Also known as Short Message Service (SMS), a service available on most digital mobile phones and other mobile devices that permits the sending of short text messages. “ Ooh look, his first text message.” www.wikipedia.com Text Messaging (SMS)
Instant Messaging Also known as IM , a form of real-time communication between two or more people based on typed text. The text is conveyed via computers connected over a network such as the Internet . www.wikipedia.com
How is an Identity Stolen? Attempting to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing Typically carried out using email or an instant message , and often directs users to a website.
A hacker 's attack aiming to redirect a website 's traffic to another (bogus) website . Pharming Pharming has become of major concern to businesses hosting ecommerce and online banking websites How is an Identity Stolen?
Spam Spam refers to junk e-mail or unsolicited e-mail. Similar abuses in other media: instant messaging spam , Usenet newsgroup spam , Web search engine spam , spam in blogs , mobile phone messaging spam , etc.
Cyberbullying Bullying and harassment by use of electronic devices though means of e-mail , instant messaging , text messages , blogs , mobile phones , pagers , and websites .
Make sure your computer is located in a high-traffic area in the house. This includes laptops and other wireless devices
Communicate with your children about what pornography is and why it is inappropriate for them.
Teach your child “Internal Filtering Mechanisms” and how to avoid pornography on the Web.
Check your home computer for signs that these types of sites have visited
Basic Things that Parents Can Do
Checking Your Computer for Sexually-Explicit Material Your computer has a powerful search function which can indicate if someone has visited pornographic Web sites. In Windows, click on the Start button in the lower left hand of your monitor, and slide up to search, and slide over to "files and folders." Search Your Computer
Checking Your Computer for Sexually-Explicit Material Select “All files and folders” from the window that appears. Search Your Computer Continued...
Search for Cookies You can inspect the folder where cookies are to look for any lewdly-named or suspicious cookies. Type in the word cookie in the search field and hit "search now." Make sure the "Look in" setting is set to look in your primary hard drive, usually "C," although you may want to repeat the search in any additional hard drives. Checking Your Computer for Sexually-Explicit Material
Most Web images are in a format that ends with either .jpg or .gif, such as "bicycle.jpg" or "vase.gif". When you view a Web site, these images are stored in various places on your hard drive. To find all such images in your hard drive, put an asterisk followed by a period in front of the name of the image format in the search window. Search for Images Checking Your Computer for Sexually-Explicit Material
Open your web browser (Internet Explorer) and select “Tools” and “Internet Options” Search Your Browser Another Way to Check Your Computer for Sexually-Explicit Material
Select “Settings” from the “Browsing history” section. Search Your Browser Continued... Another Way to Check Your Computer for Sexually-Explicit Material
Select “View files” and a list of cookies and picture files will appear and show the web sites where the files originated. *Note: if there are very few of them, someone is most likely deleting them from the Temporary Internet Files folder. Another Way to Check Your Computer for Sexually-Explicit Material Search Your Browser Continued...
Your Web browser software (Internet Explorer, Firefox, Opera, etc.) contains very little or NO history.
There are several Web browsers installed on your computer.
Temporary files are deleted from the temporary folder
Web Browser search bar history is deleted
Less Obvious Signs that Internet No, No's are Taking Place
Software Filters Software filters work by blocking access to Web sites with unacceptable content or language. They are imperfect and depend to some extent on the Web sites' honesty in classifying themselves as x-rated.
“ The Government’s Launched a free Online filter to protect children from Internet Nasties…Um…Could you show me how to download it…?”
Keystroke Tracking Keystroke tracking programs are spy software that monitor every word typed, every program launched and every Web site visited. They do not censor the content, but rather send a report to the parent or person who installed the spy program.
“ I just can’t communicate with my child anymore. It’s like she speaks another language.” What Else Can Parents & Teachers Do?