How This Book Is Organized

You can read this book from cover to cover if you like, but each hack stands on its own, so feel free to browse and jump to the different sections that interest you most. If there's a prerequisite that you need to know about, a cross-reference will guide you to the right hack.

The book is divided into seven chapters, organized by subject:

Chapter 1, Broadband VoIP Services

In this chapter, you'll be introduced to some Internet-based VoIP phone service providers who can help you replace your traditional phone line with a cost-saving, feature-rich VoIP line.

Chapter 2, Desktop Telephony

Since VoIP is rooted in software, it has some wonderful uses on your desktop PC or Mac. In this chapter, you'll learn how to customize and maximize productivity-enhancing telephony applications.

Chapter 3, Skype and Skyping

Skype, the ubiquitous desktop voice-calling application, is one of the most hackable desktop telephony tools, and therefore is worthy of an entire chapter of hacks.

Chapter 4, Asterisk

Just as VoIP enables desktop telephony, it also enables enterprise telephony. In this chapter, you'll learn how to install, configure, and hack Asterisk, an open source PBX.

Chapter 5, Telephony Hardware Hacks

VoIP is rooted in software, but it is used with lots of different kinds of hardwareeverything from next-generation IP phones to old-school rotary phones. This chapter shows you how to add these devices to your VoIP setupand how to customize them.

Chapter 6, Navigate the VoIP Network

Voice over IP is carried over the network using packets, just like traditional data. With the advice in this chapter, you can monitor VoIP and troubleshoot it using traditional admin tools.

Chapter 7, Hard-Core Voice

By the time you reach this chapter, you will have advanced to the hallowed ground that's held by a very exclusive crowd: the community of hard-core voice hackers.

Conventions Used in This Book

The following is a list of the typographical conventions used in this book:


Used to indicate URLs, filenames, filename extensions, and directory/folder names. For example, a path in the filesystem will appear as /Developer/Applications.

Constant width

Used to show code examples, the contents of files, console output, as well as the names of variables, commands, and other code excerpts.

Constant width bold

Used to show user input in code and to highlight portions of code, typically new additions to old code.

Constant width italic

Used in code examples and tables to show sample text to be replaced with your own values.

Gray type

Used to indicate a cross-reference within the text.

You should pay special attention to notes set apart from the text with the following icons:

This is a tip, suggestion, or general note. It contains useful supplementary information about the topic at hand.

This is a warning or note of caution, often indicating that your money or your privacy might be at risk.

The thermometer icons, found next to each hack, indicate the relative complexity of the hack:

beginner moderate expert

VoIP Hacks
VoIP Hacks: Tips & Tools for Internet Telephony
ISBN: 0596101333
EAN: 2147483647
Year: 2005
Pages: 156

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: