![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on. There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN. Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child. Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address. There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on. So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them. To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well. If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult). Just let your child know what you have done and that it is for their own safety. Remember, it's up to you to ensure your child has a safe browsing experience. I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
MORE RESOURCES: Should iPhone users use security keys and Advanced Data Protection? The Washington Post Ukraine preparing for major escalation by Russia, top Ukrainian security official tells Sky News Sky News CISA establishes new office to ‘operationalize’ supply chain security Federal News Network Security Is Key to Maximizing Cloud Adoption Success in Healthcare HealthITSecurity Why Traditional Approaches Don’t Work for API Security Security Boulevard Pakistan bombing raises fears over security breach, 100 dead The Associated Press - en Español LA-based Embedded Ventures launches inaugural fund, with focus on national security and space tech CNBC Nicholas Kathmann named LogicGate Chief Information Security ... Security Magazine Security officers coming back to East Lansing High School, other ... Lansing State Journal A first-hand look inside Walmart's robust security operations Cybersecurity Dive Data Privacy and the Journey of Smarter Security | Spiceworks News and Insights 2 security guards shot, 1 fatally, at San Bernardino County party KTLA Los Angeles How to Set Up Security Keys for Apple ID on Your iPhone The Mac Observer How much of a security threat is the Pakistani Taliban? Al Jazeera English Smuggler tells U.S. jury he paid off ex-Mexico security chief Los Angeles Times USENIX Security ’22 – Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu – ‘ Rol... Security Boulevard Africa and the global LNG crunch: Balancing energy security ... Atlantic Council National Association of Counties and Election Security Government Technology Nigeria Security Tracker Weekly Update: January 21-27 Council on Foreign Relations Case May Impact Role of Lawyers in Data Breaches and IR Security Boulevard IRS Income-Tax Investigations Threaten Taxpayer Security National Review U.S. military poised to secure new access to key Philippine bases The Washington Post $1M of funding announced for protection of non-profits PAHomePage.com Column: Ukraine's fight benefits U.S. national security. The House GOP is on the wrong side Yahoo News School where boy shot teacher reopens with added security The Associated Press - en Español AITX and Robotic Assistance Devices Announces Price Changes for Some Security Robots - Yahoo Finance Russian APT groups continue attacks with wipers and ransomware Security Magazine Google’s open source team layoffs: Your software supply chain security is at risk Security Boulevard Fort Worth Zoo increases security in wake of animal disappearances, death in Dallas Fort Worth Star-Telegram Abbas assures US security ties with Israel only partially cut, can be restored - The Times of Israel Abbas assures US security ties with Israel only partially cut, can be restored The Times of Israel Homeland Security issues warning about rise in sextortion cases UpNorthLive.com Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Is the UK the Security Leader Europe Needs? The National Interest Online The Definitive Browser Security Checklist The Hacker News Drunken Disney Park Guests Fight, Security Pulled Into Altercation Inside the Magic How Schools Have Boosted Security as Shootings Become More Common The New York Times More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security 20 Careers You Can Get with a Homeland Security Degree | Keiser Keiser University At Marine Raiders' homicide trial, questions center on security video Marine Corps Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post |
![]() |
![]() |
![]() |
RELATED ARTICLES
From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. ![]() |
home | site map |
© 2006 |