Do You Text Chat (IM) Online?

IM (Instant Messaging) - man, we thought we had it made in the shade when we stumbled over this unique way to communicate! Outside of talking person-to-person on the phone, IM was the next best thing. Texting talk was endless and cost was nonexistent. Well, those were the good old days of yore ? you know, those days of glorious innocence.

Just as we were getting oh so comfortable, happily IMing away to each other, then came the cloak-and-dagger entrance of the treacherous "IM villains". With their ominous arrival, the party abruptly ended. It seemed like overnight, our instant messaging (IM) turned into instant mercenaries, and the carnage was strewn all over the Internet.

First, it was one by one, then the numbers increased and starting growing exponentially, as friends began receiving, and inadvertently sending, viruses, worms, and Trojan horses. Then it went from bad to worse, as report after report surfaced describing the grisly results of innocent victims losing their identity because these villains had accessed their personal and confidential information. Truly this was the darkest of times for all IMer friends ? regardless of the IM service we were texting on.

How could this have happened? And more importantly, how can we protect ourselves?

Well, I found out that these villainous hackers had accessed a nifty little program originally designed to benefit us, and twisted it to intercept our conversations traveling across the internet. They now have a profitable tool to use that intercepts our data packets and sends us a virus, and duplicates it by sending the same ugly bug to everyone on our Buddy List.

Once a hacker has gained access to our Buddy List, they trick our friends into thinking WE, (a trusted source), are sending them a file to download. Then when our friends innocently download the file, these villains can then access their computers as well, and use the personal and confidential information gathered to line their own pockets. How it affected businesses whose employees used IM to communicate?well, I will just let your imagination take over from there?because the hackers let theirs do the same.

A lot of us were thinking that we had nothing to worry about because we had anti-virus software on our computers, and that provided the protection we needed. Wrong!

Anti-virus software is not designed to protect our data packets traveling across the internet. There are still no anti-virus applications that directly monitor IM traffic. This is due to the difficulty in finding IM traffic as it is often embedded inside http packets. And what is worse yet is that Forrester's, Root stated that "In 2005 and 2006, we expect IM to get hit with some serious attacks?"

But, don't despair! I have discovered a cure!

In fact, I discovered the best of both worlds. What I have found is a computer phone (in "techy" terms known as VoIP ? voice over internet protocol) that is optimally secure. One of the many features of the computer phone is the IM that is built into it. Thus, the IM instant messages are sent over optimally secure lines rather than openly public lines on the Internet -- AND I can also actually talk to friends from my computer phone any time I want. The "good old days of yore" are back with even more !!!

Here's what a computer phone is all about.

The computer phone was the creation resulting from taking the convenience and features of the telephone and combining it with the power of the Internet. Pretty ingenious I think! Although most computers have a built in microphone, some do not. Mine was one of those computers that did not. So, I ran down to a local store and bought one for $5. Then, much to my delight, I found out that it easily plugged into the back of my computer.

Here is what is really incredible about a computer phone. I can talk, IM, make 3-way calls, transfer a call to my cell phone if I am running out the door, and much, much more.

Actually, I have become so accustomed to the convenience of the features on my computer phone, that it actually becomes frustrating when I cannot IM a friend I am talking to on their cell phone or telephone. You see, often times, I find great sites to share with my friends, so I have to slowly spell out the location over the phone and repeat the letters so they get the right site, then wait for them to repeat it back to me, rather than quickly IMing them the site and letting them click on it right then and there.

One final word of wisdom -- over 90% of all computer phone (VoIP) services out there do not operate on secure lines. The one I am using is optimally secure because they have their own proprietary high end encryption codec (code) with patented technology that is hosted in a professional facility. You just can't get any better than that!

Want to try a computer phone out for yourself?

You can download the software and try it out for 7 days absolutely free and without any contract, obligations, or hassles. Here's the place to visit http://www.free-pc-phone.com Oh, and yes, you will love this?.if you use a dial up connection to the internet, these computer phones work too, in addition to satellite, cable, and wireless connections.

Dee Scrip is a well-known and respected published author of numerous articles on VoIP, VoIP security, and other VoIP related issues. http://www.free-pc-phone.com

Ashley limo service at o'hare ..
In The News:

Tech expert Kurt “CyberGuy" Knutsson explains how a VPN boosts privacy by encrypting data and hiding your IP, but more is needed for anonymity.
Tech expert Kurt “CyberGuy" Knutsson explains how NoviOcean's hybrid platform uses wind, solar and wave power to generate clean energy.
Scammers are offering video streaming for funeral services and taking advantage of people who are grieving to get credit card information.
Windows operating system users face more than 600 million cyberattacks every day, according to Kurt "CyberGuy" Knutsson. The attacks are on the rise.
Natural disasters like Hurricane Helene in North Carolina illustrate the need for aircraft capable of accessing remote or disaster-stricken areas with minimal infrastructure.
Scammers have illustrated that cryptocurrency is not as foolproof as it has promised. Americans lost $5.6 billion to crypto scams in 2023, according to the FBI.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A humanoid robot made by a Chinese company proposes to redefine personalized elderly care and assistance for people with disabilities.
An architecture firm has unveiled the concept for a 454-foot gigayacht that combines luxury, innovation and style and can accommodate 22 guests and 52 crew members.
For those with visual challenges, there are a number of voice-dialing apps and features to help make phone calls without having to see numbers.
Tech guru Kurt "CyberGuy" Knutsson reveals some of the iPhone settings you may want to turn off to improve privacy after updating to iOS 18.
Preserving the memories of loved ones through photos, videos and media content have advanced with technology, ensure you can experience those fond memories for years.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech expert Kurt “CyberGuy" Knutsson talks about a new AI-powered scam that targets Gmail users and is harder to detect unless you're very cautious.
Tesla's "We, Robot" event reveals the Robovan, Robotaxi and the Optimus humanoid robot. Kurt “CyberGuy" Knutsson examines the company's latest innovations in autonomous technology.
Reports warn of a scam text falsely claiming that recipients aren’t registered to vote. Kurt “CyberGuy" Knutsson reveals what you need to know and five tips to avoid such schemes.
Tech expert Kurt “CyberGuy" Knutsson explores the iOS 18’s new features to hide and lock apps for better privacy and organization.
Tech expert Kurt “CyberGuy" Knutsson reveals how security experts found new malware, Lumma Stealer, spreading via fake verification pages.
First indoor vertical berry farm opens in Virginia, using AI to grow 4 million pounds annually. Tech expert Kurt “CyberGuy" Knutsson takes a closer look at the "growing" trend.
Having Wi-Fi has become a necessity for many of us. Kurt "CyberGuy" Knutsson explores the top five ways to equip your vehicles with Wi-Fi.
The Vulcan is Icon's massive 3D printer, which stands 15½ feet tall and weighs 4.75 tons. It's capable of creating buildings with 12-foot-high curving walls.
Fidelity Investments, one of the world's biggest asset managers, experienced a data breach in August, the company's second in 12 months.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Apple’s new Emergency SOS Live Video feature allows users to share live video footage of the emergency directly with first responders.

Bluetooth Computer Headsets - Enjoy Wireless Freedom

Wireless Computer HeadsetsTill recently, few options were available to people... Read More

VoIP is Less Taxing than Traditional Telephone Service

When it comes to VoIP Broadband Telephone service, there are... Read More

The Dangers of Peer-to-Peer Systems

Peer-to-Peer (P2P) systems do not operate on secure lines, thus... Read More

How to Choose VoIP Service Without Losing Your Shirt

Voip.Just mentioning the word to yourself either brings up images... Read More

Voice Over IP ? Saving Money

I was on a tech support call with a client... Read More

Finally Voip Worth a Look!

Everyone can Benefit from this Technology! Voip will be next... Read More

A Look at Internet Voice Technology (VoIP) for Residential

Today's TechnologyOver the years, the technology has made remarkable progress.... Read More

Consumer Review on CallWave Call Alert Service

Missing phone calls while you are online?Are you thinking of... Read More

Is VoIP Good For The Home?

There is no doubt that you have heard about VoIP... Read More

Benefits of VoIP

You may not have considered it but there are many... Read More

VoIP (Computer Phone) Warning

Warning! Warning! Warning!Beware of VoIP internet service providers that operate... Read More

Text To Speech - Its Simple

Looking for a natural voice speech engine? Curious about what... Read More

Alarm Systems & VoIP (Voice over Internet Protocol) Phone Lines

An astounding and unexpected number of people are dropping their... Read More

Needless HIGH RISK Exposure For Business Using Computer Phones

The Facts? Computer phones (VoIP) offer the most optimal means... Read More

Instant Menaces or Instant Messengers?

Many vendors offering Instant Messaging (IM) services have added new... Read More

6 Important Things You Should Consider When You Are Selecting A VoIP Provider

The following are 6 very important factors to consider when... Read More

Faxing over VoIP

As far as VoIP has come in Voice telephone calls,... Read More

Will the Bell System Survive? A Massive Transfer of Wealth from Bell to VoIP is Underway

Will the Bell System Survive? A Massive Transfer of Wealth... Read More

VoIP and 911 Warning

Be leery of your VoIP phone system in case of... Read More

Broadband Phone Technology - Top 5 Reasons You Should Take Notice

For the uninitiated, the term broadband phone is loosely used... Read More

Outstanding VoIP Voicemail Features Makes Getting VoIP Voicemail Extremely Convenient

There are many types of VoIP (Voice over Internet Protocol)... Read More

VOIP Questions and Answers

Voice over Internet Protocol, or VoIP, has grown in popularity... Read More

How VoIP Will Affect Every Household and Business in the World

Seattle venture capitalist, Greg Gottesman, calls it "?one of the... Read More

Should You ,VoIP?

My friend in Florida, Samuel, called me last week and... Read More

Why Over 90% of VoIP Services Are Vulnerable to Attack

John Ashcroft, Attorney General, in remarks at the High Technology... Read More

Elmhurst prom limo ..