Reginald Choudari
2012-12-07 23:24:29 UTC
hello,
we have been trying to get IRC access at my company since we do a lot of dev work with open source projects. currently we have been using a "workaround" while waiting for the infrastructure guys to deploy to us a "VDI solution" for us to use ... methinks it will take a long while.
their reasoning for not allowing access right off the bat is due to risks involving worms, viruses, trojans, etc.. which brings me to my question.
what are the real security threats in using IRC? worms/viruses/trojans require SOME user action to actually access a link or run an executable, so on and so forth.. what else could using IRC potentially make us vunerable?
thanks,
reginald
we have been trying to get IRC access at my company since we do a lot of dev work with open source projects. currently we have been using a "workaround" while waiting for the infrastructure guys to deploy to us a "VDI solution" for us to use ... methinks it will take a long while.
their reasoning for not allowing access right off the bat is due to risks involving worms, viruses, trojans, etc.. which brings me to my question.
what are the real security threats in using IRC? worms/viruses/trojans require SOME user action to actually access a link or run an executable, so on and so forth.. what else could using IRC potentially make us vunerable?
thanks,
reginald