When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.
As a parent of a young child or a teenager, an issue of security is always on your mind (or at least it should be). While none of us like to speak about it, failure to provide this security has resulted in some children or teenagers being subjected to awkward situations. Not much more has to be said on the subject, but if you want to monitor your child's activities on the PC, read on.
There are many ways an unknown can get their hands on your child's e-mail address. You may or may not know it, but chain letters are one of these methods. They are popular among youth, but you should know the truth about chain mail letters. These days, with everyone being on one instant messenger service or another (MSN messenger is popular among youth) everyone seems to have a hotmail address, and chain mail letters usually circulate through hotmail servers. This is not to say they are at fault - of course they don't regulate these letters. But one chain mail letter has upon it's header portion the e-mail addresses of all those who have partaken in the distribution of the letter. If one wanted to add some of the hotmail addresses to his or her own MSN messenger, all he/she would need to do is take a random e-mail off the letter (or a few) and add them to MSN.
Voila, an unknown is suddenly talking to your child on the computer. It doesn't matter who the person is that the unknown added - he/she will find out after they begin speaking to your child.
Kind of scary, isn't it? I'm not trying to scare anyone, I'm just saying how easy it is for anyone to get ahold of a random teenager's or child's MSN address.
There are other ways, too. Chat rooms are another culprit. People meeting all kinds of other people they have never spoken to, but suddenly they're chatting it up about random subjects. Date lines, 1-800 numbers, text messaging...the list goes on.
So what CAN you do to protect your child? Good question. There is adequate measures you can implement to "keep tabs," so to say. You could try a keylogger software; this works by logging just about everything done on the computer by keystroke. You could turn on message archiving on msn; this means that any and all conversations on MSN are logged and you can review each of them.
To make sure your child isn't accessing the wrong sites, you could check the Internet history. These days, some PC users know how to erase this history as it is quite easy. To restrict your child from visiting the wrong websites, you could try a program like Net nanny as well.
If after monitoring your child using either a keylogger or checking their MSN history you realize they are speaking to the wrong people, you can go on their MSN and block and delete this person. Be sure to do both actions. By blocking the unknown, he/she cannot re-add or speak to your child again. And by deleting the person from the list, your child cannot unblock that person. (There are ways to unblock and re-add the contact but it will be more difficult).
Just let your child know what you have done and that it is for their own safety.
Remember, it's up to you to ensure your child has a safe browsing experience.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
![]() |
|
![]() |
|
![]() |
|
![]() |
What is Phishing? Phishing is a relatively newly coined term... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
The most frustrating part of having Spyware on your computer... Read More
If you have used a Windows machine for a while,... Read More
You'd better learn news from media, not from emails, security... Read More
Can you protect your computer from all possible viruses and... Read More
Ebay is a great site and is used by many... Read More
Viruses are, however, not the only malicious software programs out... Read More
Have you ever got an email asking you to confirm... Read More
Over the past few years as the internet has become... Read More
The top five online scams on the Internet hit nearly... Read More
Did you know...? 1 in 5 children who use computer... Read More
First, let's do a little recap'. As I stated in... Read More
Phishing is a relatively new form of online fraud that... Read More
History and BackgroundThe virus was one of the first ever... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
A friend called me one day and asked if I... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Huge number of spyware software applications are available in the... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Today the internet is a mine field of malicious code... Read More
Someone recently told me, "You would have to be a... Read More
We all get the odd virus now and then, but... Read More
You are at your computer, checking out software on EBay.... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
The money being spent online is steadily growing. With billions... Read More
If you are a parent, as am I, I think... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
The words Corporate Security may conjure up images of a... Read More
Sooner or later everyone with an email account will receive... Read More
Computer infections can be broken up into 4 main categories... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Spyware and adware are becoming major problems for online surfers... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
This is the second in a series of articles highlighting... Read More
Phishing is a relatively new form of online fraud that... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
First I would like to stress I am condoning the... Read More
Watching how the traditional media covers the latest virus or... Read More
Since its birth, the Internet has grown and expanded to... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
In recent days, I was one of the unfortunate persons... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Do you sometimes notice your computer running slower. Is your... Read More
You and I are a lot alike. We are both... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Ok, you've got a computer, and you get online. You... Read More
The money being spent online is steadily growing. With billions... Read More
If you use the internet, you have probably been infected... Read More
It's late. You've been scouring the web for that perfect... Read More
I got a virus the other day, Thursday I believe... Read More
Let us take the example of scrambling an egg. First,... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Many of us have run into an annoying and time-consuming... Read More
First the basic definition of Spyware: It is a type... Read More
Computer security for most can be described in 2 words,... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Internet Security |