CHAT

0

 2.5 CHAT

The word chat in English language means - casual conversation. On Internet it means the same, except that you need to use text and your keyboard skills are tested. Earlier chatting was possible only between two people, now you can enjoy chatting with a number of people at a time. Now, you can use Voice Chat – it requires microphone and speaker; and Video Chat – it requires microphone, speakers and web camera. You can chat even using your mobile if it had that facility.

Chat is normally done in a chat room. Some of the common chat services are yahoo messenger (yahoo), Gtalk (Google ), Rediff Bol. We will just show you an example using gtalk. However, you may use any other chat software. Remember you need to download and install chat software of your choice. After installing the chat software, you may run it to open the chat window so that you can start chatting. Figure 2.16 shows a typical chat window. To chat, you just type in the text and press the Enter key.


Most chat services also provide different forums, communities, discussion groups. These forums may be useful, for example, if you have any query, you just post it in forum. You may get the answer or you may get some related news or related information posted by a community. There are many such technical communities where you can learn latest in your field. Tutorials, interview, walk-in alerts, and online discussion with experts are available through these services. You may register with some such community.

What can you do with Chat Software?

  • Most of the chat software support textual, voice and video chatting.
  • You can create your electronic avatars using these software.
  • While you may be chatting with group, yet may be able to send private messages to individuals.
  • You can add graphics while chatting, even file transfer is possible.
There are several types of chat room variations online today. They include Java, Flash, MIRC and many other. 

Java Chat rooms: The most common and popular chat scripts are based on java which is object oriented language. Java is freely available and comes with virtually every computer sold today. To use a Java chat room you must have Java enabled in your browser. 

Java chat rooms load quickly and are reasonably fast to use. However, they require you to keep the new release of Java. You can get them from www.java.com 

Flash Chat rooms 

Flash chat is an upgraded version of chat rooms that is becoming more and more popular. Flash chat rooms use Adobe/Macromedia Flash Player client that are integrated into a website. Flash Chat rooms require that the Macromedia Flash Player from Adobe be installed on your computer. You can get the flash player for free from www.adobe.com .

Internet Relay Chat (IRC) 

IRC is multi-user chat network where people around the world can chat and talk in channels or in private. To use IRC you must install IRC client on your computer. Using this client, you can connect to an IRC server, which is connected to other IRC networks. An IRC may have thousands of people you can chat with. IRC is being used for a long time.

MIRC  

MIRC is a small computer program for chat. It has many chat channels. You can download the mirc chat from the mirc homepage http://www.mirc.com.

Some basic mannerisms while chatting: The term chatiquette describes basic rules of online communication. To avoid misunderstandings and to simplify the communication between users in a chat, these conventions or guidelines have been created. For example, one such convention is that it is considered rude to write only in UPPER CASE as it is considered analogous to shouting. You should not try to chat with unknown people. You should never use abusive or obsessive words. 

2.6 SECURITY THREATS ON INTERNET

The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that you may face because of being an Internet users. When you use internet you are faced with three basic threat situations:

Confidentiality: No unauthorized person should be able to read or copy information that s/he is not supposed to read.
Integrity: No unauthorized person should be able to modify information.
Availability: No unauthorized person should be able to erase information or make it inaccessible.

The other threats posed on the Internet are due to Computer Viruses and identity information thefts.

To make sure the above security situations the following methods may be followed by you:

Authentication and authorization mostly using username and password are used by most Internet security systems. Therefore, your username and password are very important and should be such that they cannot be broken easily. In addition, you must give the username and password only on a HTTP Secure website. 

You can protect your computer against Computer Viruses and Malware (identity theft programs) through use of antivirus software, which quarantines or removes malicious software programs. So use good antivirus software on your machine that scans email and IM attachments. Maintain a backup of your critical data and programs. Keep deleting cookies from your computer from time to time.

You can use firewalls to block websites having unwanted contents.

The recent threat includes, a rise in threats to confidential information, exploitation of emerging Web browser vulnerabilities, and predictions for future attacks associated with blogs and social networking sites. So keep your browser up-to-date and do not give your personal information on blogs and social networking sites.

Other recent threats relate to wireless networking. Limit your wireless router range to the smallest convenient distance. Also try to maximize the security of wireless network by keeping a series of passwords. 

Suggestion 

The basic security MUST use a good firewall, strong antivirus software, and download files from safe sites only.

Check Your Progress 3 👈

1. What facility of email makes it appealing than postal mail?

…………………………………………………………………………………… …………………………………………………………………………………… 

2. How chat is different than email?
…………………………………………………………………………………… ……………………………………………………………………………………

3. What are security threats? How can you prevent it?
…………………………………………………………………………………… …………………………………………………………………………………… 
Activity 
1. Create and use email account in yahoo. 
2. List the most important security threats on Internet  
Tags

Post a Comment

0Comments
Post a Comment (0)