Have I Met You Before? Using Cross-Media
|
|
- Clara Lucas
- 5 years ago
- Views:
Transcription
1 Have I Met You Before? Using CrossMedia Kumiko Ono and Henning Schulzrinne Columbia University
2 Outline 1. Introduction Results of our quick survey Legitimate calls from those with weak social ties Legitimate calls with no Caller IDs 2. Proposal: Labeling calls using crossmedia relations 3. Conclusions
3 Introduction Survey of Incoming Calls Cell phones Landline phones Fewer unsolicited calls to cell phones 6% 52% 48% Effect of national regulations 94% Legitimate calls Unsolicited calls Data: Calls to students in our lab in Feb (246 calls to cell, 136 calls to landlines) 3
4 Introduction Survey of Incoming Calls Cell phones Landline phones 1729 % could not be labeled legitimate before answering. 13% 4% 6% 78% 52% 18% 29% Known caller IDs Unknown caller IDs from known persons No caller IDs from known persons Unsolicited calls Data: Calls to students in our lab in Feb (246 calls to cell, 136 calls to landlines) w/o caller IDs: international calls w/unknown caller IDs: from persons/companies having prior contact via web or Crossmedia relations 4
5 Introduction Typical SPIT Filter Receive a request for realtime communication (audio/video/text) SPIT Filtering at server/user agent NG Set unavailable at Caller ID Caller ID Authentication OK Reject Yes On a black list? No Reject False positives Challenge: How can we reduce false positives? A voic box No On a white list? Yes Accept 5
6 Introduction Black List and White List Black list: to reject requests Block list Known SPIT caller addresses at a reputation service White list: to accept requests Buddy list Addresses of outgoing requests in call history Directory service, e.g., LDAP server Limits to strong ties 6
7 Introduction Problem and Approaches Problem How to label incoming requests Legitimate calls from those with weak social ties Legitimate calls with no Caller IDs Approaches Focus on prior contact when delivering callee s contact address through different media Enhance white list beyond caller IDs Crossmedia relations 7
8 Introduction AntiSPIT Work A collection of solutions is needed. I: Places burdens on callers DoNotCall registry service Turing tests to detect a prerecorded message II: Labels incoming requests at callees or service providers 8 Blacklists/Whitelists based on Caller ID: how to learn/ share/expand lists Suspicious traffic I&II: Prior permissions from callee to caller in SIP Using HTTP responses to publish caller IDs for future calls
9 Proposal: Using Crossmedia Relations Insert data User (Callee) Web Browser Insert data HTTPS Web Server Potential Callers Filter conditions Crossmedia relations 1: Information offered by potential callers Contact addresses (plain) Crossmedia relations 2: Weaklysecret information offered by callee Outgoing MessageIDs Contact addresses (hashed) Tokens in customized callee s addresses 9
10 Proposal CrossMedia Relations Offered by Callers Callee Web client HTTP request Potential caller Web server e.g., HTTP response CorrespondenceURI: tel: Potential caller client e.g., Callee client Message ContentType: text/directory; profile= vcard Forms: Caller s contact addresses in plain text or hashed Hashed are only for labeling. Better for callers privacy to avoid publishing routable addresses Containers An HTTP header in response Vcard in message body 10
11 Proposal CrossMedia Relations Offered by Callees Callee Web client HTTP response Potential caller Web server e.g., HTTP POST columbia.edu&phone2=tel: Potential caller client e.g., Callee client Message requesting realtime comm. Message to accept MessageID:<004301c9b17f257f6a 11 Weaksecret as a proof of prior contact Subaddressing in callee s contact address in HTTP POST form A field in signup form in message body Similar to subaddressing in addresses or extensions of phone numbers MessageIDs of outgoing s
12 Proposal Calls w/crossmedia Relations User Web Browser Web Server Potential Callers Caller e.g., INVITE From: INVITE To: INVITE References:004301c9b17f257f6a rel= Filter Conditions CrossMedia Relations including CallIDs Query Inbound SIP Proxy Server w/filter User (Callee) 12
13 Proposal Proposed SPIT Filter Receive a request of realtime communication (audio/video/text) Spam Filtering at server/user agent Set unavailable at Caller ID NG Sender ID Authentication OK Reject Yes On a black list? No Reject To has a valid Token? No Reference has a valid Message IDs? No On a white list? (plain/hashed) Yes Yes Yes Accept 13
14 Conclusions Summary Goal: Reduce false positive filtering by enabling callees to lable incoming requests from weak social ties Approach: Use crossmedia relations as a proof of prior contact Next Step Caller ID in plain text or hashed format, customized callee s ID, and MessageID Evaluation of usability and effectiveness using prototype 14
Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation
Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation Kumiko Ono and Henning Schulzrinne {kumiko, hgs}@cs.columbia.edu Outline 1. Introduction
More informationIP Reputation Exchange security research
IP Reputation Exchange e-mail security research Prof. Dr. Norbert Pohlmann Institute for Internet Security if(is) University of Applied Sciences Gelsenkirchen http://www.internet-sicherheit.de Content
More informationACCURATE STUDY GUIDES, HIGH PASSING RATE! Question & Answer. Dump Step. provides update free of charge in one year!
DUMP STEP Question & Answer ACCURATE STUDY GUIDES, HIGH PASSING RATE! Dump Step provides update free of charge in one year! http://www.dumpstep.com Exam : 650-156 Title : ISPES Cisco IronPort Security
More informationThe Internet Real-Time Laboratory
IRT 1 The Internet Real-Time Laboratory Henning Schulzrinne Dept. of Computer Science Internet Real-Time Laboratory (IRT) Columbia University New York, New York schulzrinne@cs.columbia.edu November, 2000
More informationUSING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM
Second International Conference on Computer Research and Development USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM Ismail Ahmedy Department of Computer System and Communication Faculty of Computer Science
More informationBLF Presence. Configure BLF Presence
This chapter provides information about the Busy Lamp Field (BLF) Presence feature which allows a user to monitor the real-time status of another user at a directory number or SIP URI. Configure, page
More informationApplication Notes for Configuring Windstream SIP Trunking with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Windstream SIP Trunking with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationSIP for Mobile Applications
1 SIP for Mobile Applications Henning Schulzrinne Dept. of Computer Science Columbia University New York, New York schulzrinne@cs.columbia.edu VON Europe Spring 2000 (Stockholm) June 20, 2000 SIP and the
More informationApplication Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes
More informationUnsolicited Communication / SPIT / multimedia-spam
Unsolicited Communication / SPIT / multimedia-spam overview of this topic in different SDOs Thilo Ewald NGN Group, NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page
More informationFigure 4-1. A Scenario of SIP outgoing calls in Vigor 3300V
4. SIP Call, Proxy, Outbound Proxy and Domain This chapter shows how SIP Proxy, Outbound Proxy and Domain work in a SIP outgoing call. This chapter is divided into the following sections, Section 4.1:
More informationSMTP Scanner Creation
SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing
More informationMicrosoft Installing, Configuring, and Administering Microsoft Exchange 2003 Server Implementing &Managing MS Exchange Server 2003
Microsoft 70-284 Microsoft 70-284 Installing, Configuring, and Administering Microsoft Exchange 2003 Server Implementing &Managing MS Exchange Server 2003 Practice Test Version 2.5 QUESTION NO: 1 Microsoft
More informationFor example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam.
About Anti-Spam NOTE: Anti-Spam is a separate, licensed feature that provides a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing firewall.
More informationDomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.
DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name
More informationAppliance Installation Guide
Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationAdvanced Services for Internet Telephony
Thesis Proposal: Advanced Services for Internet Telephony 1 Advanced Services for Internet Telephony Thesis Proposal Department of Computer Science Columbia University Thesis Proposal: Advanced Services
More informationPPreferredID = "P-Preferred-Identity" HCOLON PPreferredID-value. *(COMMA PPreferredID-value)
This guide provides some enhancements of calling and connected line identification presentation supported on Yealink IP phones. Yealink IP phones support to derive calling and connected line identification
More informationCall Center Administration
Hosted VoIP Phone System Blue Platform Admin Portal Guide for Call Center Administration 1 Table of Contents 1 About this Guide... 3 2 Accessing the Hosted VoIP Phone System Administration Portal... 4
More informationInternet Telephony: Advanced Services. Overview
1 Internet Telephony: Advanced Services Henning Schulzrinne Dept. of Computer Science Columbia University New York, New York schulzrinne@cs.columbia.edu Overview SIP servers and CO architecture authentication
More informationWatchGuard XCS and Outlook Web Access 2013
WatchGuard XCS and Outlook Web Access 2013 The Secure WebMail proxy provides a highly secure mechanism for accessing Microsoft OWA (Outlook Web Access). OWA uses a very similar interface to Outlook and
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationApplication Notes for Phonect SIP Trunk Service and Avaya IP Office 7.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Phonect SIP Trunk Service and Avaya IP Office 7.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring Session
More informationApplication Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
More informationIPX-Series VoIP PBX September 11, Extension User Guide
IPX-Series VoIP PBX 30.9.0.5 September 11, 2018 Extension User Guide Version: 30.8.0.14 Updated: September 12, 2018 Contents Extension User Guide...3 Extension User Portal...4 Log in Extension User Portal...4
More informationCourse Outline: Course : Core Solutions Microsoft SharePoint Server 2013
Course Outline: Course 20339-1: Core Solutions Microsoft SharePoint Server 2013 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide
More informationCisco TelePresence Basic Cisco VCS configuration
Cisco TelePresence Basic Cisco VCS configuration Deployment Guide D14651.02 September 2011 Cisco VCS Control with Cisco VCS Expressway X7.0 Contents Document revision history 5 Introduction 6 Out of scope
More informationAloaha FindMail.
Aloaha FindMail.eMail Aloaha FindMail.eMail is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally emails
More informationInformation About SIP Compliance with RFC 3261
APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information
More informationarxiv: v1 [cs.cr] 10 Jun 2008
SPAM OVER INTERNET TELEPHONY AND HOW TO DEAL WITH IT Dr. Andreas U. Schmidt 1, Nicolai Kuntze 1, Rachid El Khayari 2 arxiv:0806.1610v1 [cs.cr] 10 Jun 2008 1 Fraunhofer-Insitute for Secure Information Technology
More informationSetting Up a Mitel SX-2000 Digital PIMG Integration with Cisco Unity Connection
Up a Mitel SX-2000 Digital PIMG Integration with Cisco Unity Connection Up a Mitel SX-2000 Digital PIMG Integration, page 1 Up a Mitel SX-2000 Digital PIMG Integration Task List for Mitel SX-2000 PIMG
More informationApplication User Configuration
CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing
More informationZultys Mobile Communicator for iphone 4.0
December 14 Zultys Mobile Communicator for iphone 4.0 Author: Zultys Technical Support Department This document covers basic use of the Zultys Mobile Communicator for iphone application. The Zultys Mobile
More informationThe search being performed may take a significant time so a forking proxy must send a 100 Trying response.
SIP Response Codes Article Number: 178 Rating: Unrated Last Updated: Wed, Nov 15, 2017 at 2:31 PM SIP Response Codes 1xx Provisional Responses 100 Trying Extended The search being performed may take a
More informationZultys Mobile Communicator for Android 7.0
January 17 Zultys Mobile Communicator for Android 7.0 Author: Zultys Technical Support Department This document covers basic use of the Zultys Mobile Communicator for Android application. The Zultys Mobile
More informationGrandstream Networks, Inc. UCM6xxx Series Follow Me Guide
Grandstream Networks, Inc. UCM6xxx Series Table of Content INTRODUCTION... 3 FOLLOW ME CONFIGURATION... 4 Follow Me Settings... 6 Follow Me Options... 6 FOLLOW ME FLOW EXAMPLE... 8 Table of Figures Figure
More informationSender Reputation Filtering
This chapter contains the following sections: Overview of, on page 1 SenderBase Reputation Service, on page 1 Editing Score Thresholds for a Listener, on page 4 Entering Low SBRS Scores in the Message
More informationDMP 128 Plus C V DMP 128 Plus C V AT
DMP 128 Plus C V DMP 128 Plus C V AT Interactive Intelligence Configuration Guide REVISION: 1.0.1 DATE: MARCH 7 TH 2018 Revision Log Date Version Notes Feb 9 th 2018 1.0 First Release: Applies to Firmware
More informationPresence Scalability Architectures 1
Scalability Architectures 1 Vishal K. Singh and Henning Schulzrinne Department of Computer Science, Columbia University {vs2140, hgs}@cs.columbia.edu Abstract: We apply the two-stage reliable and scalable
More informationENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE Final Project Presentation Spring 2001 Implement Session Initiation Protocol (SIP) User Agent Prototype Thomas Pang (ktpang@sfu.ca) Peter Lee (mclee@sfu.ca)
More informationManaging your PBX- Administrator
Managing your PBX- Administrator ACCESSING YOUR PBX ACCOUNT Navigate to https://voip.ancero.com/ and log in to the Ancero Utility VoIP portal account. If you would like your web browser to keep you logged
More informationHow to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
More informationPBX Data Sheet. Version 2.0. Product categories
PBX Data Sheet Version 2.0 Product categories pbxnsip offers products in three categories: The embedded versions are usually sold to OEM partners, who include the pbxnsip software with other products like
More informationCME with LPCOR Configuration Example
CME with LPCOR Configuration Example Document ID: 117880 Contributed by Diya Mathew, Cisco TAC Engineer. Jul 11, 2014 Contents Introduction Prerequisites Requirements Components Used Background Information
More informationCalling/Connected Line Identification Presentation on Yealink IP Phones
Calling/Connected Line Identification Presentation on Yealink IP Phones This guide provides some enhancements of calling and connected line identification presentation supported on Yealink IP phones. Yealink
More informationConcurrent Distributed Authentication Model (CDAM)
Concurrent Distributed Authentication Model (CDAM) Aladdin T. Dandis Information Security Compliance Officer Jordan egovernment Program / MoICT 1 Agenda Introduction CDAM Ver. 1.0 Pros and Cons CDAM Ver.
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationWHC Toolbar. Application User guide. Wholesale Hosted Communications (WHC 3.0)
WHC Toolbar Application User guide Wholesale Hosted Communications (WHC 3.0) July 2017 Confidentiality All information in this document is provided in confidence as per the terms and conditions of Wholesale
More informationIntegration Configuration
Configure LDAP with the Configuration Tool, page 1 Configure Voicemail Settings with the Configuration Tool, page 4 Configure Phone Control and Presence with the Configuration Tool, page 5 Credential Synchronization,
More informationSetting Up an Avaya Definity ProLogix Digital PIMG Integration with Cisco Unity Connection
CHAPTER 4 Setting Up an Avaya Definity ProLogix Digital PIMG Integration with Cisco Unity Connection For detailed instructions for setting up an Avaya Definity ProLogix digital PIMG integration with Cisco
More informationC L O U D V O I C E B U S I N E S S P O R T A L
C L O U D V O I C E B U S I N E S S P O R T A L A P P L I C A T I O N U S E R G U I DE T O O L B A R V E R S I O N 2. 0 Page 1 of 29 Toolbar Application User guide Contents Overview... 4 Hardware & Software
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationCisco Unified Communications Manager configuration for integration with IM and Presence Service
Cisco Unified Communications Manager configuration for integration with IM and Presence Service User and Device Configuration on Cisco Unified Communications Manager before Integration Task List, page
More informationUnsolicited Communication in the NGN
Unsolicited Communication in the NGN Overview of Status and Activities in different SDOs Thilo Ewald Research Scientist NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page
More informationAuthentiCall: Efficient Identity and Content Authentication for
AuthentiCall: Efficient Identity and Content Authentication for Brad Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, and Tom Shrimpton North Carolina State University University of Florida
More informationConfiguring SIP Registration Proxy on Cisco UBE
The Support for SIP Registration Proxy on Cisco UBE feature provides support for sending outbound registrations from Cisco Unified Border Element (UBE) based on incoming registrations. This feature enables
More informationRequest for Comments: 3578 Category: Standards Track dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003
Network Working Group Request for Comments: 3578 Category: Standards Track G. Camarillo Ericsson A. B. Roach dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003 Mapping of Integrated Services Digital
More informationSetting Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection
up Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection, page 1 Up an Alcatel 4400 Digital PIMG Integration with Cisco
More informationQualys SAML & Microsoft Active Directory Federation Services Integration
Qualys SAML & Microsoft Active Directory Federation Services Integration Microsoft Active Directory Federation Services (ADFS) is currently supported for authentication. The Qualys ADFS integration must
More informationSetting up Alcatel 4400 Digital PIMG Integration
up Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection Up an Alcatel 4400 Digital PIMG Integration with Cisco Unity Connection, on page 1 Up an Alcatel 4400 Digital PIMG Integration with
More informationMultimedia networking: outline
Multimedia networking: outline 9.1 multimedia networking applications 9.2 streaming stored video 9.3 voice-over-ip 9.4 protocols for real-time conversational applications: SIP Skip RTP, RTCP 9.5 network
More informationINTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0
8x8 Interface Specification Version 2.0 Table of Contents Introduction....3 Feature Set....3 SIP Interface....3 Supported Standards....3 Supported SIP methods....4 Additional Supported SIP Headers...4
More informationSIP Proxy Deployment Guide. SIP Server 8.1.1
SIP Proxy Deployment Guide SIP Server 8.1.1 5/4/2018 Table of Contents SIP Proxy 8.1 Deployment Guide 3 SIP Proxy Architecture and Deployment 4 Supported Features 7 Prerequisites 9 Deploying SIP Proxy
More informationBlack Hat Europe 2009
Black Hat Europe 2009 Mobile Security Lab Hijacking Mobile Data Connections 1 Provisioning & WAP primer Forging Messages Demo: Remote provisioning Provisioning: Process and Issues Attack scenario and exploiting
More informationNew Tools and Tactics from Technology Service. Wayne Gilroy Ross Eaton Tom Janicki Ed Knudsen
New Tools and Tactics from Technology Service Wayne Gilroy Ross Eaton Tom Janicki Ed Knudsen UW System Policy Driven Security Changes UW System Administrative Policy 1030, Information Security: Authentication
More informationCall Screening will allow you to block incoming anonymous calls or calls from a specific number.
02/27/2014 The following SIP Portal functions are in support of both Native SIP and PRI-SIP options. The SIP Portal will give you access to set up Call Forwarding, Call Blocking, and Call Screening. These
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationSophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017
Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product
More informationRobocall and fake caller-id detection
Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More information3. Reports are typically displayed in columns with the ability to sort the data using the up/down arrows on that particular column.
Reports Guide 1. Any of the reports generated below can be exported as one of the following file types: CSV: Comma Separated Value; this is the most common spreadsheet file type and can be opened in almost
More informationApplication Notes for TelStrat Engage Record Version 3.3 with Avaya Business Communication Manger Release 6.0 VoIP Recording Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for TelStrat Engage Record Version 3.3 with Avaya Business Communication Manger Release 6.0 VoIP Recording Issue 1.0 Abstract These Application
More informationHow do I setup Outlook Express to get my s?
How do I setup Outlook Express to get my e-mails? Before you set up a mail account in Outlook Espress you must first have your POP3 mailbox details provided to you by your Account Manager, this will be
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationApplication Notes for Configuring the XO Communications SIP Trunking Service with Avaya IP Office 10.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring the XO Communications SIP Trunking Service with Avaya IP Office 10.0 Issue 1.0 Abstract These Application Notes describe the
More informationCisco Unified IP Phone User Guide for Cisco Unified Communications Manager 8.5 (SCCP and SIP)
Cisco Unified IP Phone User Guide for Cisco Unified Communications Manager 8.5 (SCCP and SIP) For Cisco Unified IP Phone 8941 and 8945 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San
More informationTime + space Using location information. Privacy issues
Location n-based Services Henning Schulzrinne Columbia University Overview Time + space Getting location information Using location information Privacy issues Getting location Universal inform mation anywhere
More informationCompliance with RFC 3261
APPENDIX A Compliance with RFC 3261 This appendix describes how the Cisco Unified IP Phone 7960G and 7940G complies with the IETF definition of SIP as described in RFC 3261. It contains compliance information
More informationCOURSE OUTLINE MOC : PLANNING AND ADMINISTERING SHAREPOINT 2016
COURSE OUTLINE MOC 20339-1: PLANNING AND ADMINISTERING SHAREPOINT 2016 Module 1: Introducing SharePoint 2016 This module describes the structure and capabilities of a SharePoint environment, and the major
More information20/20 Insight and WebResponse Whitelist & Settings Information
Overview: 20/20 Insight is comprised of a Desktop component and a web-based component: WebResponse. Surveys are created in the desktop component and then uploaded to the web-based component. The web-based
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationCisco IP Phone 8800 Series Multiplatform Phones Release Notes for Firmware Release 11.0(1)
Cisco IP Phone 8800 Series Multiplatform Phones Release Notes for Firmware Release 11.0(1) First Published: 2017-06-29 These release notes support the Cisco IP Phone 8800 Series Multiplatform Phones running
More informationApplication Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.0 Abstract These Application
More informationComprehensive Spam Quarantine Setup Guide on Security Appliance (ESA) and Security Management Appliance (SMA)
Comprehensive Spam Quarantine Setup Guide on Email Security Appliance (ESA) and Security Management Appliance (SMA) Contents Introduction Procedure Configure Local Spam Quarantine on the ESA Enable Quarantine
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationprovides several new features and enhancements, and resolves several issues reported by WatchGuard customers.
WatchGuard XCS v9.2 Update 5 Release Notes WatchGuard XCS Build 130322 Revision Date March 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v9.2 Update 5. This update
More informationHP0-Y13. ProCurve Network Management. Download Full Version :
HP HP0-Y13 ProCurve Network Management Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-y13 Answer: B, D QUESTION: 115 Which protocol does the Ping Sweep phase of PCM discovery use
More information1.1. Agreement means this document together with the Ignite General Terms and Conditions.
IGNITE SECUREMAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of this product
More informationdraft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:
More informationCollaborate App for Android Smartphones
Collaborate App for Android Smartphones The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on the go. The app comes in 3 versions: Collaborate - Mobile Collaborate
More informationZultys Mobile Communicator for iphone
October 11 Zultys Mobile Communicator for iphone Author: Zultys Technical Support Department This document covers basic use of your Zultys Mobile Communicator for iphone application. The Zultys Mobile
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationStep 2 - Deploy Advanced Security for Exchange Server
Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service
More informationShoreTel 14.2 (without SBC)
ShoreTel 14.2 (without SBC) Table of Contents 1 Executive Summary... 3 2 Registration Method... 5 3 XO SIP Service Packages Supported... 5 4 Software and Hardware Equipment Requirements for Testing...
More informationTrendMicro Hosted Security. Best Practice Guide
TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationGenesys Application Note. AudioCodes SIP Phones With Genesys SIP Server. Document version 1.7
Genesys Application Note AudioCodes SIP Phones With Genesys SIP Server Document version 1.7 The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without
More informationFive9 Plus Adapter for Oracle Service Cloud
Cloud Contact Center Software Five9 Plus Adapter for Oracle Service Cloud Administrator s Guide April 2018 This guide describes how to configure the integration between Five9 and the Oracle Service Cloud
More informationZultys Mobile Communicator for iphone 8.0
July 18 Zultys Mobile Communicator for iphone 8.0 Author: Zultys Technical Support Department This document covers basic use of the Zultys Mobile Communicator for iphone application. The Zultys Mobile
More informationConverged Load Balancer Functional Test Specification. Author(s): Andreas Nyberg. Contributor(s): Joel Binnquist. Version 0.2
Converged Load Balancer Functional Test Specification Please send comments to andreas.xx.nyberg@ericsson.com Author(s): Andreas Nyberg Contributor(s): Joel Binnquist Version 0.2 Date: Oct 5 th 2007 Table
More information