Security Information |
How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on. There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN. Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child. Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address. There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on. So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them. To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well. If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult). Just let your child know what you have done and that it is for their own safety. Remember, it's up to you to ensure your child has a safe browsing experience. I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. |
home | site map | contact us |