Internet Relay Chat - A Basic Introduction

What is IRC?

IRC is Internet Relay Chat. It is a group of networked server computers that let clients (or users) connect and passes their message among the networked servers in almost real time. In other words, it is a big chat server, you join a group (channel) and you talk in an open forum type environment or one on one.

What IRC Networks are out there?

There are about fifty really mainstream IRC networks (groups of servers) you can connect to. The most common I have found is typically, 'EF-NET', 'Under-Net', and 'DAL-Net'.

What is a Channel?

A channel is the name for the 'group' you are joining, or the 'forum' in which you want to talk. On IRC channels are denoted as #ChannelName. For instance, say you are interested in MP3 music, then you may want to go to #MP3.

What is a nickname?

Your nickname is how others will see you online. On most IRC works your name can be 9 characters long. However on some networks it can be much longer. The syntax for changing names is listed under the basic commands below.

What are the @ + things I see in all the channels?

This is the structure of the channel. Someone that starts a channel will have a '@' sign. That denotes that he is the channel operator. In essence they 'own' the channel. The channel operator can make other people operators also, as he sees fit. The '+' sign in front of somenames is to denote 'voiced' mode. The channel operator has the option of setting the entire channel up as a 'moderated' channel, which means he can select the people 'allowed' to speak. He does this by 'voicing' them with a '+' sign.

How do I get on IRC?

To get on IRC you will need to get a client program. I personally suggest using 'mIRC', if you are in the windows environment. I have used the program for many years faithfully. It is a shareware program that doesn't disable after a given time period, however it does have a nag screen when you first load it, if you don't register it.

What are the basic commands once I am on?

/join #channel - this will make you enter a channel /part #channel - this will make you exit a channel you are in /nick newname - this will change your current screen name

A note to parents, about IRC.

IRC is a wonderful forum for idea exchange, and a fun place to chat and learn. However you must keep in mind that you don't know who is on the other end. Just because someone says they are 16, doesn't mean they aren't 45. Keep an eye on your children and make sure they know not to give out any personal information on IRC.

Safe IRC'ing everyone!

Ken Dennis http://kendennis-rss.homeip.net/

express cleaning service Arlington Heights ..
In The News:

The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Pros and Cons of Using FREE Software in Your Business

It???s easy to understand why you might be drawn to... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security ??" these days we???re... Read More

These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

1. What determines the software price? Is it Per Seat... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

You Can Write Microsoft Office Program in About 60 Minutes

Microsoft Office program is a programming tool called Visual Basic... Read More

10 Things You Can Do With Photoshop CS2 That You Couldnt Do Before Now

Is Photoshop CS2 worth the upgrade? You bet it is!... Read More

Microsoft Great Plains Implementation & Customization: Computer Parts Retailer Example

Microsoft Great Plains fits to majority of horizontals and retail... Read More

SQL scripts for Project Accounting: Microsoft Great Plains series ? overview for developer

Microsoft Business Solutions Great Plains has Project Accounting module where... Read More

Internet Faxing Service Review

The Internet is reshaping every form of communications medium, and... Read More

Four Easy Ways To Prevent Spyware

How would you like to prevent spyware and adware from... Read More

Implementing Microsoft CRM: setup and configuration ? notes for IT specialist

Microsoft Business Solutions CRM is web-based CRM application, deploying all... Read More

Microsoft Great Plains Partner Selection: Overview

Microsoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

Internet Security Threats: Who Can Read Your Email?

Before being able to choose a secure Internet communication system,... Read More

Chinese Input - Step by Step Instruction on How to Input Chinese Characters in English Windows XP

Enabling Chinese input is quick and easy, there are only... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More

Partitioning, Formatting and Reinstalling in Windows 98

Formatting and reinstalling windows 98 is very easy if you... Read More

Microsoft Great Plains Integration with Legacy Systems ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Groupware: Avoid the Ad Hoc Shuffle

GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More

Microsoft Great Plains Upgrade ? Things to Consider and FAQ

If you have Microsoft Great Plains and support it for... Read More

Microsoft Great Plains Middle East - Arabic Language Support

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

tidy up service Arlington Heights ..