Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
How to Protect Your Child from the Internet > NetSparsh - Viral Content you Love & Share

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.

As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on.

There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN.

Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child.

Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address.

There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on.

So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them.

To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well.

If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult).

Just let your child know what you have done and that it is for their own safety.

Remember, it's up to you to ensure your child has a safe browsing experience.

I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Vanity Fair

Forget the Summit: How Trump Let Putin Win the Cyber-Security War
Vanity Fair
As the White House trained its attention on the spectacle surrounding the meeting of Donald Trump and Vladimir Putin in Helsinki, the Trump administration was largely ignoring a more potent danger back home. The Trump-Putin summit, after all, is mostly ...
Trump stresses Israel's security in talks with PutinReuters
The Early Edition: July 16, 2018Just Security
Putin: Trump 'paid particular attention' to Israel's security at summitThe Jerusalem Post
Foreign Policy -Axios -Haaretz
all 2,947 news articles »

Forbes

Lack of confidence in data security can cost you more than you think
CSO Online
Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before. Besides tarnishing their reputation, businesses face the risk of encountering large fines if they don't align ...
How GDPR Will Affect Privacy And Security Standards In US Health CareForbes

all 24 news articles »

CNBC

Tech consumers should not be forced to sacrifice privacy for security
CNBC
We all expect privacy, especially when it comes to our phones. But how do we feel about upholding the privacy of criminals and terrorists? And what should we do if the information needed to catch or prosecute a criminal – or potentially save lives – is ...


107.180.56.147 (press release) (blog)

Chicago DHSChemSecurityTalks Focus on Midwest Chemical Security
107.180.56.147 (press release) (blog)
To address these issues and more, the Department of Homeland Security (DHS) will hold the second of three DHSChemSecurityTalks events in Chicago on July 19. The first event took place last month in Oakland, California. The Chicago event provides a ...


The Nation.

The United States Has a National-Security Problem—and It's Not What You Think
The Nation.
So effectively has the Beltway establishment captured the concept of national security that, for most of us, it automatically conjures up images of terrorist groups, cyber warriors, or “rogue states.” To ward off such foes, the United States maintains ...


Curbed NY

NYC security deposits unfairly burden low-income New Yorkers: report
Curbed NY
New York City Comptroller Scott Stringer is calling on the state to impose limits on security deposits, which he says unfairly burdens low-income New Yorkers. The Comptroller's office has put out a new report that shows that New Yorkers sunk $507 ...
Report: NYC Apartment Security Deposits Are Too Damn HighGothamist
Stringer wants one-month cap on renters' security depositsThe Real Deal
New York City proposes sweeping new rules for security depositsHousingWire

all 6 news articles »

Forbes

Alight Solutions' Jason Lish Takes Unusual Path From Chief Security Officer To CIO
Forbes
Jason Lish was recently promoted to Chief Information Officer of $2.3 billion Alight Solutions. As CIO, he is responsible for Alight's overall digital, technology, enterprise risk and security strategy, and execution. Lish also leads the team charged ...


Forbes

To Grow The Internet Of Things, Improve Security
Forbes
The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices. Research by Bain & Company finds that enterprise customers would be willing to buy more IoT ...

and more »

CNBC

Europeans are giving Trump a defiant runaround on trade and security
CNBC
As a presidential candidate, Donald Trump began telling the Europeans in 2015 that they had to: (a) cut their systematic and excessive trade surpluses with the U.S., (b) eliminate discriminatory trade rules and practices to open up markets for American ...
Globalised business is a US security issueFinancial Times

all 345 news articles »

TMZ

TI Charged for Assaulting Security Guard ... Likely Faces No Jail Time
TMZ
Prosecutors in Henry County charged the rapper with simple assault, public drunkenness and disorderly conduct stemming from his arrest back in May, when a security guard refused to let him into the premises. T.I.'s lawyer, Steve Sadow, tells TMZ the ...

and more »
Google News

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More