How to Protect Your Child from the Internet

When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.

As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on.

There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN.

Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child.

Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address.

There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on.

So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them.

To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well.

If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult).

Just let your child know what you have done and that it is for their own safety.

Remember, it's up to you to ensure your child has a safe browsing experience.

I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

New York Times

Jared Kushner Gets Security Clearance, Ending Swirl of Questions Over Delay
New York Times
WASHINGTON — Jared Kushner, President Trump's son-in-law and senior adviser, has been granted his permanent security clearance, a person briefed on the matter said on Wednesday, ending a period of uncertainty that had fueled questions about ...
Jared Kushner's security clearance restored, met with Mueller team ...CNN
Jared Kushner, Trump's son-in-law, has White House security clearance restoredUSA TODAY
Jared Kushner receives permanent security clearance, an indication he is no longer a focus of the special counselWashington Post
Politico -CNBC
all 134 news articles »

New York Times

Canada Blocks Chinese Takeover on Security Concerns
New York Times
HONG KONG — Canada has blocked a $1 billion takeover of a construction company by a state-controlled Chinese company over national security concerns, a rare move by a government that until now has largely welcomed such deals despite growing ...
Canada Blocks Chinese Takeover of Aecon on Security ConcernsBloomberg
Canada blocks Chinese takeover of Aecon on security groundsReuters
Trudeau cabinet blocks Chinese takeover of Aecon over national security concernsThe Globe and Mail

all 48 news articles »


Automakers: Trump asks for security investigation of vehicle imports
President Donald Trump has asked for the investigation of automobile imports into the United States on a "national security" basis.

and more »


Trump considering 25 percent tax on car imports, citing national security
President Donald Trump wants to put a 25 percent tariff on imports of automobiles under a similar authority that allowed him to slap duties on imports of steel and aluminum in order to protect U.S. national security, a senior administration official ...
US launches national security probe of vehicle importsReuters
Trump Wants To Investigate The Effect Of Imported Cars On National SecurityJalopnik
Trump weighs new tariffs on imported cars on national security groundsAutoblog (blog)
Daily Beast -Twitter -Wall Street Journal
all 129 news articles »

New York Times

In Bitter Exchange, Pompeo Defends His Concerns for Diplomats' Security
New York Times
The striking exchange in front of the House Foreign Affairs Committee — over the security of diplomats abroad — came during Mr. Pompeo's first Capitol Hill appearance since taking over the State Department. It w as a reminder of his criticism of Mrs ...

and more »

New York Daily News

Georgia jury awards $1 billion verdict against security company after guard rapes teen
New York Daily News
Hope Cheston was outside by some picnic tables with her boyfriend during a party in October 2012 when an armed security guard approached, attorney L. Chris Stewart told The Associated Press on Wednesday. The guard told the boyfriend not to move and ...
Security Company To Pay $1 Billion To Woman Raped By Guard They Hired:
Jury awards $1.3 billion verdict against security company after employee rapes teenage girlABC Online

all 14 news articles »

The Good & Bad News about Blockchain Security
Dark Reading
Blockchain is, at its core, a method for humans to conduct secure, verified, and recorded transactions online without the use of a middle party. Bitcoin, in which money can be passed between online users without the presence of a bank or holdings ...


Increased Border Security 'Absolutely Has To Happen,' Colorado Sheriff Says
"The concern that we have oftentimes in our local communities [is] without sufficient border security, we see crime that comes across the border and ends up in our communities. And we recognize that we just need a more secure border," Smith says. "We ...


In costly quest for security, US schools face law of diminishing returns
In the rush to find answers, school security has ballooned into a multibillion-dollar industry. Meanwhile, some schools are spending precious funds on untested technologies, safety experts said, even though the most robust and effective safety measures ...

KMTV - 3 News Now

Security company in Bellevue vandalized
KMTV - 3 News Now
BELLEVUE, Neb. (KMTV) - An Omaha home security company based out of Bellevue is using its own camera to help track down a thief who stole items from outside their building. Chris Malmberg, the owner of Omaha Security Systems Inc. says an ...

Google News

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More


P C. owners are constantly at risk from attacks by... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More