Security Information |
|
How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on. There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN. Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child. Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address. There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on. So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them. To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well. If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult). Just let your child know what you have done and that it is for their own safety. Remember, it's up to you to ensure your child has a safe browsing experience. I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post Nuclear power for military bases will increase our national security Breaking Defense U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times New 'spectral fingerprint' atlas of satellites aims to improve space security University of Arizona News Opinion | Trump’s national security wrecking crew The Washington Post ‘Never trust, always verify’: The zero trust approach to network security United States Army Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Trump’s National Security Team Keeps Getting More Extreme The New Republic Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider The Fastest Airport Security Line You Don’t Know About The Wall Street Journal The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Tuskegee president releases security updates following shooting WIAT - CBS42.com Do Titans QB, Coach Have Job Security? Sports Illustrated Inside The 2024 Security Benchmark Report Security Magazine Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press The UN cybercrime convention threatens security research. The US should do something about it CyberScoop Your favorite security leadership podcasts Security Magazine France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal Tuskegee University Shifts Security, Facilities Leadership Tuskegee University France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner New infosec products of the week: November 15, 2024 Help Net Security Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Trump Picks Kristi Noem for Homeland Security Secretary The New York Times Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Lamar CISD invests in safety, security amid rapid growth Community Impact Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times Security guard turned gunman: Christopher Farrell's fatal rampage in downtown San Diego - CBS News 8 |
RELATED ARTICLES
Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. |
home | site map |
© 2006 |