My understanding is that the "real" hackers hang out virtually in mIRC. That's why you have to do the "extraordinary" configuration measures in your mIRC client to hide info from them. If you don't use it, I wouldn't worry about it.
A forum community dedicated to tech experts and enthusiasts. Come join the discussion about articles, computer security, Mac, Microsoft, Linux, hardware, networking, gaming, reviews, accessories, and more!