Language Selection

English French German Italian Portuguese Spanish

IM from the Terminal: 2 Great Applications

Filed under
Reviews

This article is about two popular IM (Instant Messaging) clients that can be used in a terminal instead of a graphical environment. Both have advanced features and are based on the ncurses library.

Finch
Based on libpurple, Finch is developed by the Pidgin project, and it pretty much supports the same features of it, except for the graphical part, of course. There are many chat protocols which it supports, including AIM, IRC, MySpaceIM, WLM, SILC, Yahoo! or ICQ.

Finch allows you to change the status, report idle time based on keyboard activity or turn it off, it supports plugins, file transfers, sounds, status messages, chat timestamps, customization of the contact list. In addition, it also lets you change and remembers the position and size of the windows.

The very nice thing is that once you get to know how to use it, Finch becomes a great tool for getting the job done.

Finch plugins

Several plugins can be configured and some of the plugins that come bundled with Finch by default include:

Autoaccept – auto-accept file transfer requests from selected users
Buddy Notes – store buddy notes
Grouping – provides alternate ways to group buddies in the contact list
Join/Part Hiding – hide join/part messages in large rooms

For using Finch you can find a comprehensive guide that I wrote a while ago following this tutorial. This page on the official homepage may be of help too.

Some of the basic keyboard shortcuts include Alt+Q to quit, Alt+A to open the options window, Alt+N to switch to the next window, Alt+C to close current window, Alt+R to resize a window, Alt+M to move a window, Tab to switch through options and Space to tick/untick an option.

CenterIM
CenterIM is another powerful IM client which is being actively developed, and supports the following protocols: ICQ, Yahoo!, WLM, AIM, IRC, Jabber, Gadu-Gadu and LJ.

When it starts, CenterIM shows a configuration window with various general options that can be changed or toggled by pressing Enter. The window that follows allows you to set up accounts for all the supported protocols.

CenterIM provides a default interface with the contact list to the left, and the discussion windows to the right. The online contacts are separated from the offline ones. I tried it using the Yahoo! protocol, and the contact groups seem to be ignored. After writing the text you want to send, press Ctrl+X to send it. Use the Escape key to switch to the contact list and Q to quit CenterIM.

Configuration window

CenterIM supports aways messages, anti-spam features, windows size configuration, keyboard binding, logs, aways system.

One feature which I found to be great is the possibility to enable Emacs/Vi keyboard bindings in the text editor, this making it easy for a person who is used to one of these ways of text input.

http://www.tuxarena.com/2011/11/im-from-the-terminal-2-great-applications/

More in Tux Machines

Android Leftovers

Ubuntu 17.10 (Artful Aardvark) Is Now Available to Download

While there's no official announcement published at the moment of writing, Canonical released the final ISO images of the Ubuntu 17.10 (Artful Aardvark) operating systems and its derivatives. Read more Also: Ubuntu 17.10 Ships Today - Arguably Its Most Interesting Release In Years

Security: WPA2, RSA/TPM, and Microsoft Breach

  • Google and Apple yet to fix Wi-Fi hole in a billion devices

    The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.

  • Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

    Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.

  • ROCA: RSA encryption key flaw puts 'millions' of devices at risk

    This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.

  • Infineon RSA Key Generation Issue

    Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.

  • Microsoft remains tight-lipped about 2013 internal database hack [sic]

    A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.

  • Exclusive: Microsoft responded quietly after detecting secret database hack in 2013

    Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.

Red Hat reduces IoT tradeoffs and Asia Coverage

  • Industry Spotlight: Red Hat reduces IoT tradeoffs
    Organizations rolling out the IoT usually aren’t prepared for the additional complexity. With the IoT, data volumes grow exponentially, infrastructure management gets more complicated and the security vulnerabilities increase disproportionately. Nevertheless, IT departments are expected to handle all these changes competently without proportional increases in budget or other resources.
  • Analyse Asia 211: Red Hat in Asia & Open Innovation Institute with Dirk-Peter van Leeuwen
    Dirk-Peter van Leeuwen, senior vice president & general manager at Redhat, Asia Pacific, joined us to discuss the company’s footprint across Asia and the recent launch of their new Open Innovation Institute in Singapore. We discuss how Asian companies are in different phases of digital transformation from culture to innovation and adjusting against digital disruption.