This article needs additional citations for verification. (August 2012) (Learn how and when to remove this template message)
|Original author(s)||Khaled Mardam-Bey|
|Developer(s)||mIRC Co. Ltd.|
|Initial release||February 28, 1995|
|Stable release||7.63 (August 17, 2020)|
|Operating system||Windows XP and later|
mIRC has been described as "one of the most popular IRC clients available for Windows." It has been downloaded over 40 million times from CNET's Download.com service. In 2003, Nielsen/NetRatings ranked mIRC among the top ten most popular Internet applications.
mIRC was created by Khaled Mardam-Bey (Arabic: خالد مردم بي), a British programmer of Palestinian and Syrian origin. He began developing the software in late 1994, and released its first version on February 28, 1995.
Mardam-Bey states that he decided to create mIRC because he felt the first IRC clients for Windows lacked some basic IRC features. He then continued developing it due to the challenge and the fact that people appreciated his work. The author states that its subsequent popularity allowed him to make a living out of mIRC. mIRC is shareware and requires payment for registration after the 30-day evaluation period.
mIRC has a number of distinguishing features. One is its scripting language which is further developed with each version. The scripting language can be used to make minor changes to the program like custom commands (aliases), but can also be used to completely alter the behavior and appearance of mIRC. Another claimed feature is mIRC's file sharing abilities, via the DCC protocol, featuring a built-in file server.
mIRC's abilities and behaviors can be altered and extended using the embedded mIRC scripting language. mIRC includes its own GUI scripting editor, with help that has been described as "extremely detailed".
Due to the level of access the language has to a user's computer — for example, being able to rename and delete files — a number of abusive scripts have been made. One example of abuse was that executed with the $decode identifier which decodes a given encoded string. The issue was reported in August 2001; even five months later, users were still being reported as having fallen prey, tricked into executing commands on their systems which result in "handing control of [their] mIRC over to somebody else". This led to changes being made in mIRC version 6.17: according to the author, $decode is now disabled by default, and various other features which can be considered dangerous are now lockable.
- "mIRC: Latest News". mirc.com. Retrieved 2020-03-01.
- "mIRC: Personal FAQ". mirc.com. Retrieved 2018-12-10.
- Smith, Chris (2004). "Hack #20 Automate IRC with Scripting". In Paul Mutton\ (ed.). IRC Hacks: 100 Industrial-Strength Tips & Tools. O'Reilly Media, Inc. pp. 71–74. ISBN 9780596006877.
- "mIRC". Download.CNet.com. Retrieved 2018-12-10.
- "InternetNews Traffic Patterns 2003". InternetNews.com. Retrieved 2008-08-13.
- "mIRC: Khaled Mardam-Bey". www.mirc.com.
- "Registration". mirc.com.
- "mIRC 6.0 drops 16bit support". mirc.com.
- "mIRC download for 6.35 and latest version". mirc.com. Retrieved 2018-12-10.
- "mIRC FAQ: Section 6". mirc.com. Retrieved 2018-12-10.
- "mIRC: Latest News". mirc.com. Retrieved 2018-12-10.
- "mIRC Backdoors - An Advanced Overview". originally by ReDeeMeR. Securiteam.com Windows NT Focus. 24 February 2002.
- Ahmadi Bidakhwidi, Mohammad (2005) "mIRC Worm" Archived 2012-11-03 at the Wayback Machine. The Ethical Hacker.
- Lo, Joseph, ed. (January 4, 2002). "IRC News Jan 04 02 Happy 2002 - //$decode trojan keeps going and going... " Archived 2012-08-01 at the Wayback Machine. and
"Aug 30 01 mIRC $decode() exploit." IRChelp.org.
- Szor, Peter (2005). "3.7.7". The Art of Computer Virus Research and Defense. Pearson Education.
- Harley, David; Vibert, Robert S. (2007). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 147. ISBN 9780080558660.
- Adomi, Esharenana E. (2008). Security and Software for Cybercafés. Idea Group Inc. p. 173.
- Jakobsson, Markus; Ramzan, Zulfikar (2008). Crimeware: Understanding New Attacks and Defenses. Addison-Wesley Professional. p. 194. ISBN 9780132701969.