This document provides an overview of real time messaging technologies like instant messages, video calls, and group calling. It discusses basic instant messages, advanced features like video calling and group chats. It explains how instant messaging works by comparing it to models like email and Skype. The document provides guidance on using instant messaging safely, including using reputable providers and exercising caution when receiving attachments or sharing personal information. Overall, the document serves as an introduction to real-time communication technologies and offers tips for secure usage.
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
Become an E-mail ninja: get the latest E-mail productivity tips and tricks
On March 28, NCET and Darren McBride, founder and CEO of Sierra Computer Group, got down to brass tacks about your inbox and offered practical advice on how to more effectively manage email.
Email has become both a productivity tool and a giant time waster. Too many people don’t take advantage of automation to reduce their email workload. Darren shed some light on the following:
An overview of mail services and advantages/disadvantages of each.
Tips about how to reduce volume of newsletters and spam.
Ideas on sending secure email attachments (for documents like tax returns) for free.
An overview of how artificial intelligence can sort and sift your incoming email to save you time.
How to easily backup and archive your email
Identifying and avoiding Phishing attacks via email
Syncing email and calendars with mobile devices and how to deal with duplication
Come learn how to slay your electronic inbox and get organized once and for all!
Speed up your internet business with this powerful system. Discover a system that nobody has ever use before in the world. A system that can give you anything you want on the internet and also on a membership site without paying a penny to get it.
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
Become an E-mail ninja: get the latest E-mail productivity tips and tricks
On March 28, NCET and Darren McBride, founder and CEO of Sierra Computer Group, got down to brass tacks about your inbox and offered practical advice on how to more effectively manage email.
Email has become both a productivity tool and a giant time waster. Too many people don’t take advantage of automation to reduce their email workload. Darren shed some light on the following:
An overview of mail services and advantages/disadvantages of each.
Tips about how to reduce volume of newsletters and spam.
Ideas on sending secure email attachments (for documents like tax returns) for free.
An overview of how artificial intelligence can sort and sift your incoming email to save you time.
How to easily backup and archive your email
Identifying and avoiding Phishing attacks via email
Syncing email and calendars with mobile devices and how to deal with duplication
Come learn how to slay your electronic inbox and get organized once and for all!
Speed up your internet business with this powerful system. Discover a system that nobody has ever use before in the world. A system that can give you anything you want on the internet and also on a membership site without paying a penny to get it.
Email spoofing and phishing increased by 220% in 2021. With such high numbers, cyber-criminals are taking advantage of opportunities to spoof emails and phish for valuable information and credentials. As a result, the average cost of a data breach in 2021 was $4.24 million!
All About Twitter - Internet Librarian 2009Christa Porter
Part of "Twitter: Enabling Customer Conversations" - Pre conference at Internet Librarian 2009. Presented with Michael Sauers and David Lee King. October 25, 2009.
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerPacketBase, Inc.
On September 29, 2010, Avaya and Skype announced a strategic agreement to deliver innovative, real-time communications and collaboration solutions to businesses of all sizes. The multi-phase deal includes both go-to-market and an industry-first, joint technology integration that seeks to enable businesses to lower costs and expand how employees, customers, partners and suppliers communicate and collaborate with greater convenience and efficiency.
Email spoofing and phishing increased by 220% in 2021. With such high numbers, cyber-criminals are taking advantage of opportunities to spoof emails and phish for valuable information and credentials. As a result, the average cost of a data breach in 2021 was $4.24 million!
All About Twitter - Internet Librarian 2009Christa Porter
Part of "Twitter: Enabling Customer Conversations" - Pre conference at Internet Librarian 2009. Presented with Michael Sauers and David Lee King. October 25, 2009.
Avaya and Skype Connect PacketBase is an Avaya BusinessPartnerPacketBase, Inc.
On September 29, 2010, Avaya and Skype announced a strategic agreement to deliver innovative, real-time communications and collaboration solutions to businesses of all sizes. The multi-phase deal includes both go-to-market and an industry-first, joint technology integration that seeks to enable businesses to lower costs and expand how employees, customers, partners and suppliers communicate and collaborate with greater convenience and efficiency.
Computer Security Guide to Pc Security
“Your Info Guide to Beefing Up Your Personal Computer’s Safety From Malicious Threats
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Computer Security is very important
How to Protect Your PC from Malware, Ransomware, VirusHabFg
Your info guide to beefing up your personal computer’s safety from malicious threats! Inside this eBook, you will discover the topics about protecting your computer’s system, fighting spam, spyware & adware, phishing & identity theft, computer viruses… and anti-viruses, protection you can afford and so much more!
West Chester - Tech Training Session 11William Mann
Quarterly the Borough of West Chester staff gets together for technology training. The training is focused on both the professional and personal side of technology. This is the Fall 2013 training presentation.
This tutorial is related to Hacking.Key terms: Introduction to Hacking,
History of Hacking,
The Hacker attitude,
Basic Hacking skills,
Hacking Premeasured,
IP Address,
Finding IP Address,
IP Address dangers & Concerns,
Hacking Tutorial
Network Hacking,
General Hacking Methodology,
Port Scanning,
ICMP Scanning,
Security Threats,
Counter-attack strategies,
Host-detection techniques,
Host-detection ping,
Denial of Service attacks, DOS Attacks,
Threat from Sniffing and Key Logging,
Trojan Attacks,
IP Spoofing,
Buffer Overflows,
All other types of Attacks, SMURF attacks, Sniffers, Keylogger, trojans,
Hacking NETBIOS,
Internet application security,
Internet application hacking statistics, Web application hacking reasons,
General Hacking Methods,
Vulnerability,
Hacking techniques,
XPath Injection
For more details visit Tech-Blog: https://msatechnosoft.in/blog/tech-blogs/
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
3. Session 4
Real Time Messaging
Instant Messages
Free Phone Calls
Video Phone Calls
Group Calling
3
4. Introduction
tell you “Click X to do Y“
teach you step-by-step how to send
an email/Skype your son/etc
advise you on the best computer
etc…
4
Why Not?
Because nobody can remember that stuff
It will be different next week
Everyone’s needs are different
“I can’t be bothered with all this medical
stuff, show me how to do brain surgery”
These Sessions Will Not:
5. Introduction
Show you HOW to be comfortable with
new technologies
Show you WHY the new ways may be
advantageous for you
Help overcome the fear
Accept change
By
Explaining the jargon
Introducing the concepts
Getting you to think “Oh, this is like…”
Showing you can’t “break” a computer…
usually
These Sessions Will Try to:
5
6. What are basic Instant Messages?
• Real time i.e. you send it now,
your “target” sees it now.
• Like mobile phone Text - but
free and on a computer
• Short text messages… but often
there is no limit on message size
• Usually 1:1
• It can be a conversation
• Usually provide “Presence
Awareness”
• Both sides of the conversation
need to use the same protocol
7. What are advanced Instant Messages?
• You can also talk with your
“target” - usually for FREE
• With some IM systems you can
also see the “target” LIVE. It’s
a VideoPhone!
• Usually 1:1
• Sometimes you can send and
receive files i.e. photos,
documents
• Both sides of the conversation
need to use the same protocol
8. What are advanced Instant Messages?
• You can have a conversation with several people at the
same time - its a Conference Phone
• Both sides of the conversation need to use the same
protocol
11. Harry’s
Modem
Sally’s
Modem
How does Instant Message work?
ISP - Internet Service Provider
to:harry
It’s “Store and Forward”34.73.46.10
It’s “Client Server” oriented
IM Server
IM
Name
Server
IM
Session
Server
Relay
Server
Relay Server
Relay
Server
Relay
Server
Relay
Server
IM
Server
Relay Server
Relay Server
Relay Server
Relay Server
Relay Server
12. Harry’s
Modem
Sally’s
Modem
IM Directory
How does Skype work?
ISP - Internet Service Provider
to:harry
It’s “Store and Forward”
Sally (moonpie)
Harry (hunkie)
34.73.46.10
It’s “Peer-to-Peer” oriented
IM
Name
Server
IM
Session
Server
Relay
Server
Relay Server
Relay
Server
Relay
Server
Relay
Server
IM
Server
Relay Server
Relay Server
Relay Server
13. Domain Names
International Company for Assignment
of Network Names (ICANN) assigns the
addresses to Domain Names
• e.g.
• google.com
• gmail.com
• bbc.co.uk
• facebook.com
• Registered with ICANN
• ANYONE can have a Domain Name
(from £2 - £100000+ a year)
• Each Domain can have lots of Servers
• Each Server can have several Hosts
i.e. Apps that provide a service
8 Main St
Wing
UK
LE15 8SE
HQ
BBC
CO.UK
212.58.246.000
www.bbc.co.uk/iplayer
www.bbc.co.uk/sport
www.bbc.co.uk/weather
www.bbc.co.uk=212.58.246.129
news.bbc.co.uk=212.58.246.81
Snail Internet
www.bbc.co.uk/news/england
15. Domain Name Server
(DNS)
I never use the address for
anything, I use a name.
• Your computer goes to a
DNS server
• It keeps a list of names and
corresponding IP addresses
• It tells your computer what
IP address to use
16. • All devices have a unique
address
• like a serial number - the
Media Access Code (MAC).
• Usually found on the bottom
or back of the device
• Defined by manufacturer
• e.g. 7A:79:19:73:D2:05
Media Access Code (MAC)
17. The Internet has a special networking
language - the Internet Protocol
Anyone who wants to use the
Internet has to have an address -
the Internet Protocol (IP) address
• Google is 31.55.163.183
• The BBC is 212.58.246.104
• First part defined by the
Internet Corporation for
Assigned Names and Numbers
(ICANN) e.g. Google 31, BBC
212 ( for big companies).
• The rest is defined by the
requesting company
19. The Internet - a network of computers
So to put a server on the Internet you:
1. buy a Domain name from an ISP
• wingvillagehall.club
2. ISP sends details to ICANN
3. ICANN assigns an IP address
• e.g. wingvillagehall.club has address
65.39.140.84
4. ISP adds name/address pair to its DNS
server.
5. DNS entry is propagated around the
world to all other DNS servers
20. Instant Message Protocols
Its better if we both speak the
same “language”
AIM America On Line
Gtalk Google
ICQ mail.ru
Windows Live Messenger
Yahoo! Messenger
Jabber
Facebook Chat
Skype
21. Instant Message Apps
Client Apps
• installed on your computer
Skype
Google Hangout
AOL Instant Message (AIM)
Yahoo IM
…….
Web Apps
• Nothing installed on your computer
• messages STORED on a server
• lose computer, get another one and carry on
Google Hangout
AIM Express
ChatAB
22. Most IM systems are client-server
IM apps are often called
IM Clients - because the
client is used to connect
to a server
Just like eMail
Skype is Peer-to-Peer
23. What is Peer-to-Peer?
There is NO server! Each computer is
equal to every other computer.
Each computer has a list of the
computers DIRECTLY connected to it.
If the address is one of the links it uses
it. If not it just sends the message to
any one of the others.
24. Is Instant Message “safe”?
Used properly and with some
caution, YES
Used without some thought and
care, NO
25. Rules!
1.Use a reputable IM provider
They filter out most bad stuff, SPAM, before you see it
e.g. xxx@gmail.com
yyy@exchange.com
zzz@zoho.com
2.Do NOT use a cheap unknown IM provider
e.g. xxx@cheapemail.ru
3.NEVER open an attachment from someone you don't know
4.NEVER give your password to anyone on line or telephone
5.NEVER give credit card details unless it is httpS://xxxxx in
the address bar and then ONLY if you recognize the domain
Why? Because the bad guys will attack well-known domains
because more people are using them. They are unlikely to know
your private domain.
26. More Rules!
1.Always install an anti-virus app on
Windows PCs
Set it up to scan at least once a week
AVG
Avast
2.Always install an anti-malware app
Set it up to scan at least once a week
Malwarebytes
3.Open source apps are FREE and safer
Open source programs are written by
enthusiastic nerds who are volunteers and
passionate. There will be hundreds of
nerds checking the app for anything evil.
27. I don’t want ANYONE to
see my messages
Too bad!
Always assume that government agencies MAY
be reading.
For most normal, law-abiding citizens you CAN
keep your messages away from prying eyes
Skype encrypts all messages
but for telephone calls, only to receiving
exchange server
Many other IM protocols now support “Off The
Record” conversations (OTR)
WWII Enigma messages can all be decoded in
under a minute with a PC