(Computer-Mediated) Communication

Total Page:16

File Type:pdf, Size:1020Kb

(Computer-Mediated) Communication Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation abläuft. Mit diesem Verständnis werden mehrere Betrachtungsweisen definiert, die durch verschiedene At- tribute und unterschiedliche Leitfragen repräsentiert werden. Praktische Beispiele er- läutern, welche grundlegenden Informationen aus textbasierten Diskursen gewonnen werden können und wie dies stattfindet. Der Autor konzentriert sich hauptsächlich auf den Internet Relay Chat (IRC) als angewandtes Beispiel aufgrund seines frei zugänglichen und gut dokumentierten Protokolls. In Diskursen ist nicht immer klar, wer mit wem kommuniziert. Dies ist besonders bei automatischer Diskursanalyse problematisch. Es ist wichtig, die Nicknamen der Benutzer in einem schriftlichen Diskurs zu identifizieren, um die Absender und Empfänger von Nachrichten zu bestimmen. Jedoch sind die sprach- lichen Möglichkeiten in der Kreation von Nicknamen und auch deren Verwendung im Diskurs vielfältig. Um zu untersuchen, wie Nicknamen kreiert und in IRC verwendet wer- den, wurden Logs von 13 Gesprächskanälen (Channels) bestehend aus 8937 öffentlichen Chat-Nachrichten und 7936 einzigartigen Nicknamen detailliert analysiert. In dieser Dissertation wird beschrieben, welche grundlegende Struktur IRC Nicknamen haben, aus welchen Gruppen von Wortarten Nicknamen zusammengesetzt sind, und welche Teile der Nicknamen im Chat-Diskurs weggelassen werden. Dieses Wissen, in Kombination mit der Identität des eingeloggten Benutzers, führt zu einer besseren Vorhersage darüber, ob das untersuchte Wort im Diskurs eine verkürzte oder kreativ veränderte Form eines Nicknamens sein kann. Darüber hinaus verbessert diese Arbeit zwei weitere Funktionen: Erstens, die automatisierte Erkennung von geschriebenen Empfängernamen (oder Teilen davon) und ihre Zuordnung zu eingeloggten Benutzern. Zweitens, wenn kein Empfänger- name geschrieben wird, das automatisierte Erraten des Empfängernamens ohne Semantik. Die Architektur der Software wird im Detail beschrieben. Ein IRC-Diskurs mit 5605 Nachrichten wird manuell und automatisch analysiert, beide Ansätze erzielen ähnlich gute Ergebnisse für die Erkennung und das Erraten von Sender-Empfänger-Relationen. i Abstract Various forms of computer-mediated communication (CMC) have become ubiquitous, and influence our lives in many ways. Facebook, Myspace, Skype, Twitter, WhatsApp, and YouTube produce enormous amounts of traffic and data—which is ideal for analysis. Automated tools for discourse analysis process this tremendous amount of computer- mediated discourse quickly. The aim of this thesis is to describe and develop a software architecture for an automated tool that analyzes computer-mediated discourses to answer the question “Who is communicating with whom?” at any point in time. Assigning receivers to each message is an important step. While direct addressing is helpful, it is not used in every message. The author explores popular communication models and the most widely used CMC systems. The underlying communication model highlights the basic elements of CMC, and shows how this communication takes place. Based on this understanding, multiple views are defined by using different attributes and various guiding questions. Practical examples explain which basic information can be extracted from text-based discourses, and how that is done. The author mainly focuses on Internet Relay Chat (IRC) as an applied example because of its open and well-documented protocol. In discourses, it is not always clear who is communicating with whom; which especially affects the automatic analysis of discourses. It is important to identify the users’ nicknames in written discourse in order to determine who the respective senders and receivers are. However, the linguistic possibilities in nickname creation, and of using nicknames in the discourse, are various. To study how nicknames are created and used in IRC, logs of 13 channels, consisting of 8937 public chat messages and 7936 unique nicknames, are analyzed in detail. This thesis shows the basic structure of IRC nicknames, which parts of speech group are used to compound nicknames, and which parts of speech of a nickname are omitted within the chat discourse. This knowledge leads to a better prediction as to whether there is a link between a current logged-in user and the examined word in discourse, which can be a shortened or creatively changed form of a nickname. Additionally, this work improves two other aspects: first, automated detection and mapping of written receiver names (or parts thereof) for logged-in users; and second, automated receiver guessing without semantics if no receiver name is specified. The architecture of the automated software is described in detail. An IRC discourse with 5605 messages is manually and automatically analyzed, and both approaches achieve similar results in detecting and guessing sender-receiver relations. iii Dedicated to my family and all my friends. Thank you for bringing color to my life. Thank you also to the staff of the hospital “Krankenhaus der Barmherzigen Schwestern Ried”. Everybody can make their dreams come true. — Walter Elias “Walt” Disney (1901–1966) Acknowledgment I am grateful to many people who were directly or indirectly involved in the preparation of this thesis. In particular, I want to thank • my supervisor Univ.-Prof. Mag. Dr. Gabriele Anderst-Kotsis for her guidance, valuable feedback, and support that she provided throughout this work, • o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl for reading this thesis as the second examiner and giving many valuable hints on various topics, • Mag. Dr. Michael Karlinger for helpful discussions and feedbacks, • Dewi Williams for proofreading my three papers and an earlier version of this thesis, • Susan Gall, Leila Johnston, and Hashim Zakiullah for proofreading the thesis, • Ewa Joanna Bogad, Carolin Zeitler, and Paul Froemel for reading the German abstract, • the peer-reviewers for their helpful comments, and • all my student colleagues for making the time at university as enjoyable as it was. ix Contents Abstract iii Contents xi List of tables xix List of figures xxiii 1 Introduction 1 1.1 Research background and motivation . 1 1.2 Objectives, research questions, and guiding questions . 2 1.3 Scope and constraints . 4 1.4 Research approach . 4 1.5 Structure of the thesis . 6 1.5.1 (Computer-mediated) communication . 6 1.5.2 Computer-mediated discourse analysis . 6 1.5.3 Automated discourse analysis with a focus on IRC . 6 1.6 List of original publications . 7 1.7 Chapter summary . 7 I (Computer-mediated) communication9 2 Communication and communication models 11 2.1 Definitions . 11 2.1.1 Communication . 11 2.1.2 Communication model . 12 2.2 Communication models . 12 2.2.1 Aristotle . 13 2.2.2 Ferdinand de Saussure . 13 2.2.3 Karl Bühler . 13 2.2.4 Wendell Johnson . 14 2.2.5 Harold Dwight Lasswell . 15 2.2.6 Claude Elwood Shannon and Warren Weaver . 15 2.2.7 Jürgen Ruesch and Gregory Bateson . 16 2.2.8 Theodore Mead Newcomb . 16 2.2.9 Wilbur Schramm . 16 2.2.10 Charles Egerton Osgood and Wilbur Schramm . 17 2.2.11 George Gerbner . 18 2.2.12 Bruce H. Westley and Malcolm S. MacLean . 19 2.2.13 John W. Riley and Matilda White Riley . 19 2.2.14 David Kenneth Berlo . 19 2.2.15 Roman Ossipowitsch Jakobson . 20 xi Contents 2.2.16 Gerhard Maletzke . 20 2.2.17 Melvin Lawrence DeFleur . 21 2.2.18 Frank E. X. Dance . 21 2.2.19 Samuel L. Becker . 22 2.2.20 Elizabeth G. Andersch, Lorin C. Staats, and Robert N. Bostrom . 22 2.2.21 Dean C. Barnlund . 23 2.2.22 Ray Eldon Hiebert, Donald F. Ungurait, and Thomas W. Bohn . 24 2.2.23 D. Lawrence Kincaid . 24 2.2.24 Friedemann Schulz von Thun . 25 2.3 Chapter summary . 25 3 Computer-mediated communication (CMC) 27 3.1 Definition . 27 3.2 Characteristics of CMC . 28 3.3 CMC systems . 29 3.3.1 Electronic mailing . 30 3.3.2 Electronic mailing list . 33 3.3.3 Usenet . 34 3.3.4 Forum . 36 3.3.5 Blog . 37 3.3.6 Wiki . 38 3.3.7 Online chat . 39 3.3.8 Instant messaging . 40 3.3.9 Text messaging . 42 3.3.10 Social network site . 44 3.3.11 Other CMC systems . 44 3.4 Advantages and disadvantages of CMC . 44 3.4.1 Technology . 44 3.4.2 Costs . 45 3.4.3 Availability . 45 3.4.4 Place . 45 3.4.5 Mobility . 45 3.4.6 Time . 45 3.4.7 Access . 46 3.4.8 Data exchange . 46 3.4.9 Interactivity . 46 3.4.10 Shared knowledge . 46 3.4.11 Amount of data . 46 3.4.12 Richness of communication . 46 3.4.13 Anonymity . 46 3.4.14 Storage of data . 47 3.5 Ethical issues in CMC research . 47 3.6 Chapter summary . 47 4 Communication model for CMC 49 4.1 Computer-mediated communication process .
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • Desynched Channels on Ircnet
    Desynched channels on IRCnet Michael Hansen and Jeroen F. J. Laros [email protected] October 29, 2018 Abstract In this paper we describe what a desynchronised channel on IRC is. We give procedures on how to create such a channel and how to remove desyn- chronisation. We explain which types of desynchronisation there are, what properties desynchronised channels have, and which properties can be ex- ploited. 1 Introduction IRC [1] is one of the oldest digital communication protocols on the internet [2]. This protocol is a form of synchronous conferencing which is mainly used for its one-to-many communication capabilities. Although its popularity has somewhat diminished since the introduction of instant messaging applications [3] like the MSN messenger [4], it is still widely used. In this paper, we first give some background information about IRC in Sec- tion 2. In Section 3 we elaborate on the phenomenon of desynched channels and in Section 4 we describe how to place a boundary, Section 5 covers the occurrence of fake modes and Section 6 describes how to remove a desync. In Section 7, we give some examples of possible uses of fake modes and we conclude in Section 8. arXiv:0811.3140v1 [cs.NI] 19 Nov 2008 2 Background An IRC network consists of multiple servers connected to each other, there are no cycles in this network, so the topology of this network is an undirected tree (acyclic graph). An IRC network also has clients connected to its servers, and messages are relayed from server to server to transfer a message from one client to another.
    [Show full text]
  • STEM Subjects Face the Haptic Generation: the Ischolar Tesis
    STEM Subjects Face the Haptic Generation: The iScholar Tesis doctoral Nuria Llobregat Gómez Director Dr. D. Luis Manuel Sánchez Ruiz Valencia, noviembre 2019 A mi Madre, a mi Padre (†), a mis Yayos (†), y a mi Hija, sin cuya existencia esto no hubiese podido suceder. Contents Abstract. English Version Resumen. Spanish Version Resum. Valencian Version Acknowledgements Introduction_____________________________________________________________________ 7 Outsight ____________________________________________________________________________________ 13 Insight ______________________________________________________________________________________14 Statement of the Research Questions __________________________________________________________ 15 Dissertation Structure ________________________________________________________________________16 SECTION A. State of the Art. The Drivers ____________________________________________ 19 Chapter 1: Haptic Device Irruption 1.1 Science or Fiction? Some Historical Facts ______________________________________________ 25 1.2 The Irruptive Perspective ___________________________________________________________ 29 1.2.1 i_Learn & i_Different ____________________________________________________________________ 29 1.2.2 Corporate Discourse and Education ________________________________________________________ 31 1.2.3 Size & Portability Impact _________________________________________________________________ 33 First Devices _____________________________________________________________________________ 33 Pro Models
    [Show full text]
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Congratulations Susan & Joost Ueffing!
    CONGRATULATIONS SUSAN & JOOST UEFFING! The Staff of the CQ would like to congratulate Jaguar CO Susan and STARFLEET Chief of Operations Joost Ueffi ng on their September wedding! 1 2 5 The beautiful ceremony was performed OCT/NOV in Kingsport, Tennessee on September 2004 18th, with many of the couple’s “extended Fleet family” in attendance! Left: The smiling faces of all the STARFLEET members celebrating the Fugate-Ueffi ng wedding. Photo submitted by Wade Olsen. Additional photos on back cover. R4 SUMMIT LIVES IT UP IN LAS VEGAS! Right: Saturday evening banquet highlight — commissioning the USS Gallant NCC 4890. (l-r): Jerry Tien (Chief, STARFLEET Shuttle Ops), Ed Nowlin (R4 RC), Chrissy Killian (Vice Chief, Fleet Ops), Larry Barnes (Gallant CO) and Joe Martin (Gallant XO). Photo submitted by Wendy Fillmore. - Story on p. 3 WHAT IS THE “RODDENBERRY EFFECT”? “Gene Roddenberry’s dream affects different people in different ways, and inspires different thoughts... that’s the Roddenberry Effect, and Eugene Roddenberry, Jr., Gene’s son and co-founder of Roddenberry Productions, wants to capture his father’s spirit — and how it has touched fans around the world — in a book of photographs.” - For more info, read Mark H. Anbinder’s VCS report on p. 7 USPS 017-671 125 125 Table Of Contents............................2 STARFLEET Communiqué After Action Report: R4 Conference..3 Volume I, No. 125 Spies By Night: a SF Novel.............4 A Letter to the Fleet........................4 Published by: Borg Assimilator Media Day..............5 STARFLEET, The International Mystic Realms Fantasy Festival.......6 Star Trek Fan Association, Inc.
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Anonymity Complete GUIDE by Theraider & Dangerous R
    Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 - table of contents 02 - introduction 03 - first tips 04 - about proxies 05 - cookies 06 - ftp transfers 07 - secure transactions 08 - SSL tunelling 09 - anonymity on irc 10 - mail crypto (and pgp usage) 11 - icq privacy 12 - spyware 13 - cleaning tracks 14 - ending words [ introduction ] Nowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able tu use all of its services with no concern about someone snooping on your data. Your computer being connected to the net has an IP [Internet Protocol] address. If you have a dial-up connection, then your IP changes every time you connect to the internet (this is not always true, though. There are dialup isps, specially for university students, that do have static ips). Cable modems and DSL connections have a static IP, which means that the IP address does not change. One of the goals of getting anonymous is to make sure your ip, either static or dynamic) isn't revealed to other users of the internet, or to server administrators of the servers you roam around when using internet services. This text tries to give you some hints on how to maintain your anonimity on the web.
    [Show full text]