Do You Text Chat (IM) Online?

IM (Instant Messaging) - man, we thought we had it made in the shade when we stumbled over this unique way to communicate! Outside of talking person-to-person on the phone, IM was the next best thing. Texting talk was endless and cost was nonexistent. Well, those were the good old days of yore ? you know, those days of glorious innocence.

Just as we were getting oh so comfortable, happily IMing away to each other, then came the cloak-and-dagger entrance of the treacherous "IM villains". With their ominous arrival, the party abruptly ended. It seemed like overnight, our instant messaging (IM) turned into instant mercenaries, and the carnage was strewn all over the Internet.

First, it was one by one, then the numbers increased and starting growing exponentially, as friends began receiving, and inadvertently sending, viruses, worms, and Trojan horses. Then it went from bad to worse, as report after report surfaced describing the grisly results of innocent victims losing their identity because these villains had accessed their personal and confidential information. Truly this was the darkest of times for all IMer friends ? regardless of the IM service we were texting on.

How could this have happened? And more importantly, how can we protect ourselves?

Well, I found out that these villainous hackers had accessed a nifty little program originally designed to benefit us, and twisted it to intercept our conversations traveling across the internet. They now have a profitable tool to use that intercepts our data packets and sends us a virus, and duplicates it by sending the same ugly bug to everyone on our Buddy List.

Once a hacker has gained access to our Buddy List, they trick our friends into thinking WE, (a trusted source), are sending them a file to download. Then when our friends innocently download the file, these villains can then access their computers as well, and use the personal and confidential information gathered to line their own pockets. How it affected businesses whose employees used IM to communicate?well, I will just let your imagination take over from there?because the hackers let theirs do the same.

A lot of us were thinking that we had nothing to worry about because we had anti-virus software on our computers, and that provided the protection we needed. Wrong!

Anti-virus software is not designed to protect our data packets traveling across the internet. There are still no anti-virus applications that directly monitor IM traffic. This is due to the difficulty in finding IM traffic as it is often embedded inside http packets. And what is worse yet is that Forrester's, Root stated that "In 2005 and 2006, we expect IM to get hit with some serious attacks?"

But, don't despair! I have discovered a cure!

In fact, I discovered the best of both worlds. What I have found is a computer phone (in "techy" terms known as VoIP ? voice over internet protocol) that is optimally secure. One of the many features of the computer phone is the IM that is built into it. Thus, the IM instant messages are sent over optimally secure lines rather than openly public lines on the Internet -- AND I can also actually talk to friends from my computer phone any time I want. The "good old days of yore" are back with even more !!!

Here's what a computer phone is all about.

The computer phone was the creation resulting from taking the convenience and features of the telephone and combining it with the power of the Internet. Pretty ingenious I think! Although most computers have a built in microphone, some do not. Mine was one of those computers that did not. So, I ran down to a local store and bought one for $5. Then, much to my delight, I found out that it easily plugged into the back of my computer.

Here is what is really incredible about a computer phone. I can talk, IM, make 3-way calls, transfer a call to my cell phone if I am running out the door, and much, much more.

Actually, I have become so accustomed to the convenience of the features on my computer phone, that it actually becomes frustrating when I cannot IM a friend I am talking to on their cell phone or telephone. You see, often times, I find great sites to share with my friends, so I have to slowly spell out the location over the phone and repeat the letters so they get the right site, then wait for them to repeat it back to me, rather than quickly IMing them the site and letting them click on it right then and there.

One final word of wisdom -- over 90% of all computer phone (VoIP) services out there do not operate on secure lines. The one I am using is optimally secure because they have their own proprietary high end encryption codec (code) with patented technology that is hosted in a professional facility. You just can't get any better than that!

Want to try a computer phone out for yourself?

You can download the software and try it out for 7 days absolutely free and without any contract, obligations, or hassles. Here's the place to visit http://www.free-pc-phone.com Oh, and yes, you will love this?.if you use a dial up connection to the internet, these computer phones work too, in addition to satellite, cable, and wireless connections.

Dee Scrip is a well-known and respected published author of numerous articles on VoIP, VoIP security, and other VoIP related issues. http://www.free-pc-phone.com

Elk Grove (east OF 53) limousine shuttle .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A humanoid robot named CUE6 has got game. The basketball-playing robot, produced by Toyota, claimed a Guinness World Record for longest shot.
With electronic signatures becoming more common, Kurt the CyberGuy explains how to produce your digital John Hancock for online documents.
Kurt the CyberGuy walks through steps he recommends immediately taking after getting new electronics — like phones or TVs — as gifts this holiday season.
When speaking becomes physically challenging, you can preserve your unique voice using Apple's Personal Voice and Live Speech technology.
Google Maps is deleting location history soon. Tech expert Kurt “CyberGuy" Knutsson shows you how to back it up before it's gone.
iOS 18.2 lets AirTag owners securely share item locations with trusted individuals. Tech expert Kurt “CyberGuy" Knutsson examines the powerful new feature.
The FBI is warning timeshare owners of a telemarketing scam tied to a Mexican drug cartel. Tech expert Kurt “CyberGuy" Knutsson provides steps to stay safe.
Protecting your home network includes securing your router, just like your phone or laptop. Kurt “CyberGuy" Knutsson reveals six ways to protect your Wi-Fi router from hackers.
Kurt “CyberGuy" Knutsson: ConnectOnCall breach leaks sensitive data of 910,000+ patients.
Rising elder scams: How to recognize them and protect yourself and your loved ones. Tech expert Kurt “CyberGuy" Knutsson helps you outsmart the scammers.
There are common habits and oversights that could leave your financial information vulnerable to cybercriminals, according to Kurt the CyberGuy.
Counting calories just got easier with The Drop, the world's first automated nutrition tracker using advanced computer vision and artificial intelligence.
A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.

Why VoIP is not Going to Fail

VoIP is an almost constant topic in our daily dose... Read More

VoIP Phone Home?

The movie Extra Terrestrial (ET) coined the phrase "phone home"... Read More

VoIP: Finally Worth a Look

Dear Internet Friends, Hundreds of thousands of consumers collectively save... Read More

VoIP and 911 Warning

Be leery of your VoIP phone system in case of... Read More

The Lowdown on VoIP

It seems like technology is headed for a massive telephone... Read More

Things You Should Consider When Selecting a VoIP Provider

The following are very important factors to consider when you... Read More

Introduction to VoIP

What is VoIP?First things first, VoIP stands for Voice over... Read More

VoIP - What is the Problem?

In the beginning, when the Internet Protocol was first designed,... Read More

The Calling Card Alternative

For a few years now, the calling cards business is... Read More

Will VoIP be a Mass Market Product?

A common thinking among "Marketing people " is that for... Read More

Use your Computer to make Cheap Long-Distance Telephone Calls

What is 'VoIP'?Simply put, VoIP refers to the carriage of... Read More

Text To Speech - Its Simple

Looking for a natural voice speech engine? Curious about what... Read More

How to Never Pay a Hotel Phone Bill Again

The protocol is increasingly being adopted as the standard means... Read More

VoIP is Less Taxing than Traditional Telephone Service

When it comes to VoIP Broadband Telephone service, there are... Read More

What Is VoIP and How Does It Work

IntroductionThe way we make phone calls is changing. In fact... Read More

What Is VOIP?

Confused about VOIP? Join the crowd. It's not as difficult... Read More

Is VoIP the ?Next Big Thing? in Telecommunications?

VoIP or Voice Over Internet Protocol has been simmering for... Read More

Voice over Internet Protocal VoIP for Business

VoIP consists of 2 major technologies....Making Calls Over the Internet--ResidentialThis... Read More

Take Advantage of Internet Phone Calls (VOIP)

Voice Over IP (VOIP) is a relatively new technology. Voice... Read More

Needless HIGH RISK Exposure For Business Using Computer Phones

The Facts? Computer phones (VoIP) offer the most optimal means... Read More

Consumer Review on CallWave Call Alert Service

Missing phone calls while you are online?Are you thinking of... Read More

The Single Most Important Thing to Know About Computer Phones (VoIP)

Over 90% of computer phones (VoIP) are not secure because... Read More

Voice over IP Offers Your Business an Inexpensive Alternative To Toll Free Numbers

New businesses can now let their customers contact them for... Read More

A Look at Internet Voice Technology (VoIP) for Residential

Today's TechnologyOver the years, the technology has made remarkable progress.... Read More

Faxing over VoIP

As far as VoIP has come in Voice telephone calls,... Read More

Dekalb transportation to O'Hare ..