How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.
As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on.
There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN.
Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child.
Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address.
There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on.
So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them.
To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well.
If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult).
Just let your child know what you have done and that it is for their own safety.
Remember, it's up to you to ensure your child has a safe browsing experience.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
Should iPhone users use security keys and Advanced Data Protection? The Washington Post
Ukraine preparing for major escalation by Russia, top Ukrainian security official tells Sky News - Sky News
Ukraine preparing for major escalation by Russia, top Ukrainian security official tells Sky News Sky News
CISA establishes new office to ‘operationalize’ supply chain security Federal News Network
Security Is Key to Maximizing Cloud Adoption Success in Healthcare HealthITSecurity
Guardz emerges from stealth with $10M for SMB security and cyber insurance to protect against attack-as-a-service breaches - TechCrunch
Guardz emerges from stealth with $10M for SMB security and cyber insurance to protect against attack-as-a-service breaches TechCrunch
Why Traditional Approaches Don’t Work for API Security Security Boulevard
Pakistan bombing raises fears over security breach, 100 dead The Associated Press - en Español
LA-based Embedded Ventures launches inaugural fund, with focus on national security and space tech - CNBC
LA-based Embedded Ventures launches inaugural fund, with focus on national security and space tech CNBC
Nicholas Kathmann named LogicGate Chief Information Security ... Security Magazine
Security officers coming back to East Lansing High School, other ... Lansing State Journal
A first-hand look inside Walmart's robust security operations Cybersecurity Dive
Data Privacy and the Journey of Smarter Security | Spiceworks News and Insights
2 security guards shot, 1 fatally, at San Bernardino County party KTLA Los Angeles
How to Set Up Security Keys for Apple ID on Your iPhone The Mac Observer
How much of a security threat is the Pakistani Taliban? Al Jazeera English
Smuggler tells U.S. jury he paid off ex-Mexico security chief Los Angeles Times
USENIX Security ’22 – Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu – ‘ Rol... - Security Boulevard
USENIX Security ’22 – Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu – ‘ Rol... Security Boulevard
Africa and the global LNG crunch: Balancing energy security ... Atlantic Council
National Association of Counties and Election Security Government Technology
Nigeria Security Tracker Weekly Update: January 21-27 Council on Foreign Relations
Case May Impact Role of Lawyers in Data Breaches and IR Security Boulevard
IRS Income-Tax Investigations Threaten Taxpayer Security National Review
U.S. military poised to secure new access to key Philippine bases The Washington Post
$1M of funding announced for protection of non-profits PAHomePage.com
Column: Ukraine's fight benefits U.S. national security. The House GOP is on the wrong side - Yahoo News
Column: Ukraine's fight benefits U.S. national security. The House GOP is on the wrong side Yahoo News
School where boy shot teacher reopens with added security The Associated Press - en Español
AITX and Robotic Assistance Devices Announces Price Changes for Some Security Robots - Yahoo Finance
Russian APT groups continue attacks with wipers and ransomware Security Magazine
Google’s open source team layoffs: Your software supply chain security is at risk - Security Boulevard
Google’s open source team layoffs: Your software supply chain security is at risk Security Boulevard
Fort Worth Zoo increases security in wake of animal disappearances, death in Dallas - Fort Worth Star-Telegram
Fort Worth Zoo increases security in wake of animal disappearances, death in Dallas Fort Worth Star-Telegram
Abbas assures US security ties with Israel only partially cut, can be restored - The Times of Israel
Abbas assures US security ties with Israel only partially cut, can be restored The Times of Israel
Homeland Security issues warning about rise in sextortion cases UpNorthLive.com
Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security
Nuclear security alert after botched attempt to fix Trident submarine with super glue... - The US Sun
Is the UK the Security Leader Europe Needs? The National Interest Online
The Definitive Browser Security Checklist The Hacker News
Drunken Disney Park Guests Fight, Security Pulled Into Altercation Inside the Magic
How Schools Have Boosted Security as Shootings Become More Common The New York Times
More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense
DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security
20 Careers You Can Get with a Homeland Security Degree | Keiser Keiser University
At Marine Raiders' homicide trial, questions center on security video Marine Corps Times
Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post
From Spyware with Love!
It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho.
An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me.
Website Security - Creating a Bulletproof Site in 5 Easy Steps
When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site.
Money Mule Email Scam Hits U.S.
Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required.
Delete Cookies: New-Age Diet or Common Sense Internet Security?
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them.
Three-pronged Trojan Attack Threatens Security on the Internet
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing.
Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating.
3 Steps to Ending Scams and Virus Problems
Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
Its Time to Sing the Encryption Song - Again!
Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product.
Free Ways to Tackle Threats to Your Computer
Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either.
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes.
3 Pervasive Phishing Scams
Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites.
Password Security and Safety
There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment.
Internet Identity Theft - How You Can Shield Yourself
With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan.
Don't Become An Identity Fraud Statistic!
"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call.
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home.
Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet.
|home | site map|