Skype® for Dummies‰

Total Page:16

File Type:pdf, Size:1020Kb

Skype® for Dummies‰ 01_048917 ffirs.qxp 12/8/06 8:26 PM Page iii Skype® FOR DUMmIES‰ by Loren and Susan Abdulezer and Howard Dammond Foreword by Niklas Zennström CEO and co-founder of Skype 01_048917 ffirs.qxp 12/8/06 8:26 PM Page ii 01_048917 ffirs.qxp 12/8/06 8:26 PM Page i Skype® FOR DUMmIES‰ 01_048917 ffirs.qxp 12/8/06 8:26 PM Page ii 01_048917 ffirs.qxp 12/8/06 8:26 PM Page iii Skype® FOR DUMmIES‰ by Loren and Susan Abdulezer and Howard Dammond Foreword by Niklas Zennström CEO and co-founder of Skype 01_048917 ffirs.qxp 12/8/06 8:26 PM Page iv Skype® For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Skype, SkypeIn, and SkypeOut are trademarks or registered trademarks of Skype Limited in the United States and other coun- tries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not asso- ciated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REP- RESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CRE- ATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON- TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FUR- THER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. FULFILLMENT OF EACH COUPON OFFER IS THE SOLE RESPONSIBILITY OF THE OFFEROR. For general information on our other products and services, please contact our Customer Care Department within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit www.wiley.com/techsupport. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Control Number: 2006929466 ISBN: 978-0-470-04891-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/SX/RS/QW/IN 01_048917 ffirs.qxp 12/8/06 8:26 PM Page v About the Authors Loren Abdulezer is CEO and President of Evolving Technologies Corporation, a New York–based technology consulting firm. He is an experienced IT profes- sional serving many Fortune 500 companies. Loren is the author of Excel Best Practices for Business and Escape from Excel Hell and served as technical editor of Crystal Xcelsius For Dummies, all published by Wiley. Loren is always explor- ing new technologies and finding pragmatic and innovative applications. When Skype came along he was quick to recognize its benefits in business and all walks of life. This book is a direct result of wanting to bring those benefits one step closer to a broader audience. Susan Abdulezer is currently a full time Multimedia Developer in New York City. Susan creates interactive DVDs, documentaries, and Web-delivered media. She has received many honors for technology innovation, winning the prestigious Computerworld/Smithsonian Award in Technology and Academia in both 1996 and 1997. Susan has also written numerous feature articles on education and technology as the contributing editor of Converge Magazine from 1998 to 2002. Susan is active in the Digital Storytelling community, exploring the nature and power of the emerging digital culture. She has also been known to tear herself away from the computer to play classical violin in the Brooklyn Symphony Orchestra. Howard Dammond is an experienced IT professional and technical instruc- tor, having consulted at several major Fortune 500 companies. Howard has 20-plus years of experience as a technical trainer and developer of innovative learning materials. His perspective on teaching and skills development was first inspired and then intensively developed at Yale University in its unique Master of Arts in Teaching program, where he focused on learning theory, the acquisition and nurture of analytic skills, and interdisciplinary methods of curriculum planning and development. 01_048917 ffirs.qxp 12/8/06 8:26 PM Page vi 01_048917 ffirs.qxp 12/8/06 8:26 PM Page vii Dedications Loren Abdulezer: To my parents, Ralph and Joyce. Susan Abdulezer: To my parents, George and Cele (better known as CyberPops and Mamou). Howard Dammond: To my wife, Daria; my daughter Rhianna; my son, David; my father, HR; my mom, May. 01_048917 ffirs.qxp 12/8/06 8:26 PM Page viii 01_048917 ffirs.qxp 12/13/06 10:53 AM Page ix Authors’ Acknowledgments In writing this book we feel as though we embarked on an enormous journey. We couldn’t have done it without the help and assistance of colleagues, friends, and peers who have gone out of their way to be helpful. We express our heart- felt gratitude and appreciation, and we acknowledge their contribution in the making of this book and its companion Web site (www.skype4dummies.com). Numerous people have been generous, devoting their time, energy, and exper- tise. We need to single out two people who were especially instrumental in facilitating the connections to the right people within Skype and throughout the Skype community. Thank you, Kat James and Romain Bertrand. Lester Madden, Dan Houghton, Raul Liive, and Tony Saigh opened many doors for us. We’ve had numerous and engaging conversations both inside and outside of Skype. In order of first name, we thank the following people: Aaron Wellman, Adam Gross, Allison Kohn, Anders Hallin, Ash Valeski, Ben Lilienthal, Bernard Percy, Bill Campbell, Bill Good, Brian Phillips, Charles Bender, Christophe Melle, Dani Shefer, David Cohen, David Rivier, Deborah Quinlan, Dick Schiferli, Elspeth Knight, Eric Choi, Eric Partaker, Erica Jostedt, Eyal Gever, Faye Williams, Gershon Goren, Gordon Evans, Graeme Gibson, Grete Napits, Heron Stone, Imogen Bailey, Jaanus Kase, Jen Webb, Jennifer Ruff, Jeremy Hague, Jim Brady, Jin Kim, Joan Gordon, John Martin, John Picard, Karen Gorman, Karen Richardson, Karen Sohl, Kelly Reed, Leslie Schecht, Liz Tierney, Lou Guercia, Martin Dougiamas, Mat Taylor, Melinda Kolk, Natasha Konstantinova, Nicola Riordan, Olivia Selbie, Philip Pool, Philippe Tessier, Phillip Pyo, Rich Conti, Rouzbeh Pasha, Sam Aparicio, Sandy Krochek, Sara Reitz, Scott Miller, Shira Litvak, Stan Kwang, Stella Porto, Stephanie Zari, Tom Gillen, Viktoria Randalainen, and Wendy Dominguez. We also thank all those friends and family members who helped us put Skype through its paces, and especially George and Cele Pomerantz, who embraced Skype wholeheartedly. We are grateful for having Susan Christophersen, Leah Cameron, and Colleen Totz Diamond as our editors to give our book shape, clarity, and coherence. Susan Christophersen and Greg Croy did an incredible job of pulling this book together. We also wish to express our gratitude to Jen Webb, Jodi Jensen, Mary Corder, Andy Cummings, and Lisa Coleman. 01_048917 ffirs.qxp 12/13/06 10:53 AM Page x Publisher’s Acknowledgments We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/. Some of the people who helped bring this book to market include the following: Acquisitions, Editorial, and Composition Services Media Development Project Coordinator: Kristie Rees Project Editor: Susan Christophersen Layout and Graphics: Lavonne Cook, Acquisitions Editor: Greg Croy Stephanie D. Jumper, Barbara Moore, Development Editors: Susan Christophersen, Barry Offringa, Laura Pence, Leah Cameron, Colleen Totz Diamond Ronald Terry Editorial Manager: Jodi Jensen Proofreaders: Techbooks Media Development Manager: Indexer: Jessica Kramer, Techbooks Laura VanWinkle Anniversary Logo Design: Richard Pacifico Editorial Assistant: Amanda Foxworth Sr. Editorial Assistant: Cherie Case Cartoons: Rich Tennant (www.the5thwave.com) Publishing and Editorial for Technology Dummies Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher Mary Bednarek, Executive Acquisitions Director Mary C.
Recommended publications
  • Webrtc and XMPP
    webRTC and XMPP Philipp Hancke, XMPP Summit 2013 What is this webRTC thing … …and why should XMPP developers care? . I assume you know what XMPP is… . … you might have heard of Jingle . the XMPP framework for establishing P2P sessions . used for VoIP, filesharing, … . … you might have also heard about this webRTC thing . doing VoIP in the browser . without plugins . „no more flash“ . Do you want to know how it relates to XMPP ? Philipp Hancke © ESTOS GmbH 2013 2 What is webRTC? . P2P sessions between browsers . no servers involved in media transfer . using open standards . Javascript API in the browser . also an BSD-licensed C++ library from Google . Want to know more? . Listen to the evangelists! . Justin Uberti http://www.youtube.com/watch?v=E8C8ouiXHHk . Jose de Castro http://vimeo.com/52510068 . Cullen Jennings http://vimeo.com/cullenfluffyjennings/rtcwebexplained Philipp Hancke © ESTOS GmbH 2013 3 Initiating P2P sessions . initiate a P2P session between two browsers . negotiate media codecs, NAT traversal, etc . media is sent P2P . you need a session initiation protocol . SIP? . JSEP? . H.323? . Jingle! . webRTC does not mandate a signalling protocol . WG decision Philipp Hancke © ESTOS GmbH 2013 4 Call Flow - JSEP Philipp Hancke © ESTOS GmbH 2013 5 Jingle . You can use Jingle as signalling protocol . together with BOSH or XMPP over websockets in the browser . Demo later . But… . webRTC uses the Session Description Protocol as an API . Jingle does not use SDP . You need a mapping SDP -> Jingle -> SDP . Complicated, but doable . Topic for breakout Philipp Hancke © ESTOS GmbH 2013 6 Call Flow - Jingle Philipp Hancke © ESTOS GmbH 2013 7 webRTC-Jingle usecases .
    [Show full text]
  • Copyrighted Material
    Stichwortverzeichnis A B Abstreitbarkeit 167 Bequemlichkeit 30 Adblocker 96 Bitcoin 110 – Adblock Plus 96 Blackberry 215 – Disconnect 96 Bookmarks siehe Favoriten – Ghostery 96 Browser 68, 75 – Privacy Badger 96 – Add-on 87, 90 – uBlock 97 – Apple Safari 77 Add-on – Cache 88 – Browser 87, 90 – Chromium 78 – E-Mail-Client 126 – Chronik 87 – Enigmail siehe Enigmail – Fingerprinting 85, 98 – GpgOL 137 – Google Chrome 77 – Mailvelope 130, 132 – HTML-Engine 80 – Thunderbird 139 – Hygiene 88 Adium 170 – Iceweasel 78 Advanced Programming Interface (API) 90, – Inkognito-Modus 86 182 – integrierte Suche 84 Android – Internet Explorer 77 – Android Privacy Guard (App) 156 – Konqueror 78 – K9 Mail (E-Mail-Client) 156 – Microsoft Edge 92 – OpenKeychain (App) 156 – Midori 78 – PGP 156 – Mosaic 68 – R2Mail2 (E-Mail-Client) 158 – Mozilla Firefox 68, 76 – S/MIME 156 – Netscape Navigator 68 Anonymität 206 COPYRIGHTED– Opera 77MATERIAL AOL Instant Messenger (AIM) 164 – Plug-in 87 Apple Mail – Prole (Identitäten) 87 – PGP 145 – Synchronisation von Einstellungen – S/MIME 155 86 Authentizierung 167, 169, 176, 179 – Web (Epiphany) 78 – Adium 172 Buffer Overow 82 – Multifaktor- 201 Bugs 82 – Pidgin 169 Bundesamt für Sicherheit in der Informations- Authentizität 29, 54, 56 technik (BSI) 215 233 Stichwortverzeichnis C – E-Mail-Adresse 119 Caesar-Chiffre 36 – Header 121 Certicate Authority siehe Zertizierungsstelle – Provider 129, 131, 139 Chain of Trust siehe Web of Trust – Server 122 Chaos Computer Club (CCC) 133 Eingangsverschüsselung 125 Chat 161 Electronic
    [Show full text]
  • Google Talk: Is It Ready for the Enterprise?
    Research Publication Date: 16 April 2009 ID Number: G00166834 Google Talk: Is It Ready for the Enterprise? David Mario Smith, James Lundy This report discusses the Google Talk instant messaging product and its suitability for enterprises. This is important for companies which are looking at alternatives to IBM and Microsoft for messaging and collaboration. Key Findings • Google Talk IM is based on the Extensible Messaging and Presence Protocol (XMPP) and Jingle protocols. • To get enterprise-level support for Google Talk, companies have to purchase the full Google Apps Premier Edition (GAPE) suite. • Enterprise users are already using the Google Talk and Gmail free services. Recommendations • Enterprises making collaboration decisions should include the Google Apps portfolio as part of an effort to compare the economics of their current incumbent provider vs. similar services provisioned in the cloud. © 2009 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. WHAT YOU NEED TO KNOW Enterprise instant messaging (IM) has emerged to become an infrastructure component in enterprises.
    [Show full text]
  • A Comparison Between Inter-Asterisk Exchange Protocol and Jingle Protocol: Session Time
    Engineering, Technology & Applied Science Research Vol. 6, No. 4, 2016, 1050-1055 1050 A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time H. S. Haj Aliwi N. K. A. Alajmi P. Sumari K. Alieyan School of Computer Sciences Saad Al-Abdullah Academy School of Computer Sciences National Advanced IPv6 Center Universiti Sains Malaysia for Security Sciences, Kuwait Universiti Sains Malaysia Universiti Sains Malaysia [email protected] [email protected] [email protected] [email protected] Abstract—Over the last few years, many multimedia conferencing sessions. Such applications are Gtalk, Talkonaut, and Hangouts and Voice over Internet Protocol (VoIP) applications have been [7]. developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. II. BACKGROUND This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX) and the extension of the eXtensible Messaging and Presence Protocol A. IAX Protocol (Jingle) in terms of delay time during call setup, call teardown, In 2004, Mark Spencer created the Inter-Asterisk eXchange and media sessions. (IAX) protocol for asterisk that performs VoIP signaling [22]. IAX is supported by a few other softswitches, (Asterisk Private Keywords-multimedia conferencing; VoIP; signaling protocols; Branch eXchange) PBX systems [23], and softphones [18]. Jingle; IAX Any type of media (Video, audio, and document conferencing) can be managed, controlled and transmitted through the I. INTRODUCTION Internet Protocol (IP) networks based on IAX protocol [25]. With the appearance of numerous multimedia conferencing IAX2 is considered to be the current version of IAX.
    [Show full text]
  • XEP-0234: Jingle File Transfer
    XEP-0234: Jingle File Transfer Peter Saint-Andre Lance Stout mailto:xsf@stpeter:im mailto:lance@andyet:com xmpp:peter@jabber:org xmpp:lance@lance:im http://stpeter:im/ 2019-06-19 Version 0.19.1 Status Type Short Name Deferred Standards Track jingle-ft This specification defines a Jingle application type for transferring a file from one entity to another. The protocol provides a modular framework that enables the exchange of information about the file to be transferred as well as the negotiation of parameters such as the transport to be used. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the ”Specification”), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specifi- cation, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or sub- stantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or pub- lisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation.
    [Show full text]
  • Listener Feedback #170
    Security Now! Transcript of Episode #409 Page 1 of 40 Transcript of Episode #409 Listener Feedback #170 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-409.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-409-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. What a great show ahead. Questions, answers. We'll talk more about PRISM, more insight there. You've got to stay tuned. This is the show to keep your privacy and security up. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 409, recorded June 19th, 2013: Your questions, Steve's answers, #170. It's time for Security Now!, the post-NSA edition. Steve Gibson is here, our Explainer in Chief, the guy who does all the security and privacy and is really our guru in that realm. Hello, Steve. Good to see you. Steve Gibson: Hey, Leo. Great to be with you again. And we have largely, as expected, a follow-up to last week's blockbuster theory of how PRISM works, as I expected. Actually I probably had double the number of email that I normally pull from the mailbag, which would have only been in half of the period of time.
    [Show full text]
  • THE MAINTENANCE of MUTUAL UNDERSTANDING in ONLINE SECOND LANGUAGE TALK ADAM BRANDT Thesis Submitted for the Degree of Doctor Of
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OpenGrey Repository THE MAINTENANCE OF MUTUAL UNDERSTANDING IN ONLINE SECOND LANGUAGE TALK ADAM BRANDT Thesis submitted for the degree of Doctor of Philosophy Newcastle University School of Education, Communication and Language Sciences June 2011 Abstract Encounters in which at least one person is communicating in a second language (L2) are increasingly prevalent, and span many contexts and settings. However many of these settings remain under-researched, particularly those outside of formal language education (Firth & Wagner 1997, 2007; Wagner 2004). One such under-explored setting is the internet. In one particular internet context, L2 users of English have taken the opportunity to create voice-based chat rooms in which participants can practice their use of English. In such chat rooms, despite the huge variety in backgrounds and proficiencies, participants prove themselves to be highly skilled, resourceful and competent interactants, able to ensure mutual understanding as consistently and regularly as would be expected from first language users. However, as with any context involving any kind of interactants, there are occasions on which this mutual understanding appears to come under threat. This study applies conversation analysis (CA) to the examination of audio recordings of these online, voice-based chat rooms. More specifically, it provides a fine detailed examination of the work which is put in by the participants in order to pre-empt, and/or overcome, possible threats to mutual understanding (or ‘intersubjectivity’). Analysis show how participants are at times sensitive to such threats when dealing with (1) unspecified trouble in talk and (2) an absence of response to talk.
    [Show full text]
  • Risk of Public Disclosure: Learning from Willy Wonka
    Issue 20, 16 December 2014 WhiteNews Global corporate espionage news Editorial: WhiteRock Updates: All About Privacy 2 Threat: Are LinkedIn Contacts Trade Secrets? 3 News: $400 Bn Military Espionage; Code Fishing 4 News: Falcani Black List; Football Whistleblower 5 Feature: Willy Wonka’s Lessons in Espionage 6-7 Technology: Hearing Aid for Corporate Spies 8-9 Extra: FBI’s Untold Story; Spy on Your Rival 10-11 Letter From America: Spying Breakfast Club 12 Exclusive Reporting for WhiteRock’s Clients Risk of Public Disclosure: Learning from Willy Wonka Our feature story is seemingly seasonal and light-hearted, but the film ‘Charlie and the Chocolate Factory’ carries a very strong espionage message that is relevant even 50 years later. Willy Wonka was a brilliant CEO who knew that the only person who could protect his trade was himself. Wonka’s story translates superbly into today’s corporate world, and in this issue we are discussing how the contemporary big players are maintaining their edge and success over their competitors. This is equally relevant for small and medium-sized businesses, who really don’t prioritise their trade secrets, making their advantage extremely vulnerable. In the technology section we analyse the delicate matter of hearing aid systems. They’re everywhere, including in corporate meeting rooms, and nobody really considers these as a threat. We’re examining how to achieve a balance between protecting valuable corporate information without creating an embarrassing situation that in turn could lead to reputational damage! Our extra section may give you a wrong impression this time. No, we’re not teaching you how to spy, this is not our bag.
    [Show full text]
  • XEP-0353: Jingle Message Initiation
    XEP-0353: Jingle Message Initiation Philipp Hancke Peter Saint-Andre mailto:fippo@andyet:com mailto:xsf@stpeter:im xmpp:fippo@goodadvice:pages:de xmpp:peter@jabber:org http://stpeter:im/ 2021-03-04 Version 0.3.1 Status Type Short Name Deferred Standards Track jingle-message This specification provides a way for the initiator of a Jingle session to propose sending an invitation in an XMPP message stanza, thus taking advantage of message delivery semantics instead of sending IQ stanzas to all of the responder’s online resources or choosing a particular online resource. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the ”Specification”), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specifi- cation, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or sub- stantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or pub- lisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation.
    [Show full text]
  • Multi-User Jingle
    Multi-User Jingle Sjoerd Simons Collabora Ltd, sponsored by NlNet LCA 2009 Multi-User Jingle XMPP protocol extension for initiating and managing multiparty voice and video conferences within an XMPP MUC using Jingle Jingle XMPP protocol extension for initiating and managing peer-to-peer media sessions between two XMPP entities XMPP I Extensible Messaging and Presence Protocol I The protocol formaly known as Jabber I XML streams I XMPP Core: RFC 3920 I XMPP IM: RFC 3921 I Extensions using XMPP Extension Proposals (XEP) XMPP JID Almost but not entirely unlike an e-mailaddress: I [email protected] I [email protected] I [email protected]/balcony Messages <message to='[email protected] ' from='juliet@example .com/balcony ' type='chat ' xml:lang=' en '> <body>Wherefore art thou, Romeo?</ body> </ message> Presence <presence from='romeo@montague. lit/orchard '> <show>dnd</show> <s t a t u s>Wooing Juliet</ s t a t u s> <c xmlns='http://jabber.org/protocol/caps' hash=' sha −1 ' node='http://telepathy .freedesktop.org/wiki/Muji' ver='iuNYhdSOy4nYDVPDhoTqCFubSz8='/> </ p r e s e n c e> Info/Query <iq xmlns='jabber:client ' to='juliet@example .com/balcony ' from='romeo@example. net/orchard ' id='2846139002 ' t y p e= ' g e t '> <query xmlns='http://jabber.org/protocol/disco#info ' node=' http://telepathy . freedesktop . org/wiki/Muji#iuNYhdSOy4nYDVPDhoTqCFubSz8=' /> </ i q> <iq xmlns='jabber:client ' to='romeo@example. net/orchard ' from='juliet@example .com/balcony ' id='2846139002 ' type='result '> <query xmlns='http://jabber.org/protocol/disco#info '> <identity category='client ' t y p e= ' pc ' name='Telepathy Gabble 0 .
    [Show full text]
  • What Are the Uses of Skype? What Does It Do? Who Uses Skype?
    Skype Unknown macro: {align} Unknown macro: {logo} http://wiki.itap.purdue.edu/download/attachments/4293019/rsz_logo_-_skype-1.jpg "> Unknown macro: {align} Unknown macro: {logo} http://wiki.itap.purdue.edu/download/attachments/4293019/rsz_logo_-_skype-1.jpg What Are the Uses of Skype? What Does It Do? The main purpose of Skype is to connect people. People from around the world can connect through many different ways. They can connect through one or two way audio, one or two way video, one or two way audio and video or through text. People can also call any telephone around the world though this costs money, but talking between Skype users does not cost a thing. It can be used on Windows, Mac, and Linux operating systems so almost all computers are compatible. It also works with many different cell phones and mobile devices so individuals can use it whenever/wherever they want. It also can be used by a teacher who is teaching an online class. Unknown macro: {center} Who Uses Skype? Skype in Business Skype is used for businesses that need to reach people around the country or world for as cheap as possible. When business workers use Skype they can get more done, talk more to your clients, and cut your phone bill. Business workers can make free calls to people when they are using Skype and if they choose to call mobile phones or landlines it is very cheap.They can also use Skype from many mobile phones so you can use it anywhere. Skype also allows users to make video calls so business workers can make conference calls for free anytime, anywhere.
    [Show full text]
  • SEMINARSKI RAD IZ OSNOVA INFORMATIKE Tema: CHAT
    OŠ ÅVuk S. Karadžić´ Banja Luka SEMINARSKI RAD IZ OSNOVA INFORMATIKE Tema: CHAT 18.februar 2011. Milica Simidžija IX3 SADRŽAJ: CHAT. 1 KO KORISTI CHAT?. .2 VRSTE CHAT-A: -Chat sobe na web stranicama. 3 -Chat programi: . .4 1. Windows Live Messenger. .4-5 2. Skype. 6-7 3. AOL Instant Messenger. 8 4. Yahoo Messenger. .9 5. X-Chat. .10 6. ICQ. 11 7. Google Talk. 12 CHAT SKRAĆENICE. 13 PRAVILA CHAT-a. 14 LITERATURA . 15 CHAT Chat je oblik komunikacije dva ili više korisnika putem računara i računarske mreže. Chat se odvija u vrlo kratkim porukama koje korisnik vidi čim ih njegov sugovornik pošalje (obično pritiskujući tipku Enter).Na nekim chatovima postoje tzv. sobe u kojima istovremeno priča i do nekoliko desetaka (pa i stotina) korisnika. U nekima je razgovor ograničen na nekoliko ljudi, dok neki mogu kombinovati te dvije vrste. Za neke chatove ne treba ništa osim Web Browser-a i Java Programskog jezika, dok su neki prerasli u posebne kompjuterske programe, od kojih su najpoznatiji Windows Live Messenger, Skype, Yahoo! Messenger, Google Talk itd. 1 KO KORISTI CHAT? Chat aplikacije korištene su najčešće od strane tinejdžera do 18 godina starosti. Posebno privlačna mladima je anonimnost koju internet pruža, a koju je nemoguće postići u nekoj drugoj vrsti komunikacije. Ova anonimnost oslobađa i podstiče ljude na drugačiju komunikaciju nego što bi to činili u ličnim kontaktima, što znači da se svako može predstaviti kako želi i biti šta želi. Ponekad se odrasli ljudi koji često nemaju prijateljske namjere mogu predstavljati kao djeca. To najčešće budu pedofili, koji se preko četa pokušavaju približiti djeci.
    [Show full text]