Three Ways Instant Messaging Compromises Internet Security.

By: Thomas Hunter

Instant messaging has grown in popularity in this fast paced world. If you are corresponding with someone via emails, there are certain steps you need to take. You will click on the e-mail, read it, reply to it, and send it back. Then you wait for the e-mail you just sent to be opened and you have no way of knowing if the person you are emailing is still on line or at their computer. Instant messaging cuts out many steps and provides instant communication with any of your contacts that are on-line.

Instant messaging programs allow you to have a list of key people that you want to interact with. Called a buddy or contact list, you will know when your buddy is on-line and can type messages back and forth as in real time. There is also the added benefit now of being connected to your buddy by web cam. This is a wonderful invention when it comes to children and grandchildren far from home. I love to see my granddaughters who live on the West Coast. It allows them to see my face and keep me fresh in their memory.

Instant messaging offers many advantages including chatting between friends on line, and creating your own chat room with family and friends. You can share web links to your favorite sites, play sounds to your friends and share files and photos. Many IM users use the computer instead of long-distance phone calls to talk to family and friends. One advantage to Instant Messaging that I like is that I can chat with more than one friend or family member at a time. The trick is to make sure you don’t post a message in the wrong window!

Instant messaging, with many other innovations on the Internet can sometimes carry a security risk. Without security measures, some users could potentially expose sensitive data and information to outsiders. Virus protection programs don’t scan these instant messaging files and that causes a real threat.

There are three basic ways that Instant Messaging can compromise your Internet security. One concern is that because you are unable to verify whom you are talking to, you could be giving out information to a competitor or someone intent on harming your or your computer. The second is, worms and viruses can be sent through Instant Messages, and Stealth programs can gain access to your computer and all your information. Third, it is easy to eavesdrop on IM conversations. If you have the computer knowledge, and many do, they can listen in on your chat conversations and learn important information that you would prefer to be kept private.

There are security choices when it comes to protecting your instant messages from being pirated. Some large and small companies are banning all Instant Messaging from company computers. They can install closed IM programs that will allow instant messaging as a useful tool within the company but keep out the threats from outside. Some companies are storing all instant messages sent and are able to pull them up and view them. If an employee is using an open IM to chat with their wife then the company is at risk for viruses and hacking. Software developers have created special software programs to make IM possible between company computers but no outside messages can be sent or received.

Monitoring of all company instant messages is widely used to combat the use of Instant Messaging for personal use and wasting company time. This allows small companies as well as the large ones to monitor what their employees are doing with their time. Companies are using archived instant messages to discourage sexual harassment and other workplace behavior, which is unacceptable.

Instant messaging is a wonderful tool but can expose your computer to viruses or worms. If you receive an instant message from someone you aren’t familiar with, it’s a good idea to not click on any links that are provided. The message may look like it comes from a friend but could harbor a virus or worm by downloading an applet that can install Trojan programs and install Spyware and adware. One popular link allows you to play a game, which pretends to catch Bin Laden. Computer operators who clicked on the game downloaded a program that snatched all of their IM contacts and sent them the same e-mail.

Protect your chats by being aware of the dangers. Don’t’ click on hyperlinks that you don’t recognize. Check your antiviral news page for current threats to instant messaging programs. As with all computer programs and innovations, common sense will help to protect your computer’s security.


Massive Profits are being made from Online Auctions. Learn how to harness the Money Making Power of eBay from a Real Powerseller. Visit our daily blog, "Auction Profit Tips", get a FREE gift and learn dozens of eBay money making tips, tricks and hints. bzh45qr
Article Source: http://AuctionProfitTips.NET

© 2006 Article Directory - All Rights Reserved.