StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

MIrc (Internet Relay Chat) client - Research Proposal Example

Cite this document
Summary
In other words, internet has played a valuable role in bringing individuals, families, as well as, businesses closer to each other regardless of their…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
MIrc (Internet Relay Chat) client
Read Text Preview

Extract of sample "MIrc (Internet Relay Chat) client"

Download file to see previous pages

In specific, this paper will discuss different features and aspects of one of the most popular internet relay chat clients, mIRC. An internet relay chat client was developed especially for Microsoft Windows by Khaled Mardam-Bey in the year 1995, (mIRC, 2008) which has been successful in establishing and proving its versatility and popularity by different features including real-time chat, file transfers, group discussions through channels, buddy lists, and a number of other features that will be discussed in this paper.

According to sources, mIRC is used by more than twenty million users in different parts of the globe, and is considered one of the top ten internet applications. Interestingly, letter ‘m’ in mIRC is still unknown despite of its popularity and success, whereas, IRC stands for internet relay chat in mIRC. (Miller, pp. 221) According to the creator of mIRC, a number of basic features required for an IRC client were lacking in WinIRC that is considered the first IRC client created for Microsoft Windows.

Thus, he felt a need for creating mIRC that received enormous appreciation from its competitors, as well as, users around the globe, even after introduction of a number of interactive real-time chat clients on the internet. One of the major causes of mIRC’s popularity and success is its inexpensive price, as it costs only $20.00 per mIRC application. (mIRC, 2008) In addition, it comes with a 30-day evaluation period that allows a user to interact and benefit from its various and all the features; whereas, a number of internet chat applications disable some functions during their evaluation period.

Interestingly, a user may use the application and benefit from it even after the evaluation period, which is considered another major cause of its popularity and success. According to studies, dominant scripting language of mIRC has played a vital role in the success of mIRC, as it allows the creation of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MIrc (Internet Relay Chat) client Research Proposal”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1550229-mirc-internet-relay-chat-client
(MIrc (Internet Relay Chat) Client Research Proposal)
https://studentshare.org/miscellaneous/1550229-mirc-internet-relay-chat-client.
“MIrc (Internet Relay Chat) Client Research Proposal”, n.d. https://studentshare.org/miscellaneous/1550229-mirc-internet-relay-chat-client.
  • Cited: 0 times

CHECK THESE SAMPLES OF MIrc (Internet Relay Chat) client

Denial of Service Issues and Solutions

The victim server responds to the request with spoofed IP address and waits for ACK from the client side.... In the figure, Bob is the authentic user of the system and he sends messages using the insecure internet to the server.... Types and Generation of DoS Attacks Generally, there are three major classifications of DoS attacks depending on the victims targeted by attackers—users, hosts or networks though there are several types of DoS attack prevalent on internet....
19 Pages (4750 words) Dissertation

Use of BOTNET in Server Service Attacks

Moreover, Trojan is operational by initiating an internet relay chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008).... Likewise, these group of compromised computers will broadcast spam, relay unwanted emails, viruses or excessive request against any service.... Likewise, these group of compromised computers will broadcast spam, relay unwanted emails, viruses or excessive request against any service associated with a specific network or server....
3 Pages (750 words) Essay

Email Tracking And News Posting Tracking

Such websites have chat conversations, which lure children in to immoral conversations that lead to child abuse.... chat rooms have been made to facilitate chatting and communicating globally (Smith 2004).... Email tracking and news posting are ordinary internet applications that work with text commands.... Email tracking and news posting are ordinary internet applications that work with text commands.... Child pornography is an ex ample of internet related crime because nude figures are exposed on websites, and when children come across them, they become misguided....
3 Pages (750 words) Essay

Internet Chat System

hellip; The client-side of the system using the TCP/IP application relies on the java.... After communications are complete with the client, the server must close the streams and then close the Socket instance.... provide real-time instant access to clients, the client application is installed or embedded on a web page for easy access as java applet.... This paper ''Internet chat System'' tells that This dissertation presents the designing of Internet chat System using the Java object-oriented programming language....
11 Pages (2750 words) Essay

Forensics Based On Evidence Gathered With Peep Attacks

Botnets have gained a significant presence on the internet as a remote control means for malicious purposes.... The Peep attack is a variant application of a Botnet.... This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation....
15 Pages (3750 words) Essay

Firewall Security Measures

This paper deals with the security measures in information technology.... Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall security measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... … The author of the paper touches upon the security means within the information technology sphere....
13 Pages (3250 words) Essay

The Development of Virtual Communities

[Renninger & Schumar, 2005] internet has become a common name in households of today and imperatively its uses have increased drastically.... With the addition of newer innovations like internet 2 and Abilene in the same field the competition to grasp the ‘cash cow' state in business markets, technically speaking, has risen beyond any preset levels.... Technology has had its say within the related contexts as internet has made its mark over a period of time and the results are ostensible in front of one and all....
11 Pages (2750 words) Essay

What Are Bonnets and How They Work

nbsp;Bonnet is an assortment of conceded internet computers, which are remotely controlled by hackers with ill and illicit objectives.... Over the recent past, due to the growth in technologies, expanding use, and lack of common control, the internet has become prone to attacks.... The growing popularity of the internet in financial dealings, social networking, and firm's dependence has made it a threat target.... Today, cybercrime has expanded since hackers have become more skillful at evading identification; they are using cryptography and putting their servers in dark or unidentified areas of the internet to evade detection (Sophos 2014, p....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us