Browse Definitions :
Definition

Internet Relay Chat (IRC)

(IUR(For terms frequently used in online keyboard chatting, see chat acronyms.

Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions and client/server software. On the Web, certain sites such as Talk City or IRC networks such as the Undernet provide servers and help you download an IRC client to your PC. Talk City also offers an IRC client applet that it downloads for you as part of their home page so that you can start chatting right away. 

You can start a chat group (called a channel) or join an existing one. There is a protocol for discovering existing chat groups and their members. Depending on the type of network, nicknames can be reserved (registered) or just used during the session. Some channels encourage you to register a nickname that you always use and even offer space for a personal profile, picture, and personal home page link.

Popular ongoing IRC channels are #hottub and #riskybus. A number of channels are set up and conducted in foreign languages. The most common IRC networks are IRCnet (mostly European), EFnet (mostly North American), Undernet, and Dalnet. Popular IRC clients include mIRC for Windows, IRCle for Mac OS, and irc2 (the original client) for UNIX-base operating systems.

The IRC protocol uses Transmission Control Protocol (you can IRC via a Telnet client), usually on port 6667.

This was last updated in December 2005

Continue Reading About Internet Relay Chat (IRC)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Hi 
Cancel
Hey, Hello, Hi, Hola, Bonjour, Merhaba, G'day Mate, Howdy
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close