SlideShare a Scribd company logo
 IRC is short for Internet Relay Chat
 Internet relay chat was developed in
August 1988, by Jarkko Oikarinen
 IRC enables users to connect to a server using
a software program or web service and
communicate with each other live.
 Internet Relay Chat (IRC) is a system
for chatting that involves a set of rules
and conventions
and client/server software.
 Internet Relay Chat (IRC) is an application
layer protocol that facilitates transfer of
messages in the form of text.
 An IRC client is the vehicle that connects you to
the global network of IRC servers.
 IRC is organized into numerous independent
networks, all with different audiences,
geographical reach, and management. Besides
the major networks, there are also many
smaller networks that serve either a niche
audience or a small geographical region.
In its simplest form, it is a
medium in which people can
interact with one another textually
in real-time. The interaction can
take place in channels (chat rooms)
with a variety of topics or even be
peer to peer. Any individual with
an IRC client can join a server,
participate in a particular channel
or even create their own.
 There is no single company controlling IRC,
therefore, anyone can set up their own server and
use it however they like.
 Meeting new people: persons are able to meet and
communicate with new people all over the world on
IRC.
 IRC can also be used for other purposes, especially if
specialized client add-ons or fully autonomous bot-
clients are used, such as file-sharing, botnet control,
or gaming where messages contain commands
instead of just chatter.
 IRC's channel paradigm is very flexible and
robust: allows for real-time discussion with up to
hundreds of people at once.
 IRC has the concept of access levels and complex
channel modes. For example, users may be
banned from a channel based on their IP address,
or a channel may be secret or private and require
an invitation or a secret code to enter.
 Instant access to a large number of "lurking" and
active people.
 It may be difficult to organize and
control discussions because the
conversations often veer off topic, exactly
at the whim of the participants
 Anyone can access an Internet relay chat
and may send malicious files to your
computer.
 All passwords and everything you say
can be sniffed by anyone between you
and the server.
 The chat client line length and buffer
limits mean that it is impossible to
develop an argument, and therefore all
"discussion" is necessarily limited to
chat-sized bites of words.
 Hyperbole, jokes, and sarcasm not only
may be misunderstood.
MR
RYON
WHYTE

More Related Content

What's hot

How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
FabMinds
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
Rita Gokani
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
Dr. C.V. Suresh Babu
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Internet basic
Internet basicInternet basic
Internet basic
argusacademy
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
Latif Hyder Wadho
 
How internet works
How internet worksHow internet works
How internet works
ANurag Kumar
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
Shail Nakum
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
Muhammad Arshad
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
aniston0108
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Gurjot Singh
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
Adarsh Kumar Yadav
 

What's hot (20)

How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Web Security
Web SecurityWeb Security
Web Security
 
Internet basic
Internet basicInternet basic
Internet basic
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
How internet works
How internet worksHow internet works
How internet works
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
 

Viewers also liked

Introduction to IRC
Introduction to IRCIntroduction to IRC
Introduction to IRC
gwmm
 
IRC presentation
IRC presentationIRC presentation
IRC presentation
katsok
 
Input And Output devices of computer
Input And Output devices of computer Input And Output devices of computer
Input And Output devices of computer
Sayak Ghosh
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
bjslides
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices...
simmi khera
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output DevicesZobia Aziz
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
100614065martins
 
Video conferencing
Video conferencingVideo conferencing
Video Conferencing Ppt
Video Conferencing PptVideo Conferencing Ppt
Video Conferencing PptJAGJITSINGH25
 
WWW and IRC
WWW and IRC WWW and IRC
WWW and IRC
Sofia Salsabila
 
Definisi Internet relay chat dan World Wide Web
Definisi Internet relay chat dan World Wide WebDefinisi Internet relay chat dan World Wide Web
Definisi Internet relay chat dan World Wide Web
Ninda Nur Mahdiyyah
 
History of-web-design
History of-web-designHistory of-web-design
History of-web-design
Web Designers Nepal
 
Web design history
Web design historyWeb design history
Web design history
R. Sosa
 
Chats e redes sociais
Chats e redes sociais Chats e redes sociais
Chats e redes sociais
eborges
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Vikrant Arya
 
2 trans atlantic slave trade + blackbirding 2014
2 trans atlantic slave trade + blackbirding 20142 trans atlantic slave trade + blackbirding 2014
2 trans atlantic slave trade + blackbirding 2014
daviddunlop1
 
CSEC History SBA
CSEC History SBACSEC History SBA
CSEC History SBA
Ronaldo Degazon
 

Viewers also liked (20)

Introduction to IRC
Introduction to IRCIntroduction to IRC
Introduction to IRC
 
IRC presentation
IRC presentationIRC presentation
IRC presentation
 
Input And Output devices of computer
Input And Output devices of computer Input And Output devices of computer
Input And Output devices of computer
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices...
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Video conferencing
Video conferencingVideo conferencing
Video conferencing
 
Video Conferencing Ppt
Video Conferencing PptVideo Conferencing Ppt
Video Conferencing Ppt
 
ICQ
ICQICQ
ICQ
 
WWW and IRC
WWW and IRC WWW and IRC
WWW and IRC
 
Definisi Internet relay chat dan World Wide Web
Definisi Internet relay chat dan World Wide WebDefinisi Internet relay chat dan World Wide Web
Definisi Internet relay chat dan World Wide Web
 
History of-web-design
History of-web-designHistory of-web-design
History of-web-design
 
Web design history
Web design historyWeb design history
Web design history
 
Chat ppt
Chat pptChat ppt
Chat ppt
 
Chats e redes sociais
Chats e redes sociais Chats e redes sociais
Chats e redes sociais
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 
2 trans atlantic slave trade + blackbirding 2014
2 trans atlantic slave trade + blackbirding 20142 trans atlantic slave trade + blackbirding 2014
2 trans atlantic slave trade + blackbirding 2014
 
African Slave Trade
African Slave TradeAfrican Slave Trade
African Slave Trade
 
CSEC History SBA
CSEC History SBACSEC History SBA
CSEC History SBA
 

Similar to Internet relay chat (irc)

Tutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the InternetTutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the Internetdpd
 
Report on online chatting
Report on online chattingReport on online chatting
Report on online chattingAmandeep Kaur
 
protocols.pptx
protocols.pptxprotocols.pptx
protocols.pptx
BrawlGaming
 
Internet chat
Internet chatInternet chat
Internet chat
Raja Kumar Ranjan
 
SiocLog: Providing IRC Discussion Logs as Linked Data
SiocLog: Providing IRC Discussion Logs as Linked DataSiocLog: Providing IRC Discussion Logs as Linked Data
SiocLog: Providing IRC Discussion Logs as Linked Data
John Breslin
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
Intro to Web3 and Polygon.pdf
Intro to Web3 and Polygon.pdfIntro to Web3 and Polygon.pdf
Intro to Web3 and Polygon.pdf
TinaBregovi
 
13134001.ppt
13134001.ppt13134001.ppt
13134001.ppt
JulietDianeBallonBot
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)IMRAN KHAN
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
ancymary1996
 
Computer and application
Computer and applicationComputer and application
Computer and application
GHASPHUS
 
Computer and application
Computer and applicationComputer and application
Computer and application
GHASPHUS
 
Internet
InternetInternet
Internet
mohitrajpanday1
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internetdpd
 
Presentation 1
Presentation 1Presentation 1
Presentation 1aisadhsa
 
The internet final
The internet finalThe internet final
The internet final
Rex Springfields Aguirre
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
MelvinShaji12
 
13. internet services
13. internet services13. internet services
13. internet services
Zambales National High School
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
kulachihansraj
 

Similar to Internet relay chat (irc) (20)

Tutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the InternetTutorial 06 - Real-Time Communication on the Internet
Tutorial 06 - Real-Time Communication on the Internet
 
Report on online chatting
Report on online chattingReport on online chatting
Report on online chatting
 
protocols.pptx
protocols.pptxprotocols.pptx
protocols.pptx
 
Internet chat
Internet chatInternet chat
Internet chat
 
SiocLog: Providing IRC Discussion Logs as Linked Data
SiocLog: Providing IRC Discussion Logs as Linked DataSiocLog: Providing IRC Discussion Logs as Linked Data
SiocLog: Providing IRC Discussion Logs as Linked Data
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Intro to Web3 and Polygon.pdf
Intro to Web3 and Polygon.pdfIntro to Web3 and Polygon.pdf
Intro to Web3 and Polygon.pdf
 
13134001.ppt
13134001.ppt13134001.ppt
13134001.ppt
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
 
Computer and application
Computer and applicationComputer and application
Computer and application
 
Computer and application
Computer and applicationComputer and application
Computer and application
 
225 ch1 (1)
225 ch1 (1)225 ch1 (1)
225 ch1 (1)
 
Internet
InternetInternet
Internet
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
The internet final
The internet finalThe internet final
The internet final
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
13. internet services
13. internet services13. internet services
13. internet services
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 

More from Ryon Whyte

Public and private nuisance
Public and private nuisancePublic and private nuisance
Public and private nuisance
Ryon Whyte
 
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating pointErrors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
Ryon Whyte
 
Misinterpretation
MisinterpretationMisinterpretation
Misinterpretation
Ryon Whyte
 
Caribbean history SBA
Caribbean history SBACaribbean history SBA
Caribbean history SBA
Ryon Whyte
 
Types of storage
Types of storageTypes of storage
Types of storage
Ryon Whyte
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
Ryon Whyte
 

More from Ryon Whyte (6)

Public and private nuisance
Public and private nuisancePublic and private nuisance
Public and private nuisance
 
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating pointErrors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
Errors in Computing- Runtime, Semantics, Syntax and Fixed and Floating point
 
Misinterpretation
MisinterpretationMisinterpretation
Misinterpretation
 
Caribbean history SBA
Caribbean history SBACaribbean history SBA
Caribbean history SBA
 
Types of storage
Types of storageTypes of storage
Types of storage
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Internet relay chat (irc)

  • 1.
  • 2.  IRC is short for Internet Relay Chat  Internet relay chat was developed in August 1988, by Jarkko Oikarinen  IRC enables users to connect to a server using a software program or web service and communicate with each other live.
  • 3.  Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions and client/server software.  Internet Relay Chat (IRC) is an application layer protocol that facilitates transfer of messages in the form of text.
  • 4.  An IRC client is the vehicle that connects you to the global network of IRC servers.
  • 5.  IRC is organized into numerous independent networks, all with different audiences, geographical reach, and management. Besides the major networks, there are also many smaller networks that serve either a niche audience or a small geographical region.
  • 6. In its simplest form, it is a medium in which people can interact with one another textually in real-time. The interaction can take place in channels (chat rooms) with a variety of topics or even be peer to peer. Any individual with an IRC client can join a server, participate in a particular channel or even create their own.
  • 7.  There is no single company controlling IRC, therefore, anyone can set up their own server and use it however they like.  Meeting new people: persons are able to meet and communicate with new people all over the world on IRC.  IRC can also be used for other purposes, especially if specialized client add-ons or fully autonomous bot- clients are used, such as file-sharing, botnet control, or gaming where messages contain commands instead of just chatter.
  • 8.  IRC's channel paradigm is very flexible and robust: allows for real-time discussion with up to hundreds of people at once.  IRC has the concept of access levels and complex channel modes. For example, users may be banned from a channel based on their IP address, or a channel may be secret or private and require an invitation or a secret code to enter.  Instant access to a large number of "lurking" and active people.
  • 9.  It may be difficult to organize and control discussions because the conversations often veer off topic, exactly at the whim of the participants  Anyone can access an Internet relay chat and may send malicious files to your computer.
  • 10.  All passwords and everything you say can be sniffed by anyone between you and the server.  The chat client line length and buffer limits mean that it is impossible to develop an argument, and therefore all "discussion" is necessarily limited to chat-sized bites of words.
  • 11.  Hyperbole, jokes, and sarcasm not only may be misunderstood.