Chat applications and IRC Presented by Tyler Maciolek.

Slides:



Advertisements
Similar presentations
Networking, Internet, and Distance Learning Networking, Internet, and Distance Learning 1.Networking 1.What is Networking? 2.Networks 1.Wireless network.
Advertisements

Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
MASK. Agenda Introduction –IRC prelude –What is IRC? –How does IRC work? Architecture –Client/Server –IRC commands –3 major types of communication on.
Internet Research Internet Applications. The Internet is not the Web Because of the great popularity of the World Wide Web, people think the Internet.
Introduction to Your Name Goes Here
Remote Access Network Management Kelly Given Allison Traina.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Publishing on the WWW Internet Communications. Introduction Range of methods Asynchronous or Synchronous Mobile Communications / Internet.
Usability Test by Knowing User’s Every Move - Bharat chaitanya.
Web-based Control Interface For a model train control system By: Kevin Sendra.
Lesson 19 Internet Basics.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Internet Relay Chat David Holl IS 373. Overview Introduction Standards Body History Specifications Advantages and Disadvantages Privacy Security Pervasiveness.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
By : Windi Widiastuti XII TKJ  DEFINITION.
CSI315 Lecture 1 WEEK 1. The Internet A world-wide network of millions of computers connected to share information and communication. The interconnected.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
Network Operating Systems versus Operating Systems Computer Networks.
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Copyright by Gregory W. Hislop 1 INFO 324 Team Process and Product Week 6 Dr. Jennifer Booker College of Information Science and.
8 1 ADVANCED COMMUNICATION TOOLS Using Chat, Virtual Worlds, and Newsgroups New Perspectives on THE INTERNET.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
How computer’s are linked together.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Bitlbee + Irssi The ideal combination for chat addicts ?
Introduction to Internet Communications Pn. Jamilah Binti Yusof.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Welcome to working with the cloud &. Cloud computing: The practice of using a network of remote servers hosted on the Internet to store, manage, and process.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Module 11: Designing Security for Network Perimeters.
NETWORKING BASICS.
Chien-Chung Shen Bot and Botnet Chien-Chung Shen
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 14 How Internet Chat and IM Work.
Client – Server Architecture A Basic Introduction 1.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
A Complete Guide to Select the Best VPS Hosting Providers.
iSupplier Portal (iSP) Technical Requirements
System Architecture & Hardware Configurations
Dedicated Servers vs Cloud Hosting
Client-Server Model and Sockets
Introduction to Your Name Goes Here
System Architecture & Hardware Configurations
Services Provided by Network Operating Systems
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
File Transfer Protocol
مدرسة السواحرة الابتدائية للبنات
Firewalls Purpose of a Firewall Characteristic of a firewall
Introduction to Your Name Goes Here
Client/Server and Peer to Peer
Presentation transcript:

Chat applications and IRC Presented by Tyler Maciolek

Introduction Chat Rooms Software based such as AOL Web based Internet Relay Chat (IRC)

Basics of Chat Applications Client/Server Users identified by screen names Moderation

Chat Rooms Software based Hosted by a specific service Only accessible through that service’s software Web-based Stand alone for a website Front-end for an IRC channel

Demonstration AOL Web

Internet Relay Chat Dedicated Servers Servers grouped by network Connect with IRC Client software Ability to chat directly and bypass the server (DCC)

Demonstration Signing onto IRC

Logging Chat IRC Client Logs

Logging Chat (continued) IRC Server Logs Screenshots

Alternative Logs Obtaining logs from Channel / IRC Ops / Bots Packet Sniffing Word of caution: IRC Proxy and Bouncers

Legal Issues Obtaining evidence after the fact Authentication Finding information about screennames and channels Service Provider Involvement Responsibilities and technical possibilities