP Publications: Magazines and Newsletters free to qualified subscribers about VOIP related products, Training: Seminars, tutorials. About the Trade Reading Order Forum. Forum Timezone: America/New_York. Currently Online: 15 Guests. Currently Browsing this Forum: 2 Guests. For Dummies Gizmo5 Read/Download /18/back-to-the-basics-how-do-i-wire-a-dc-2-wire-sensor/ 2015-03-18T11:59:29+00:00 sensortech.files.wordpress.com/2013/04/gizmo5.jpg gizmo5. FreePBX VoIP Tutorial Part 2 – Gmail and Google Voice Setup · VLANs and for Beginners – Part 6 VOIP · how to start voice calling with whatsapp ( VOIP ). Try this: create a dummy account on a computer with a camera. charge to you) using your GrandCentral number which forwards to your Gizmo5 SIP number. SIP/SIMPLE, XMPP/Jingle (Google Talk, LJ Talk, Gizmo5, Facebook), YMSG, Zephyr Running a simple descriptive analysis on a dummy sample. Com design pattern for dummies download pk. ek tu sachi sarkar maa Play.ek tu download gizmo5 for blackberry sachi sarkar maa jhandewali mp3 download.
    [Show full text]
  • ACCESS Stereo BRIC IP Codec
    ACCESS STEREO BRIC IP CODEC You’ll be seeing me from time to time throughout this manual to point out ACCESS advanced topics. Feel free to ignore these sections as the default settings provide good performance for most users. Warning: Advanced Topic TABLE OF CONTENTS SECTION 1 ...........INTRODUCTION ......................................................................................... 8 .......................ABOUT BRIC .............................................................................. 9 .......................ABOUT ACCESS PORTABLE ............................................................ 10 .......................WHAT COMES WITH ACCESS PORTABLE .......................................... 10 SECTION 2 ...........ACCESS PORTABLE CONTROLS AND CONNECTIONS .......................................... 11 .......................FRONT PANEL DIAGRAM AND DESCRIPTIONS ........................................ 11 .......................TOP PANEL DIAGRAM AND DESCRIPTIONS ........................................... 12 .......................LEFT PANEL DIAGRAM AND DESCRIPTIONS .......................................... 13 .......................RIGHT PANEL DIAGRAM AND DESCRIPTIONS ........................................ 14 .......................MONO VS. STEREO ........................................................................ 15 .......................PINOUTS - AUDIO ......................................................................... 15 .......................PINOUTS - SERIAL PORT ................................................................
    [Show full text]
  • Shadowliving Tactical Manual
    SHADOWLIVING TACTICAL MANUAL DANIEL SANTIAGO Black Operations Publications Minneapolis, MN 1 © Copyright 2008 by Daniel Santiago Cover artwork © by Daniel Santiago All Rights Reserved No portion of this book may be reproduced without the express written permission of the author or the publisher. Published by Lulu Press Additional copies may be purchased online at- http://www.lulu.com/content/2695362 The author can be contacted at- [email protected] ISBN-10: 1-43573-450-5 ISBN-13: 978-1-43573-450-0 Library of Congress Control Number: 2008911260 Printed in the United States of America DISCLAIMER AND WARNING Neither the author nor the publisher assumes any responsibility for the use or misuse of any information contained herein. All information is presented for educational or entertainment purposes only. Anyone questioning the safety or legality of any activity herein should contact a second professional opinion. 2 CONTENTS Introduction 5 Wilderness Survival 6 Shelter 7 First Aid 8 Fire 9 Water 10 Signaling 12 Food 12 Self-Defense 18 Situational Awareness 18 Tactical Mindset 21 Conflict Defusing 21 Hand to Hand Combat 22 Edged Weapons 28 Firearms 31 Improvised Weapons 36 Home Security 45 Use of Booby-traps 47 Use of Flash and Smoke Bombs 48 Privacy 50 The Art of Invisibility 50 Your Alternate Name and Address 52 Mail, Trash, and Utilities 54 Your Social Security Number 55 Using Telephones 57 Using Computers 61 Privacy In Traveling 68 Use of Liaisons 70 Use of Banks 70 Use of Business Fronts 72 Using Hiding Places 74 3 Dealing With The
    [Show full text]
  • Podcast, Videocast and Screencast
    7/9/2013 Blogging or internet boadcasting • Tips for blogging 1. Fun: The most important part of blogging is having fun and loving your blog. 2. Other media: Why limit yourself to just a blog? 3. Promotion: Commenting on other blogs and getting your blog noticed joins up with social networking sites, but do NOT SPAM ! 4. Collaboration: Use online relationships to collaborate on blog posts and expand your readership – encourage comments, comment on other people’s blogs, link freely and share traffic 5. Social networking: link your newest blog post to your Twitter/FB/Google+ etc. Broadcast Yourself: account for more exposure. 6. Diversity: Multi-media is almost a must these days. Text, video, photo, audio use them all and use them frequently to back up your comments. Podcast, Videocast and Screencast. 7. Brevity: Break up text with cuts, subheadings, bullet lists, photos to better catch the readers eye. 8. Personality: Write what you know, Write from your heart but don’t take the comments personally. There are mean, anonymous people out there surfing the web leaving rude, baseless comments, but there are also plenty more people with constructive comments to offer. 9. Originality: Find your Niche and hold tightly to it 10. Consistency: Posting once a day is considered normal. If you post three times a week, every week, this is considered the bare minimum for attracting and maintaining a strong readership. http://ec.l.thumbs.canstockphoto.com/canstock13762719.jpg http://media.rodemic.com/images/mic-chooser/soundbooth-button-broadcast.png http://www.sokalmediagroup.com/images/Broadcast-Button.jpg http://us.cdn1.123rf.com/168nwm/myvector/myvector1306/myvector130600104/20084211-antenna-smartphone-icon.jpgc Broadcast Yourself: Communications software Podcast • This type of software allows two computers with • A podcast is a type of digital media consisting modems to communicate through audio, video, of an episodic series of audio radio, video, and/or chat-based means.
    [Show full text]
  • Using Voip Midtveisrapport
    INF5261 Using VoIP Midtveisrapport Thomas Bekkeheien, Magnus Lange og Mathias Hagen Innholdsfortegnelse 1 Innledning ............................................................................................................................................. 4 2 Analyse av eksisterende VoIP tilbud .................................................................................................... 4 2.1 Begreper ........................................................................................................................................ 4 2.1.1 VoIP......................................................................................................................................... 4 2.1.2 SIP ........................................................................................................................................... 4 2.1.3 SoftPhone ............................................................................................................................... 5 2.2 Oversikt over tilbydere .................................................................................................................. 5 2.2.1 Shape Services ........................................................................................................................ 5 2.2.2 Barablu ................................................................................................................................... 5 2.2.3 Nimbuzz! ................................................................................................................................
    [Show full text]
  • Unlimited Free Calling with Google Voice
    Unlimited Free Calling with Google Voice 1. Unlimited Free Calling with Google Voice ............................................ 0 1. Introduction ................................................................................... 1 2. Free Calling from a Landline ............................................................. 1 3. Free Calling from a Cellphone (using the Voice plan) ........................... 2 4. Free Calling with Voice Over IP (VOIP) - Introduction........................... 6 5. The Gizmo5 Project - Background ..................................................... 6 6. Google Voice Integration with Gizmo5 ............................................... 7 7. Gizmo5 Integration with SIP Sorcery ................................................. 7 8. SIP Sorcery Integration with sipgate ................................................. 8 9. SIP Sorcery Scripting ...................................................................... 9 10. Unified Dial Plan ........................................................................... 9 11. Customizing the SIP Sorcery Unified Dialplan ...................................15 12. Connecting other SIP Clients and Devices........................................16 13. Configuring and Testing your SIP Calling Chain ................................21 14. Additional setup screenshots .........................................................28 15. Revision History...........................................................................29 1. Introduction Google Voice is a free service
    [Show full text]
  • Amazfit Bip S User Manual Contents
    Amazfit Bip S User Manual Contents Watch Face Functions Navigation and Button Instructions ................................. 3 Functions Navigation .............................................................................................. 3 Physical Button Operations ................................................................................... 5 Wearing and Charging .................................................................................................... 6 Daily Wearing ............................................................................................................ 6 Wearing during Workouts ..................................................................................... 6 Charging ..................................................................................................................... 6 Use of Functions ................................................................................................................ 8 Device Pairing and Unpairing ............................................................................... 8 Watch Face ................................................................................................................. 9 Control Center .......................................................................................................... 9 Notifications ............................................................................................................. 12 Watch App Settings ..............................................................................................
    [Show full text]
  • Microsoft OCS Call Recording
    8/6/2009 Microsoft OCS Call Recording About Me ( Full Bio ) IMPROVE OPERATIONAL EFFICIENCIES An OSS Observer White Paper VoIP & Gadgets Blog: Comm issioned by IBM Tom Keating: CTO, VP, Founder BT Global Services achieves 100 TMC Labs; B.S. Computer Engineering, 14 yrs telecom percent availability w ith business experience, 28 yrs programming, service... tinkering with & breaking computers. Gadgets & VoIP are favorite topics on this blog Home Archives TMCnet blogs VoIP Forums About Me Contact Channels C ommunity Sites Photo Gallery Microsoft OCS Call Recording Search Last week, I wrote how Microsoft is making Search this blog: inroads in the enterprise with their Office Communications Server 2007 R2 platform Search and how they are looking to achieve five 9s of reliability. Well, one other critical feature needed for an enterprise phone system is Related Entries decent call recording . Unfortunately, there does not seem to be a lot of options for call Find Me Elsewhere recording on OCS 2007. One of the problems is that not all calls go through a PBX. Facebook Profile FriendFeed Profile For instance, you can use the Microsoft Google Reader Profile Communicator client to call a co-worker who is also using Communicator. The call is a LinkedIn Profile peer-to-peer SIP session that doesn't go Netflix Profile through a PBX, so the PBX can't leverage it's Twitter Profile call recording capabilities to record the call. So what are your options? Recent Activity Wednesday 1) You can go the "cheap" route and Tom Keating tweeted , download the FREE open-source Wireshark "Google Gods are Killing Me - packet sniffer program.
    [Show full text]