Wednesday, 8 February 2012

The Basic Set-Up for Teleconference Security!!!

The basic set-up for teleconference security (and with no "bragging" from Tandberg Teleconference either): Ch. 1 V (Ch. 1 V Ch. 2). Signal on Ch. 1 take channel 1, signal on either channel 1 or channel 2, take channel 1 or 2. First is obvious, and 2nd may mean switching if not stable! You have only channel 2, you take channel 2. This means also that you add as many lines as you think you need and apply the same prinicple to these! Teleconference should continue to be a fine option for work with the UN as well! Cheers!!! :-D

I don't think it's possible to claim patent over signal treatment of this logical kind either... Just so you know (and where to go next)!

The mere event of teleconference, given the right hardware, usually only a screen, computer, keyborad, mouse and web-cam, can be set up by peer-to-peer clients, with known IPs to one another over https, possibly, sending signals so and so and go by hardware settings.
Teleconference is not really a problem at all, as we know it from Skype and Live Messenger/Pidgin! Please, also, remember that https as such is mere addition of programming entering the type of transfer mode or "browser mode" if you like, that you find with the https notification in your address line!!!

Note: First written to Facebook just moments ago!
Note2: Added some text, 9. Feb., 2012, about 16:00 CET.


  1. You know, with the peer-to-peer client, the address bar may not be visible and you may not get to know that you're in https mode unless you're pro-active toward the issue!

  2. There is also a continued warning over server set-ups! Servers may not "server" as it is, because rodents sit there fixate on your private life! If you read: server, please add: suspicion! Though, services are generally served by servers, you are encouraged to consider what these aervers are there for in the first place and please take care! Cheers!