Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Careers & Jobs » Work From Home » Article
 

Do You Text Chat (IM) Online?




By Dee Scrip

By Dee Scrip © All rights reserved.

IM (Instant Messaging) - man, we thought we had it made in the shade when we stumbled over this unique way to communicate! Outside of talking person-to-person on the phone, IM was the next best thing. Texting talk was endless and cost was nonexistent. Well, those were the good old days of yore - you know, those days of glorious innocence.

Just as we were getting oh so comfortable, happily IMing away to each other, then came the cloak-and-dagger entrance of the treacherous “IM villains”. With their ominous arrival, the party abruptly ended. It seemed like overnight, our instant messaging (IM) turned into instant mercenaries, and the carnage was strewn all over the Internet.

First, it was one by one, then the numbers increased and starting growing exponentially, as friends began receiving, and inadvertently sending, viruses, worms, and Trojan horses. Then it went from bad to worse, as report after report surfaced describing the grisly results of innocent victims losing their identity because these villains had accessed their personal and confidential information. Truly this was the darkest of times for all IMer friends - regardless of the IM service we were texting on.

How could this have happened? And more importantly, how can we protect ourselves?

Well, I found out that these villainous hackers had accessed a nifty little program originally designed to benefit us, and twisted it to intercept our conversations traveling across the internet. They now have a profitable tool to use that intercepts our data packets and sends us a virus, and duplicates it by sending the same ugly bug to everyone on our Buddy List.

Once a hacker has gained access to our Buddy List, they trick our friends into thinking WE, (a trusted source), are sending them a file to download. Then when our friends innocently download the file, these villains can then access their computers as well, and use the personal and confidential information gathered to line their own pockets. How it affected businesses whose employees used IM to communicate…well, I will just let your imagination take over from there…because the hackers let theirs do the same.

A lot of us were thinking that we had nothing to worry about because we had anti-virus software on our computers, and that provided the protection we needed. Wrong!

Anti-virus software is not designed to protect our data packets traveling across the internet. There are still no anti-virus applications that directly monitor IM traffic. This is due to the difficulty in finding IM traffic as it is often embedded inside http packets. And what is worse yet is that Forrester's, Root stated that “In 2005 and 2006, we expect IM to get hit with some serious attacks…”

But, don't despair! I have discovered a cure!

In fact, I discovered the best of both worlds. What I have found is a computer phone (in “techy” terms known as VoIP - voice over internet protocol) that is optimally secure. One of the many features of the computer phone is the IM that is built into it. Thus, the IM instant messages are sent over optimally secure lines rather than openly public lines on the Internet -- AND I can also actually talk to friends from my computer phone any time I want. The “good old days of yore” are back with even more !!!

Here's what a computer phone is all about.

The computer phone was the creation resulting from taking the convenience and features of the telephone and combining it with the power of the Internet. Pretty ingenious I think! Although most computers have a built in microphone, some do not. Mine was one of those computers that did not. So, I ran down to a local store and bought one for $5. Then, much to my delight, I found out that it easily plugged into the back of my computer.

Here is what is really incredible about a computer phone. I can talk, IM, make 3-way calls, transfer a call to my cell phone if I am running out the door, and much, much more.

Actually, I have become so accustomed to the convenience of the features on my computer phone, that it actually becomes frustrating when I cannot IM a friend I am talking to on their cell phone or telephone. You see, often times, I find great sites to share with my friends, so I have to slowly spell out the location over the phone and repeat the letters so they get the right site, then wait for them to repeat it back to me, rather than quickly IMing them the site and letting them click on it right then and there.

One final word of wisdom -- over 90% of all computer phone (VoIP) services out there do not operate on secure lines. The one I am using is optimally secure because they have their own proprietary high end encryption codec (code) with patented technology that is hosted in a professional facility. You just can't get any better than that!

Want to try a computer phone out for yourself?

You can download the software and try it out for 7 days absolutely free and without any contract, obligations, or hassles. Here's the place to visit: http://www.whypay4calls.com/gtp/to.pl?l=ART-06

Oh, and yes, you will love this….if you use a dial up connection to the internet, these computer phones work too, in addition to satellite, cable, and wireless connections.


**Attn Ezine editors / Site owners **
Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include our resource box as listed above.
 
 
About the Author
Dee Scrip is a well-known published author of numerous articles on VoIP, VoIP security, and other VoIP related issues.
http://www.whypay4calls.com/gtp/to.pl?l=ART-06

Article Source: http://www.simplysearch4it.com/article/1422.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/1422.html" as shown above and make it hyperlinked.



  Some other articles by Dee Scrip
Can We Talk? I Mean Honestly? I've Got Some Good News and A Warning for You Too
© Dee Scrip - All rights reserved. 1. Have you ever found an incredible buy somewhere and couldn't wait to rush home and call all your friends ...

Computer Phone (VoIP) Pathology is Preventable
By Dee Scrip © All rights reserved. You are in the telescopic cross hairs of unprincipled hackers if you own a computer or communicate using one of the 90% of ...

Are You Being Lied to About Computer Phones (VoIP)?
By Dee Scrip© All rights reserved. The majority of computer phone programs, such as those operating on Peer-to-Peer (P2P) networks, are unsafe and ...

  
  Recent Articles
Making Money with Online Data Entry
by Awad Sayeed

Why Pick Up Mystery Shopping among all the other Freelance and Work-At-Home Jobs?
by Mike Smith

Online Course Teaching How To Make money At Home
by P A Archer

Tips on working from home
by Elyse Lavery

Your Key To The Work From Home Dream
by James Bradley

The Impact of Internet Work At Home Jobs Explained
by Harrold Swalve

Affordable Vacation Membership That Pays You!
by John R. Bohannon

What Is A Cash Paid Survey?
by Edg holm

Fundamentals Of Affiliate Marketing
by cher k markov

Anyone Can Work From Home
by James Bradley

Holly Mann's Thank You Rich Jerk Reviewed
by Chris Bruso

Innovative Ways to Find Scam-Free Data Entry Jobs
by Arun Kumar

Web Based Investment Group Helps Condo Buyers Find Financing For Florida Condos:
by Michael R. Linton

Internet Work at Home Jobs; Deal or No Deal?!
by Steve Peterson

From 29 to 30 day on internet business
by Wolney

Can't connect to database