2.5 CHAT
The word chat in English language means - casual conversation. On Internet it means
the same, except that you need to use text and your keyboard skills are tested. Earlier
chatting was possible only between two people, now you can enjoy chatting with a
number of people at a time. Now, you can use Voice Chat – it requires microphone
and speaker; and Video Chat – it requires microphone, speakers and web camera. You
can chat even using your mobile if it had that facility.
Chat is normally done in a chat room. Some of the common chat services are yahoo
messenger (yahoo), Gtalk (Google ), Rediff Bol. We will just show you an example
using gtalk. However, you may use any other chat software. Remember you need to
download and install chat software of your choice. After installing the chat software,
you may run it to open the chat window so that you can start chatting. Figure 2.16
shows a typical chat window. To chat, you just type in the text and press the Enter
key.
Most chat services also provide different forums, communities, discussion groups. These forums may be useful, for example, if you have any query, you just post it in forum. You may get the answer or you may get some related news or related information posted by a community. There are many such technical communities where you can learn latest in your field. Tutorials, interview, walk-in alerts, and online discussion with experts are available through these services. You may register with some such community.
What can you do with Chat Software?
- Most of the chat software support textual, voice and video chatting.
- You can create your electronic avatars using these software.
- While you may be chatting with group, yet may be able to send private messages to individuals.
- You can add graphics while chatting, even file transfer is possible.
There are several types of chat room variations online today. They include Java,
Flash, MIRC and many other.
Java Chat rooms: The most common and popular chat scripts are based on java
which is object oriented language. Java is freely available and comes with virtually
every computer sold today. To use a Java chat room you must have Java enabled in
your browser.
Java chat rooms load quickly and are reasonably fast to use. However, they require
you to keep the new release of Java. You can get them from www.java.com
Flash Chat rooms
Flash chat is an upgraded version of chat rooms that is becoming more and more
popular. Flash chat rooms use Adobe/Macromedia Flash Player client that are
integrated into a website. Flash Chat rooms require that the Macromedia Flash Player
from Adobe be installed on your computer. You can get the flash player for free
from www.adobe.com .
Internet Relay Chat (IRC)
IRC is multi-user chat network where people around the world can chat and talk in
channels or in private. To use IRC you must install IRC client on your computer.
Using this client, you can connect to an IRC server, which is connected to other IRC
networks. An IRC may have thousands of people you can chat with. IRC is being used
for a long time.
MIRC
MIRC is a small computer program for chat. It has many chat channels. You
can download the mirc chat from the mirc homepage http://www.mirc.com.
Some basic mannerisms while chatting: The term chatiquette describes basic rules
of online communication. To avoid misunderstandings and to simplify the
communication between users in a chat, these conventions or guidelines have been
created. For example, one such convention is that it is considered rude to write only in
UPPER CASE as it is considered analogous to shouting. You should not try to chat
with unknown people. You should never use abusive or obsessive words.
2.6 SECURITY THREATS ON INTERNET
The Internet has many advantages; however, it also opens up security threat. In this
section we just want to highlight some of the threats that you may face because of
being an Internet users. When you use internet you are faced with three basic threat
situations:
Confidentiality: No unauthorized person should be able to read or copy information that s/he is not supposed to read.
Integrity: No unauthorized person should be able to modify information.
Availability: No unauthorized person should be able to erase information or make it inaccessible.
The other threats posed on the Internet are due to Computer Viruses and identity
information thefts.
To make sure the above security situations the following methods may be followed by
you:
Authentication and authorization mostly using username and password are used by
most Internet security systems. Therefore, your username and password are very
important and should be such that they cannot be broken easily. In addition, you must
give the username and password only on a HTTP Secure website.
You can protect your computer against Computer Viruses and Malware (identity theft
programs) through use of antivirus software, which quarantines or removes malicious
software programs. So use good antivirus software on your machine that scans email
and IM attachments. Maintain a backup of your critical data and programs. Keep
deleting cookies from your computer from time to time.
You can use firewalls to block websites having unwanted contents.
The recent threat includes, a rise in threats to confidential information, exploitation of
emerging Web browser vulnerabilities, and predictions for future attacks associated
with blogs and social networking sites. So keep your browser up-to-date and do not
give your personal information on blogs and social networking sites.
Other recent threats relate to wireless networking. Limit your wireless router range to
the smallest convenient distance. Also try to maximize the security of wireless
network by keeping a series of passwords.
Suggestion
The basic security MUST use a good firewall, strong antivirus software, and
download files from safe sites only.
Check Your Progress 3 👈
1. What facility of email makes it appealing than postal mail?
……………………………………………………………………………………
……………………………………………………………………………………
2. How chat is different than email?
……………………………………………………………………………………
……………………………………………………………………………………
3. What are security threats? How can you prevent it?
……………………………………………………………………………………
……………………………………………………………………………………
Activity
1. Create and use email account in yahoo.
2. List the most important security threats on Internet
0 Comments