Wednesday, August 30, 2006

Please, protect our kids! Red Flags and Parental Control Software: Part 4

To help control how your child surfs the net, I discuss the various controls you can use at the end of the article. Parental control software is just a small part of the equation and can go only so far. The real first line of defense is the parent.
So, while preventive steps like software can reduce the risks, they can’t eliminate
them completely. So watch for red flags of behavior first, and then install software to increase safety.

- Is your child minimizing or changing a browser window when ever you walk into the
room?

- Are they using instant message lingo like “POS” (parent over shoulder)?

- Are they getting phone calls from people you don’t know or wearing new clothes?
These can be gifts from a predator.

- Is your child reluctant to logon or go to school? Those could be signs they are being
cyberbullied.

If you think there is a problem you need to report it. The National Center for Missing & Exploited Children runs a hot line, both on the Web at www.cybertipline.com and the telephone at 800-843-5678. They will review your report and forward it to the proper authorities. Also let your ISP know, They face stiff fines for not reporting child pornography.

But most important of all you want to educate yourself and your child on the risks that
exist online. The Internet is a great thing, but it is also dangerous - like a swimming
pool. Do you want fences? Sure. Do you want to have locks? Yes you do. Do you
want to have laws? Yes. But the safest child is the one who knows how to swim.


First, I would like to repeat, that the software is no replacement for real parental control where you keep an eye over the child’s shoulder and keep watch for warning
signs.

Now, if you do a Google search for parental control software you will notice that there is no shortage of offers, but what features do you really need? The most important items to watch/monitor/block are website, email, instant messaging and downloads. Basically what you want to do is track everything they do or say on the computer or online. Every message they sent, every website visited and you want to control when they can be online to send those messages.

This might sound like a lot but it is actually pretty basic and has been around for
awhile. Spouses have been using it to catch each other for years it’s just been
repackaged and you can get pretty descent software for under $100 bucks. On the
other hand if you’re really into it you can spend thousands.
Despite all the extra fluff there are 5 basic features you want:

Content Control - Flexible "Internet Filtering" allows you to select the types of
website that are appropriate.
2. Program Control - Control Instant Messengers, P2P File Sharing, and other
harmful programs.
3. Time Control - Control the amount of time spent online, and the times when the
Internet is available.
4. Usage Logging - Create and review logs of website visited, programs used on
the Internet, and Instant Messaging Chats.
5. Usage Alerts - Be notified (some have instant) via email, text message, or
phone call when someone visits inappropriate website.

This is a good time to bring up another issue, how do you feel about spying on your
kid? How would (did) you feel when mom went through your sock drawer? It brings
us around to the new social engineering and the availability of threats. Our kids today
have an access that we didn’t. When I was 13 to get in trouble I had to at least leave
the house. With email and instant messaging our kids don’t even have to do that,
so I guess it is a conscience call. Me, I would rather have a mad child then a
picture on a milk carton.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 3:49 PM

Monday, August 28, 2006

Call Computer Guys Live!


We guarantee a trusted service for online computer repair.
Give us a call at 866-300-8181 with any questions.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 11:01 AM

Wednesday, August 23, 2006

Please, protect our kids! Online Teenage Internet Use Statistics: Part 3

To understand the predator problem, you need to understand a little about another new
phenomena called social engineering. Social engineering is the reshaping of parts of our real world life to blend with our lives in the virtual world. We are all familiar with the statistics for online shopping and the huge increase, but here are some statistics you may not know:

87% of teens age 12 to 17 use the Internet in some aspect of their daily lives.
(Source: Pew Internet & American life Project).

79% of online teens say they are not careful when sharing personal information.
(Source: Pew Internet & American life Project).

71% of teens have received messages online from someone they do not know.
(Source: National Center For Missing & Exploited Children).

64% say they do things online they don’t want their parents to know about.
(Source: Pew Internet & American life Project)

45% of teens have been asked for personal information by someone they did not know.
(Source: National Center For Missing & Exploited Children)

20% of 8-to-18 year olds have a computer with Internet access in their own room.
(Source: Kaiser Foundation)

14% of teens have met face-to-face with a person they had known only through the Internet. (Source: National Center For Missing & Exploited Children)

14%, wow, that is a really high number, that equals 14 out of every 100 children!
Multiply that by the millions online and that is why this is such a serious problem!

Visit http://computerguyslive.com for more tech tips, online computer repair and internet safety information.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 12:51 PM

Please, protect our kids! How a Predator Can Find Children Online: Part 2

Last article I told you about steps you can take to protect your children from online predators. In this article, I’ll show you an example of how a predator works.
The statistics show an increasing exploitation of the internet as a means for predators to communicate with and eventually meet their victims. This article shows you an example of how a predator finds innocent children and befriends them. How they can take the smallest piece of information and use it to meet and lure a child. We’ll call our child Amanda and assume she is using “MySpace”, a real favorite with the kids.

1-Amanda’s profile looks safe enough. All she has listed is her first name, school and her interests. She writes about her parents and teachers who don’t understand her.

2- Our predator draws a conclusion from her interests: Amanda may be on the softball team. He Googles the high school and finds a picture of the team. He now has her picture and her full name.

3- Our predator heads back to Google and enters Amanda’s full name and school. He finds a newspaper story about her father Alfred, who raised money for the softball team.

4- A new web search (don’t you love Google) provides our predator with a list of all the Alfred Simpsons in the city. Only one of the dozen or so listings is near Amanda’s school.

5- Now the predator is home free, in just a few minutes and with very little effort, our predator has Amanda’s full name, her address, and a picture to identify her. Now he knows where to find her.

The rest is even easier, all he has to do is strike up a conversation online about softball and he’s in.

In a short time he has contacted her thru IMs and email. They talk about parents and school, he is always friendly and reassuring and Amanda thinks she has finally found an adult who understands her.

What happens next I’ll leave to your imagination. I wanted you to see how, with just the smallest bit of information and the power of the Internet, a predator can locate prey and strike.

This drives home how important it is to keep an eye on what your kids are doing on the internet; who they are chatting with, what groups and chats they are joining. Make sure you read their profiles and read what the child is posting. Remember you are the parent and it is our responsibility to protect our children online.
Visit http://computerguyslive.com for more tech tips, online computer repair and internet safety information.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 12:05 PM

Monday, August 21, 2006

Please, protect our kids! Internet safety for your children: Part I

This time last year, if we had one or two parents come in to our computer repair shop concerned about something they had found on their child’s computer, that was a lot. This year, we are seeing two or three a week and that is just the cases we know about. Now we are used to not having our advice listened to, advice on such things as back-up your data or don’t use your Outlook for storage, but as parents we are responsible for the safety of our children. Keeping them safe from online predators requires setting up limits.
If you are a parent, you need to learn about this. If that means taking a course or buying a book, then do it. It is very hard to protect your kids if you don’t know what they are doing.
The next articles discuss how a predator works and how easy you can make it for them. Then, after we thoroughly scare you we will show you how to set up protection. But, this week we will start with the 10 essential tips to safeguard your children.

1- Don’t forbid Internet use. In all probability they will defy your ban on the sly.
2- Filtering software won’t block all the dangers kids face online, but it is a good start. Visit web sites with your child wherever possible.
3- Understand the technologies. Take a class, read books, try the sites yourself. The more you know the better you can talk to your children.
4- Real important, place the computer in a common room. Kids won’t expect privacy there.
5- Talk to the parents of your child’s friends. Most kids use computers at a friend’s home.
6- Teach your kids the “embarrassment rule”. Never post anything they wouldn't want everyone to read.
7- Tell them to be careful about what they post regarding other people. Predator friendly info is often left by friends posting comments.
8- Let your child know that it’s important to tell you if he or she is ever approached online or receives inappropriate content.
9- Look for red flags that your child is in danger, such as minimizing a browser when you enter the room or type phrases like POS (Parent over shoulder) into chat windows.
10- If you think there may be a problem, report it to the authorities, and also to your Internet service provider.

Keeping your child safe online requires constant vigilance. The high number of missing and exploited children attests to the fact that internet predators can be a real threat. In the next article we will discuss how a predator can find out information about your child, including where your child lives.

Chris Kaminski has been working in computer repair and web development for the last 20 years. Kaminski is CEO and head technician for Computer Guys Live Inc., an online computer repair company based in Asheville, NC. He writes informative weekly articles about internet safety and computer technology. Visit http://computerguyslive.com for more tech tips, online computer repair and internet safety information.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 11:15 AM

Thursday, August 03, 2006

Wireless Network Security 101

Wireless Network Security in 6 Easy Steps

By Computer Guys Live

Connecting your home computers with a wireless network sure make things convenient ...BUT the very feature that makes them so popular is also their biggest weakness! Anyone with the knowledge can intercept your signal with something as simple as a Pringles can.

1. Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed.

2. Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don't need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting.

3. Enable WEP (Wired Equivalent Privacy): WEP encrypts your data so that only the intended recipient is supposed to be able to read it. As with all security measures there are ways around it, but by using encryption you will keep the novice hackers out of your systems. It is best to use 128bit rather than 40bit encryption (it is exponentially harder to crack).

4. Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved.

5. Change the Default Administrator Password: This is just good practice for ALL hardware and software. The default passwords are easily obtained and because so many people don't bother to take the simple step of changing them they are usually what hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name.

6. Patch and Protect Your PC's: As a last line of defense you should have personal firewall software such as Zone Alarm Pro and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep you current with patches.

If you need help with Wireless Connection Problems, Check out our step-by-step wireless troubleshooting guide at Computerguyslive.com.

ADD TO: Del.icio.us, Digg, Technorati, Blinklist, Furl, Newsvine,
Posted by Lone Bird Studio Ltd. @ 3:08 PM

Important Links

Wireless Troubleshooting

We have taken the questions out of your wireless configuration. Our step-by-step guide to wireless troubleshooting is invaluable if you are having wireless connection problems.

Many More Tech Tips

Read Head Tech Chris Kaminski's Tech Tips for the computer user! This valuable info is provided as a free service from us to you.

Immediate Computer Help

We are here to help!Contact Us online at computerguyslive.com Or Call our toll free number 1-866-300-8181.