What Just Happened?


Instant messaging enables immediate interaction between people. But one of the great features of IMits real-time interactionopens a window for unsavory people and information to get through. That's because, unlike e mail, instant messages and requests to be added to your IM list of buddies come while you are signed on, and usually you respond to them then and there. That often pushes people, like Jim, to make instant decisions about whom they will allow to be a contact. It's so easy to assume that the person requesting to be your buddy is someone you know. Once somebody is accepted onto your list of buddies, that person can potentially see when you are signed on to an IM session and can communicate with you, can send you pictures, videos, or other files, might be able to see everyone on your buddy list and communicate with them, and with some of the new features coming on the market, might even be able to see your exact physical location.

Jim got caught by two spam-like messaging campaigns that count on people to accept their requests, either because they believe they're being contacted by someone they know, or simply because they accept them without thinking about it. This phenomenon of spam being delivered via instant messaging is referred to as "spim" (spam + IM = spim) and is growing by leaps and bounds.

What Is Instant Messaging?

Most people think of an instant messaging program as just a way to let people connect and chat in real time using text messages. Once simply a text-based product, IM has in recent years added features that allow you to hold voice conversations, send photos and files, show live videocam feeds of participants, and receive and send e-mail. Some IM services also allow you to search the Web, locate others by using GPS or other location technologies, listen to music, watch videos, customize your experiences with free and for-pay items such as winks and avatars, play games, and share applications. It is even possible to give a buddy remote access to your computer and computer applications.


You might get a message from someone who claims to have met you the other day. The message often invites you to click on a link to see that person via webcam, or to visit their blog. Because you're embarrassed that you can't remember this person, you might think that viewing a picture of him or her would be a good idea. You click a link, and before you know it you're routed to a pornographic blog or some other inappropriate site. What's worse is that once you're there, clicking the Close button to try to exit the site might bring up similar sites. Shutting them all down could involve rebooting your computer, removing spyware, and resetting your home page.

But then there are all the positive features of IM. IM enables you to stay in touch with friends and family (see Figure 8-1). With IM you can also view other people's profiles and blogs, send text messages to mobile phones, and use mini-programs called bots to perform searches or other tasks. IM is available on your computer, through game consoles, and through mobile devices such as cell phones and PDAs.

Figure 8-1. Positive IM between grandmother and grandson




Look Both Ways. Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors: Linda Criddle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net