Young people are increasingly using new technologies - cell phone text messaging, chat rooms, online games, instant messaging and the Internet - as part of their regular socializing activities. An astonishing 99% of Canadian teens have access to the Internet and 70% of youth online use instant messaging to chat with friends. ( The Canadian Interactive Report: Understanding Canada and the Internet, Ipsos Reid Canada, 2004) These new opportunities to connect come with new risks of being harassed or bullied or exposed to sexual predators online. In 2003, some 25 % of girls reported having contact with a stranger online that made them feel unsafe. Cyber-bullying in the form of intimidation in chat rooms, threats and harassment through instant messages, or hateful web sites, (for example, sites that let viewers vote for the ugliest kid in school), present new challenges to keep teens safe online.
Cell Phone Account Restrictions. Wi-Fi Planet Staff June 2, 2006 New Requests for Proposals (RFPs) issued this week for citywide Wi-Fi networks: Alexandria, Virginia , with a 16 square mile area, wants service for local government workers (for free) as well as the general public — free access is expected in some public areas, and the price for residential wireless broadband will be limited to $20. 1997 Fairfax County library officials plan to reexamine their Internet policy in September and decide whether to take steps to block access to pornographic material, said spokeswoman Lois Kirkpatrick. The county currently has computers hooked up to the Internet in 18 of its branches; most don't have filtering software .
1. What is Hardware KeyLogger and how does it work? Hardware KeyLogger is a tiny circuit board that is connected in between the computer and the keyboard. It has its own flash memory to store all the keystrokes. 2. How does it generate a menu in my word processor without any software installed? Hardware KeyLogger generates a menu by simulating keystroke typing. The computer thinks that you are typing while actually the Hardware KeyLogger is doing the job! 3. How do I retrieve the keystrokes? You can retrieve the keystrokes by typing your password in any word processor such as Notepad. There are detailed instructions here>>> 4. Can I tell between a normal keyboard and a Hardware KeyLogger Keyboard Edition without knowing the password? No, you cannot. We use off-the-shelf keyboards from major keyboard manufacturers, then convert it into the Hardware KeyLogger Keyboard Edition by embedding our tiny Hardware KeyLogger chip into it. And we don't mark the keyboard in anyway. Even we cannot tell the difference unless we open the keyboard. 5. What keyboards are you using for the Hardware KeyLogger Keyboard Edition? For brand-name keyboards, we are using keyboards from major manufacturers including Dell, IBM, HP, Compaq, Microsoft and Logitech. For generic keyboards, we may use any keyboard on the market. Click here for more info>>> 6. Is there a way to tell if a keyboard is a Hardware KeyLogger Keyboard Edition? Will software scanning work? No, unless you open up the keyboard and know what to look for. Software scanning won't work. 7. I have an old computer, the log download always stops in the middle. What can I do? You can set &quot;7 - adjust playback speed&quot; to &quot;Normal&quot; or &quot;Slow&quot;. Most modern computers can accept the default &quot;Fast&quot; playback speed. However, if you have a computer that is several years old, and you are getting a lot of &quot;mistyped&quot; words, try adjusting the playback speed down. The older computers don't believe that you can type 300 characters per second. :-) 8. The Hardware KeyLogger menu certainly has a lot of choices. Do you have a page that describes in detail how to use each menu option? Yes, of course! Please go to this page>>> . 9. What happens if keystroke log fills up? The most recent keystrokes are preserved, the oldest keystrokes are overwritten. For example, the 2 Meg models stores 2,000,000+ keystrokes. When the flash memory is full, it will overwrite the oldest keystrokes gradually with the newest ones. In this manner, it stores the most recent 2 million keystrokes. 10. Can the Hardware KeyLogger be discovered by a special software? No. Installation of the Hardware KeyLogger does not affect the computer operation in any way. It does not use any of your computer memory. It's impossible to discover the existence of Hardware KeyLogger with a software program.
Examples of search engines with the option for filtering are google.com and yahoo.com (go to “preferences” to set the filter for all searches or to “advanced search” for single-use filtering). Lycos.com offers a password-protected SearchGuard, which allows for specific choices of filtered subjects (i.e. adult content, weapons). Kid-friendly search engines are designed with children in mind. Most are pre-screened so that the searches only pull results from pre-approved sites. Two of the most popular sites are children’s versions of established search engines: yahooligans.com (from yahoo.com ) and ajkids.com (from ask.com). Other useful sites include kids.gov and www.kidsclick.org . AllTheWeb: Use the Basic Settings page to enable the Offensive Content Filter option. The only works for searches in English. AltaVista: Use the Family Filter Setup page. AOL Search: Doesn't appear to offer a filter, but enabling Parental Controls might have an impact on web search matches. Ask Jeeves: Use options for Content Filtering on the Your Settings page or try Ask Jeeves For Kids, listed above . Google: See the SafeSearch help page for instructions on setting up filtering on a permanent or as-needed basis. HotBot: Use the Block Offensive Content section of the Filter Preferences page. Note that you may need to set this again if you change from using the default &quot;HotBot&quot; search engine that's offered. LookSmart: LookSmart has never accepted adult content for listing within its directory results. However, obscure queries might bring these up in the crawler-based results that are sometimes provided. Lycos: Use the Adult Filter section of the Advanced Search Filters page. MSN Search: Use the Safe Search Filter on the Settings page. Teoma: Teoma doesn't appear to offer a filter. Yahoo: Set the SafeSearch Filter option via the Search Preferences page. Major Children's Guides & Directories The kid-safe directories below use human beings to filter out sites that might be considered objectionable for viewing by children. Ask Jeeves For Kids http://www.ajkids.com/ Ask Jeeves is a unique service where you enter a question, and Ask Jeeves tries to point you to the right web page that provides an answer. At Ask Jeeves For Kids, answers have been vetted for appropriateness. Also, if Ask Jeeves cannot answer a question, it pulls results from various search engines in its metacrawler mode. At Ask Jeeves For Kids, no site that is on the CyberPatrol block list is supposed to be listed. KidsClick! http://www.kidsclick.org/ Backed by librarians, KidsClick lists about 5,000 web sites in various categories. Looksmart's Kids Directory http://search.netnanny.com/?pi=nnh3&ch=kids The Kids Directory is a listing of over 20,000 kid friendly websites that were hand picked by employees of Looksmart subsidiary Net Nanny and vetted for quality. Looksmart also offers a safe search of the entire web, using Net Nanny software to filter Wisenut search results, as well as a free toolbar that uses the same service. Yahooligans http://www.yahooligans.com/ Yahoo for kids, designed for ages 7 to 12. Sites are hand-picked to be appropriate for children. Also, unlike normal Yahoo, searches will not bring back matched found by crawling the web, if there is no match from within the Yahooligan listings. This prevents possibly objectionable sites from slipping onto the screen. Additionally, adult-oriented banner advertising will not appear within the service. Yahooligans is the oldest major directory for children, launched in March 1996.
Just one of many web sites available to the concerned parent.
Recently, the Kaiser Family Foundation released the results of a study on the effects of filtering software on student access to online health information. According to See No Evil: How Internet Filters Affect the Search for Online Health Information , &quot;Internet filters most frequently used by schools and libraries can effectively block pornography without significantly impeding access to online health information -- but only if they aren't set at their most restrictive levels. At the least restrictive level, the filters incorrectly block an average of just 1.4 percent of health sites.... The amount of pornographic content blocked was found to increase only marginally, from 87 percent at the least restrictive configuration to 91 percent at the most restrictive level.&quot;
Internet Safety Tips
Internet Safety Technical Aids for Parents Detective Joseph J. Sorrentino Fairfax County Police Department Criminal Investigations Bureau Major Crimes Division / Child Exploitation Unit Member of Internet Crimes Against Children NOVA-DC Task Force & The FBI’s Cyber Crimes Task Force . ChildSafeNet, Inc .
First step let’s talk with our kids. <ul><li>Talk with your child about. </li></ul><ul><li>Chatting (IM) (PC & Cell) </li></ul><ul><li>Internet use, sites visited </li></ul><ul><li>E-mail </li></ul><ul><li>Unsolicited contacts, Cyber Bullying , and Identity Theft </li></ul>
Who are they talking with. <ul><li>Hi asl what do u like to do? </li></ul><ul><li>14 m fx I like sports and power lifting at school. </li></ul><ul><li>U asl </li></ul><ul><li>13 f fx Nothing just chatting on line </li></ul><ul><li>Maybe we can meet sometime </li></ul><ul><li>That would be nice. </li></ul><ul><li>( I wonder what he looks like ?) </li></ul>What he could really look like!!!!
“ Trust but verify” Former President, Ronald Reagan <ul><li>Administrative control – Who set up your PC? </li></ul><ul><li>Set up separate Non–Administrative account for your child </li></ul><ul><li>Learn about the digital devices your teen uses </li></ul><ul><ul><li>Visit their Web pages or blogs and know who is in their cell phone contact list </li></ul></ul><ul><li>Location of PC in the home and the times if use. </li></ul><ul><li>Set limits on which Web sites, chat rooms, games, or blogs they can and cannot visit, and discuss consequences for breaking these rules </li></ul><ul><li>Add Monitoring software or hardware </li></ul><ul><ul><li>“ Trust but Verify” </li></ul></ul>
Out of Sight Access out of your control <ul><li>School- </li></ul><ul><ul><li>May or may not have filtering </li></ul></ul><ul><li>Library </li></ul><ul><ul><li>May or may not have filtering </li></ul></ul><ul><li>Friends </li></ul><ul><li>Cyber café </li></ul><ul><li>WiFi HotSpots </li></ul><ul><ul><li>(Panera, Starbucks, and others, & Soon Local Cities.) </li></ul></ul><ul><li>Cell Phone </li></ul><ul><ul><li>Web and Text Messaging access. </li></ul></ul>
Hardware Tool available to you. <ul><li>Key logger Hardware </li></ul>- a tiny circuit board that is connected in between the computer and the keyboard -Comes in a variety of memory sizes
Key Logger <ul><li>Advantages: </li></ul><ul><ul><li>Simple to use </li></ul></ul><ul><ul><li>Comes in various storage sizes </li></ul></ul><ul><ul><ul><li>32k, up to 2Mb </li></ul></ul></ul><ul><ul><li>No extra software needed </li></ul></ul><ul><ul><ul><li>Recovered Data access via any word processing software (Word pad, Word, WordPerfect) </li></ul></ul></ul><ul><ul><li>Undetectable by spy ware or antivirus software </li></ul></ul>
Key Logger: <ul><li>Disadvantages: </li></ul><ul><ul><li>Can only capture key strokes of the PC to which it’s attached. </li></ul></ul><ul><ul><ul><li>Only sees one side of a conversation </li></ul></ul></ul><ul><ul><li>Can easily be removed if discovered </li></ul></ul><ul><ul><li>Is not a Filtering device </li></ul></ul><ul><ul><li>Can not be utilized with a laptop </li></ul></ul><ul><ul><ul><li>Key logger software needed </li></ul></ul></ul>
Filter Software <ul><li>Internet filter software gives you the ability to control content displayed, block websites and set up passwords. Powerful services like email filtering, popup blocking and chat room monitoring are just some of the tools available with today's Internet filter software </li></ul><ul><li> Internet Service Providers (ISPs) </li></ul><ul><li>Filtered Search Engines </li></ul><ul><li>Local Filter Software on PC </li></ul>
Filtered Search Engines <ul><li>Filtered search engines will prevent most adult content sites from appearing in the search result list, although it is not a fool-proof technology. Some general search engines (such as google.com , www.yahooligans.com , search.netnanny.com , www.ajkids.com ) provide parental controls under its “Advanced Search” or “Preferences” options. These options essentially use a server-side filter to block adult content sites. Other search engines are designed specifically for children in both design and content. These usually provide search results only for sites from a pre-approved list of child-friendly sites. </li></ul>
Filtered Search Engines <ul><li>Advantages: </li></ul><ul><ul><li>Filtered searches are server-side filters, which means that there is no software to buy or upgrade. And most search engine services are free. </li></ul></ul><ul><li>Disadvantages: </li></ul><ul><ul><li>The filter options available for a search engine will only work for that specific search engine. </li></ul></ul><ul><ul><li>A child could simply go to a website that doesn’t have parental controls and conduct their searches there. </li></ul></ul><ul><ul><li>The filter only applies to actual searches. It is in no way a part of the browser, so adult sites will not be blocked if the URL is directly typed into the browser’s address toolbar. </li></ul></ul>
Filtering Software <ul><li>Many companies have developed filtering software to block harmful websites from your computer. But not all packages are the same. Some scan for specific words or terms, others refer to a database of banned sites, while others allow only those sites previously approved by the parent. Other individual features include chat room and forum blocking, activity logs, time limits and customizable filtering. Some also expand their language filter to your e-mail service. Some software is available for a flat fee, while others charge a monthly service fee. </li></ul>
Filtering Software <ul><li>Advantages: </li></ul><ul><ul><li>Client-side filters usually offer greater flexibility for parents in both features and levels of protection. </li></ul></ul><ul><ul><li>Some programs can also operate in "stealth mode" so they remain undetected from the user. </li></ul></ul><ul><ul><li>Some programs also include monitoring features which record what your children do online. </li></ul></ul><ul><li>Disadvantages: </li></ul><ul><ul><li>Many parents have found the maintenance of the software a hassle </li></ul></ul><ul><ul><ul><li>(Many of the newer versions of filtering software offer automatic updates of unacceptable sites from the company's database.) </li></ul></ul></ul><ul><ul><li>Even the most effective filters are not fool-proof. Unacceptable sites will still occasionally slip through. </li></ul></ul><ul><ul><li>If your child is very technologically advanced, they may learn ways to bypass the software. There are even websites providing free downloads that can render the filtering software useless. </li></ul></ul>
Some Filter Programs http://internet-filter-review.toptenreviews.com/
Filtering Software <ul><li>Advantages: </li></ul><ul><ul><li>Works with all browsers </li></ul></ul><ul><ul><ul><li>Internet Explorer, Firefox, Netscape </li></ul></ul></ul><ul><ul><li>Easy to activate and setup </li></ul></ul><ul><ul><li>In some cases ability to control bases on profile that is set up. </li></ul></ul><ul><li>Disadvantages: </li></ul><ul><ul><li>Cost as much as $80.00 for software </li></ul></ul><ul><ul><li>Can be set too restrictive </li></ul></ul><ul><ul><ul><li>Blocking access to desired sites </li></ul></ul></ul>
Understanding the lingo <ul><li>Google is your friend…. </li></ul><ul><li>Create a Account in a Social Networking Web Site (MySpace, Facebook, Tribe, Friendstar, & well over 100 + others) </li></ul><ul><li>Wikipedia is another good friend….. </li></ul><ul><li>Acronym lists available on the Web ( ASL, PIR, POS ) </li></ul>
In Closing <ul><li>Technology can only help in combination with good parenting skills and communication with our children. </li></ul><ul><li>No one item is a total solution to protecting our children. </li></ul>