When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.
As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on.
There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN.
Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child.
Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address.
There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on.
So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them.
To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well.
If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult).
Just let your child know what you have done and that it is for their own safety.
Remember, it's up to you to ensure your child has a safe browsing experience.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Before we start, I want to make it clear that... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Did you know...? 1 in 5 children who use computer... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Every single time you access a website, you leave tracks.... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
If you use the internet, you have probably been infected... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Is your data secure? Think again. Securing data is unlike... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Phishing is the act of some individual sending an email... Read More
They're out there. Individuals trying to make a quick buck... Read More
While clicking from site to site on the internet you... Read More
First of all we need to get some terms stated.... Read More
Let us take the example of scrambling an egg. First,... Read More
You can detect spyware online using free spyware cleaners and... Read More
We all know that it's dangerous to use the same... Read More
The Internet is a vast International Network of people and... Read More
Well, if that would have been said to me by... Read More
Shopping for horse gifts or other gift items on the... Read More
So you want to know who your kids are chatting... Read More
Spyware is software that runs on a personal computer without... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Before you enter your name, address or any other data... Read More
If you are a parent, you have probably wondered at... Read More
Huge number of spyware software applications are available in the... Read More
Fishing on the Internet has come a long way. However,... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
No longer are viruses the only threat on the internet.... Read More
It's late. You've been scouring the web for that perfect... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Identity theft rates one of the fastest growing crimes in... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Only the top spyware removers are successful at detecting and... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
The top five online scams on the Internet hit nearly... Read More
Identity Theft is one of the most serious problems facing... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
By browsing a web page, you could infect your computer... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
We all know that it's dangerous to use the same... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Internet scams and frauds are on the rise! The quantity... Read More
If you are a parent, as am I, I think... Read More
Security leaks can be a big problem for any site... Read More
A new variation of the Nigerian Scam theme ... Read More
P C. owners are constantly at risk from attacks by... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
If you know what is the 'Fishing' then it's very... Read More
As the number of people using the Internet as an... Read More
As soon as almost all computer users already got used... Read More
Working from home has its advantages, including no commute, a... Read More
Internet Security |