www.1001TopWords.com |
Protecting Your Children On The Internet
If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Many young people find instant messaging and e-mail a convenient and fun way to talk with their friends. If you have children, like me, when they're not on the phone, they're talking with their friends on the Internet. We have very strict rules and guidelines about who they can talk with and for how long. We have given them detailed instructions on what to do when they receive e-mail from someone they don't know or receive an anonymous instant message. Recently, someone close to me received a death threat via an anonymous instant message. The language this person used was so vulgar and explicit you would have thought it came from a prison inmate. Interestingly enough, the person at the other end was a child. After significant investigation we determined this person was a school mate. They had received detailed information about the child including the child's instant messenger alias, their home address and color, and what type of cars the family drove. Can you imagine how scared this child and child's family was? Quite frankly, it was not only sad but sickening that another child could be so verbally brutal. Additional investigation revealed that the school these children go to were aware that this had been going on for quite some time. Other children had been receiving similar threats. This particular event was all the result of several children speaking in a chat roam and one child in particular got upset about something that was said. That child contacted another child, who is known to be mean, and asked them to scare one of the other children. We got to the bottom of the whole mess and everyone felt a bit of relief. It's very important to pay attention and, in some cases, monitor what children are doing on the Internet. It's for their protection and the protection of others. I'm sure I am going to get an ear full from privacy rights advocates on this one. Regardless, the safety of our children is one of the most important tasks a parent has. If your children use e-mail and Instant Messaging on a regular basis you should; 1) Limit the number of people they can e-mail and message with; Update: Shortly after writing this article, a 13 year old boy at a middle school in my area was arrested for e-mailing death threats to two teachers. In one e-mail he indicated he was planning on bringing a gun to school to kill a teacher. The other e-mail, sent to a teacher at a different school, indicated that he planned on targeting students as well. For further details please see the full article at South Florida's Sun Sentinel "http://www.sun-sentinel.com/news/local/palmbeach/sfl-pcletter18feb18,1,216444.story?ctrack=1&cset=true." For information on computer monitoring software take a look at WatchRight http://www.watchright.com/. A good site to visit to learn more about protecting children on the Internet is www.protectkids.com. It's full of great information every parent should know. Other sites you may want to visit are http://www.isafe.org/, and Obscenity Crimes Reporting http://www.obscenitycrimes.org/. About The Author
|
RELATED ARTICLES
Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,... To Work When You Switch Your Pc On ?I Can And I Do It On A Pro-active Basis. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. I knew a Private Investigator who used to break into other firm's voicemail boxes. He was suspected of erasing messages and stealing potential clients. I know you may bethinking that is not right. Maybe so but if a Private Investigator cannot protect him/herself than what use are they to a client. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!" Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey. |
© Athifea Distribution LLC - 2013 |