Tuesday, May 28, 2019

Instant Messenger Programs Essay -- Communication Computers Internet E

Analysis of Instant Messenger Programs From telegrams to telephones, to emails and faxes, community have had a strong desire to be connected to one another. The intrusion of the information age has only increased that desire - to the point that people are seeking a constant connection. The introduction of instant messenger programs has allowed people to be connected and communicate in real-time. Instant messaging not only provides transfer of text messages, but peer-to-peer file sharing as well. term file transfer provides the user with increased convenience, it also increases the odds of transferring viruses, worms, and other malware. This paper will discuss the major instant messenger programs AOL IM, .NET Messenger, ICQ, and Yahoo Messenger. In particular it will explore the threats and security risks involved in both personal and professional use of instant messenger programs. IntroductionAs the reach suggests, instant messaging, or IM, is the real-time delivery of a me ssage from one user to another. Communication between any computing stations can descend as long as the appropriate version of the program is installed. Users must also be concurrently running an IM client (program) as well as be on the same IM network 7. A conversation that occurs between two or more users is know as a session (or channel). A session can either be public, where any and all users can participate, or private, where users must be invited to participate in the session. Buddy lists, also known as contact lists, allow users to maintain communication with specific users of the same IM client and network.While each instant messaging program is unique, they all habituate similar client-server architecture to send and receive m... ...5 Gaudin, Sharon. Norton Antivirus Attacks Instant Messaging. www.instant-messaging.com. August 2002. 6 Grimes, Roger A. IM Security Primer. www.secadministrator.com. May 2002. 7 Hindocha, Neal. Instant Insecurity Secur ity Issues of Instant Messaging. www.securityfocus.com. January 2003. 8 Hindocha, Neal. Threats to Instant Messaging. Symantec Security Response. January 2003. 9 Hu, Jim. Worms shape Fertile Ground in IM. www.cnetnews.com. August 2001. 10 Shinder, Thomas. How to Block Dangerous Instant Messengers Using ISA Server. www.windowssecurity.com. July 2002. 11 Thorsberg, Frank. Is IM a Sieve for Corporate Secrets? www.pcworld.com July 2002. 12 Varnosi, Robert. The Problem with Instant Messaging Apps at Work. www.cnet.com. August 2002

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.