Browse Definitions :
Definition

Internet Relay Chat (IRC)

(IUR(For terms frequently used in online keyboard chatting, see chat acronyms.

Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions and client/server software. On the Web, certain sites such as Talk City or IRC networks such as the Undernet provide servers and help you download an IRC client to your PC. Talk City also offers an IRC client applet that it downloads for you as part of their home page so that you can start chatting right away. 

You can start a chat group (called a channel) or join an existing one. There is a protocol for discovering existing chat groups and their members. Depending on the type of network, nicknames can be reserved (registered) or just used during the session. Some channels encourage you to register a nickname that you always use and even offer space for a personal profile, picture, and personal home page link.

Popular ongoing IRC channels are #hottub and #riskybus. A number of channels are set up and conducted in foreign languages. The most common IRC networks are IRCnet (mostly European), EFnet (mostly North American), Undernet, and Dalnet. Popular IRC clients include mIRC for Windows, IRCle for Mac OS, and irc2 (the original client) for UNIX-base operating systems.

The IRC protocol uses Transmission Control Protocol (you can IRC via a Telnet client), usually on port 6667.

This was last updated in December 2005

Continue Reading About Internet Relay Chat (IRC)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close