Security Information |
Protecting Your Children On The Internet
If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Many young people find instant messaging and e-mail a convenient and fun way to talk with their friends. If you have children, like me, when they're not on the phone, they're talking with their friends on the Internet. We have very strict rules and guidelines about who they can talk with and for how long. We have given them detailed instructions on what to do when they receive e-mail from someone they don't know or receive an anonymous instant message. Recently, someone close to me received a death threat via an anonymous instant message. The language this person used was so vulgar and explicit you would have thought it came from a prison inmate. Interestingly enough, the person at the other end was a child. After significant investigation we determined this person was a school mate. They had received detailed information about the child including the child's instant messenger alias, their home address and color, and what type of cars the family drove. Can you imagine how scared this child and child's family was? Quite frankly, it was not only sad but sickening that another child could be so verbally brutal. Additional investigation revealed that the school these children go to were aware that this had been going on for quite some time. Other children had been receiving similar threats. This particular event was all the result of several children speaking in a chat roam and one child in particular got upset about something that was said. That child contacted another child, who is known to be mean, and asked them to scare one of the other children. We got to the bottom of the whole mess and everyone felt a bit of relief. It's very important to pay attention and, in some cases, monitor what children are doing on the Internet. It's for their protection and the protection of others. I'm sure I am going to get an ear full from privacy rights advocates on this one. Regardless, the safety of our children is one of the most important tasks a parent has. If your children use e-mail and Instant Messaging on a regular basis you should; 1) Limit the number of people they can e-mail and message with; Update: Shortly after writing this article, a 13 year old boy at a middle school in my area was arrested for e-mailing death threats to two teachers. In one e-mail he indicated he was planning on bringing a gun to school to kill a teacher. The other e-mail, sent to a teacher at a different school, indicated that he planned on targeting students as well. For further details please see the full article at South Florida's Sun Sentinel "http://www.sun-sentinel.com/news/local/palmbeach/sfl-pcletter18feb18,1,216444.story?ctrack=1&cset=true." For information on computer monitoring software take a look at WatchRight http://www.watchright.com/. A good site to visit to learn more about protecting children on the Internet is www.protectkids.com. It's full of great information every parent should know. Other sites you may want to visit are http://www.isafe.org/, and Obscenity Crimes Reporting http://www.obscenitycrimes.org/. About The Author
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. |
home | site map | contact us |