ComputerCOP

The makers of ComputerCOP, Computer Cop Software Inc., described their product as: ComputerCOP is parental monitoring software that lets parents know what their kids are doing on the computer. It runs off a CD; no installation required. The most novice computer user can use it with ease. ComputerCOP finds images and questionable text even if they have been deleted.

1: ComputerCOP is a product that:
2: Prevents the display of most sexually explicit material.
3: Prevents the display of most graphically violent material.
4: Prevents the display of most material advocating hate groups and their messages.
5: Prevents the display of most material advocating illegal activity, such as drug use, bombmaking, or underage drinking and gambling.
6: Monitors the use of your computer or the access your children have to the Internet.








    Monitoring

    ComputerCOP is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review your children's email, your children's online chat, the web sites your children have visited, your children's instant messaging sessions, and your children's offline computer use.
    The program will operate without the child's knowledge.
    The program can be used alongside a filtering or blocking tool.
    The program can not be set up to warn children when they attempt to access inappropriate material.

    A+ Internet Filtering for Families


    The makers of A+ Internet Filtering for Families
    Hedgebuilders Inc., described their product as: Internet filtering for both PCs and Macs that blocks pornography, nudity, illegal sites, etc. Customizable and easy to set up an use. Also includes an Accountability and Reporting feature that emails parents or accountability partners if someone on computer attempts to go to a bad site. *Our Application has both Filtering and monitoring together in one product.

    A+ Internet Filtering for Families is a product that:
    • Monitors the use of your computer or the access your children have to the Internet.
    • Prevents the display of most sexually explicit material.
    • Prevents the display of most graphically violent material.
    • Prevents the display of most material advocating hate groups and their messages.
    • Prevents the display of most material advocating illegal activity, such as drug use, bomb making, or underage drinking and gambling.
    • Emails parents or accountability partners if bad sites are attempted on computer
    Monitoring


    A+ Internet Filtering for Families is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review the web sites your children have visited.
    A+ Internet Filtering for Families functions by analyzing the history listing of the user's Web browser.
    This program DOES NOT run in the system background at all times.
    The program will NOT operate without the child's knowledge.
    The program can be used alongside a filtering or blocking tool.
    The program can be set up to warn children when they attempt to access inappropriate material.

    Filtering

    There are many different types of filtering products. To begin with, some products are installed on your own computer at home (client-side), while others are installed on the larger computers at your Internet service provider (server-side). A+ Internet Filtering for Families is server-based. It is available for home use.A+ Internet Filtering for Families can control access to web pages, access to chat rooms, the movement of files in and out of your computer (FTP), access to newsgroups (Usenet), access to Peer to Peer networks, access to other Internet capabilities.
    Different filtering tools set up their standards of what material should or should not be filtered in different ways. With A+ Internet Filtering for Families,

    • You will be able to choose from pre-set categories what material you want to be filtered.
    • You will be able to completely override the company's list of material to be filtered.

    You may also want to review the lists of keywords or web pages, or the criteria that the tool company uses to arrive at those lists. With A+ Internet Filtering for Families, you can review the company's criteria for filtering a web page. There are several technologies for determining which sites should be blocked and which should be permitted. Each of them has important strengths, but none of them is perfect. A+ Internet Filtering for Families uses the following:

    • the web page address (URL)
    • Human review of web sites
    • A list of keywords
    • A list of keywords combined with an analysis of the context in which they appear
    • Some other technology
    General Tool Information

    Updates

    A+ Internet Filtering for Families does NOT have regular updates to the product.
    Customization

    A+ Internet Filtering for Families can be password protected.

    A+ Internet Filtering for Families does support multiple users.

    Optenet PC

    The makers of Optenet PC, WebWhile (for Optenet SA), described their product as: A highly intuitive, accurate Web filter that provides parents with the tools they need to maintain a safe Internet enviroment in their home. Filter inappropriate content, manage time spent online and control the files downloaded onto your PC. Updated daily and includes 15-minute unblocking service 24/7.

    Optenet PC is a product that:

    • Limits the total number of hours or the time of day that your children may be online.
    • Prevents the display of most sexually explicit material.
    • Prevents the display of most graphically violent material.
    • Prevents the display of most material advocating hate groups and their messages.
    • Prevents the display of most material advocating illegal activity, such as drug use, bomb making, or underage drinking and gambling.
    • Prevents the display of other categories of material.
    • Monitors the use of your computer or the access your children have to the Internet.
    Time Limitin
    When Optenet PC is installed on your computer to limit the time spent on the computer or on the Internet,
    • A warning will not flash on the screen when the user's time is almost up.
    • The program will limit the total amount of time spent online.
    • You can set the program to only allow Internet access during certain periods of time.
    Optenet PC limits access to certain software products (e.g. Web browsers, email programs). Limits Internet use of all kinds.

    Filtering

    There are many different types of filtering products. To begin with, some products are installed on your own computer at home (client-side), while others are installed on the larger computers at your Internet service provider (server-side). Optenet PC is client-based.
    Optenet PC can control access to web pages, the use of email, access to chat rooms, the movement of files in and out of your computer (FTP), access to newsgroups (Usenet), access to instant messaging, access to Peer to Peer networks, access to other Internet capabilities.
    Different filtering tools set up their standards of what material should or should not be filtered in different ways. With Optenet PC,

    • You will be able to choose from pre-set categories what material you want to be filtered.
    • You will be able to permanently edit the company's list of material to be filtered.
    • You will be able to completely override the company's list of material to be filtered.
    • You will be able to develop your own list of material to be filtered, using the company's list as a starter.
    • You will be able to develop your own list of material to be filtered, starting from scratch.
    Some filtering tools allow you to control access in a number of different categories. Optenet PC offers these categories: anonymizers; anorexia and bulimia; gambling; banners; bombing; chat; shopping; webmail; drugs; forum; hacking; games; instant messaging servers; models; music; personal web sites; pornography; racism; society; sects; p2p servers; sexuality; spyware; violence.

    Blocking Outgoing Information

    When Optenet PC is running on your system,
    • You cannot prevent your children from using email.
    • You cannot permit your children to send email only to a pre-approved list of recipients.
    • You can prevent your children from using chat rooms online.
    • You can prevent your children from using ICQ or other forms of instant messaging.
    • You cannot edit out the transmission of specific kinds of information, like your address, telephone number, or credit card number.

    Monitoring

    Optenet PC is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review the web sites your children have visited.

    The program will not operate without the child's knowledge.
    The program can be used alongside a filtering or blocking tool.
    The program can be set up to warn children when they attempt to access inappropriate material.

    Home POWWOW (Place On Web With Out Worry)



    The makers of Home POWWOW , IPOWER Applications, Inc. , described their product as: Monitor internet activity at anytime from anywhere Home POWWOW is a powerful, easy and secure web-based solution for managing safe internet experiences. It contains all you need - a social network monitor, chat room monitor, a web browser monitor, and much more.

    Home POWWOW is a product that:

    • Monitors the use of your computer or the access your children have to the Internet.
    • Provides Real Time Alerts for inappropriate content viewed or sent online.

    Monitoring

    Home POWWOW is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review your children's email, your children's online chat, the web sites your children have visited and your children's instant messaging sessions, Home POWWOW functions by analyzing the cache of the user's Web browser, analyzing the history listing of the user's Web browser, analyzing TCP/IP packets moving in and out of the computer, and analyzing the email files stored by popular email programs.

    This program runs in the system background at all times.
    The program can operate without the child's knowledge.
    The program can be used alongside a filtering or blocking tool.

    KaZipster

      The makers of KaZipster, IPower Applications, Inc., described their product as: IPOWER Applications KaZipster is a solution-based adaptable platform that provides a safe and secure Internet browsing environment for children. KaZipster's design and architecture permit accessibility by registered users from any computer connected to the internet from anywhere at anytime. (i.e. Home, Schools, Libraries, Corporations, etc.).

      KaZipster is a product that:

      • Monitors the use of your computer or the access your children have to the Internet.
      • Is an Internet browser specially designed for younger users.
      • <
      • Is a Pre-selected Content Service.
      • Prevents the display of most sexually explicit material.
      • Prevents the display of most graphically violent material.
      • Prevents the display of most material advocating hate groups and their messages.
      • Prevents the display of most material advocating illegal activity, such as drug use, bomb making, or underage drinking and gambling.
      • Prevents selected personal information from being transmitted from your computer.
      • Prevents the display of other categories of material.

      Monitoring

      KaZipster is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review your children's email, your children's online chat, the web sites your children have visited, and your children's instant messaging sessions, KaZipster functions by analyzing the cache of the user's Web browser, analyzing the history listing of the user's Web browser, analyzing TCP/IP packets moving in and out of the computer, and analyzing the email files stored by popular email programs.

      The program can be used alongside a filtering or blocking tool.
      The program can be set up to warn children when they attempt to access inappropriate material.

      Blocking Outgoing Information

      When KaZipster is running on your system,
      • You can prevent your children from using email.
      • You can permit your children to send email only to a pre-approved list of recipients.
      • You can prevent your children from using chat rooms online.
      • You can prevent your children from using instant messaging.

      Browsers for Kids

      KaZipster is a kids' browser designed for ages Toddlers to Teens. By definition, kids' browsers make determinations of what content is appropriate for kids. You may wish to review the ways in which your kid's browser determines content acceptable. With KaZipster,
      • You can review the list of keywords.
      • You can review the list of blocked URL's (web page addresses).
      • You can review the company's criteria for blocking a web page.
      There are several technologies for determining which sites should be blocked and which should be permitted. Each of them has important strengths, but none of them are perfect. KaZipster uses the following:
      • Human review of web sites
      • Kids are only able to view Websites (URL's) previously pre-approved (white listed) by the Admin/Parentwhite-listed.

      Pre-Selected Content Service

      KaZipster makes only pre-approved content available. The content is selected by:
      • Computer with human oversight,
      • Specifically chosen by the end user

        Filtering

        There are many different types of filtering products. To begin with, some products are installed on your own computer at home (client-side), while others are installed on the larger computers at your Internet service provider (server-side). KaZipster is client-based.KaZipster can control access to web pages, the use of email, access to chat rooms, the movement of files in and out of your computer (FTP), access to newsgroups (Usenet), access to instant messaging, access to Peer to Peer networks, Different filtering tools set up their standards of what material should or should not be filtered in different ways. With KaZipster,
        • You will be able to choose from pre-set categories what material you want to be filtered.
        • You will XXNOTXX be able to develop your own list of material to be filtered, using the company's list as a starter.
        You CANNOT review the list of keywords, the list of filtered URL's (web page addresses), nor the company's criteria for filtering a web page. There are several technologies for determining which sites should be blocked and which should be permitted. Each of them has important strengths, but none of them is perfect. KaZipster uses the following:

        FilterGate

        Available since 1997

        The makers of FilterGate, FilterGate Pty Ltd., described their product as: FilterGate prevents the viewing of adult content via its password protected Adult-Filter. You can add your own shareable personalized site and keyword lists to be blocked or accessed. FilterGate also blocks other intrusive Internet clutter including popups, banners and spyware. Online weekly filter updates and software upgrades are always free.

        FilterGate is a product that:

        • Prevents the display of most sexually explicit material.
        • Prevents the display of most graphically violent material.
        • Prevents the display of other categories of material.


        Filtering

        There are many different types of filtering products. To begin with, some products are installed on your own computer at home (client-side), while others are installed on the larger computers at your Internet service provider (server-side). FilterGate is client-based.

        FilterGate can control access to web pages.
        Different filtering tools set up their standards of what material should or should not be filtered in different ways. With FilterGate,

        • You will be able to choose from pre-set categories what material you want to be filtered.
        • You will not be able to permanently edit the company's list of material to be filtered.
        • You will be able to completely override the company's list of material to be filtered.
        • You will be able to develop your own list of material to be filtered, using the company's list as a starter.
        • You will be able to develop your own list of material to be filtered, starting from scratch.

        You may also want to review the lists of keywords or web pages, or the criteria that the tool company uses to arrive at those lists. With FilterGate, you cannot review the list of keywords, the list of filtered URL's (web page addresses), nor the company's criteria for filtering a web page.
        There are several technologies for determining which sites should be blocked and which should be permitted. Each of them has important strengths, but none of them is perfect. FilterGate uses the following:

        • PICS ratings (an independent rating system)
        • the web page address (URL)
        • Human review of web sites
        • A list of keywords
        • A list of keywords combined with an analysis of the context in which they appear
        • Some other technology--pages containing direct links to adult content

        Filtered Internet/Online Service Provider


        To gain the benefits of Integrity Online/Everyware, you will need to change the company you use to connect your computer to the Internet. Integrity Online/Everyware is available in the following states: Nationwide Make sure that a local telephone number is available for where you live. Neither GetNetWise.org nor Integrity Online can be responsible for long distance charges that result from calling long distance.
        Integrity Online/Everyware supports these connection types: Other. Integrity Online/Everyware limits which web sites and what types of content you can view. You may wish to review the ways in which such decisions are made. With Integrity Online/Everyware,

        • You can not review the list of keywords.
        • You can not review the list of blocked URL's (web page addresses).
        • You can not review the company's criteria for blocking a web page.
        Monitoring

        Integrity Online/Everyware is designed to help you keep an eye on what your computer is being used for, even when you can't be there in person. With it installed on your system, you can review the web sites your children have visited.

        The program will not operate without the child's knowledge.
        The program can be used alongside a filtering or blocking tool.
        The program can not be set up to warn children when they attempt to access inappropriate material.


        KidZui is a product that:

        • Monitors the use of your computer or the access your children have to the Internet.
        • Is an Internet browser specially designed for younger users.
        • Is a search engine containing only age-appropriate content.
        • Is a Pre-selected Content Service.
        • Prevents the display of most sexually explicit material.
        • Prevents the display of most graphically violent material.
        • Prevents the display of most material advocating hate groups and their messages.
        • Prevents the display of most material advocating illegal activity, such as drug use, bomb making, or underage drinking and gambling.

        Online Safety Guide



        Keeping children safe on the Internet is everyone's job:

        Parents need to stay in close touch with their kids as they explore the Internet.
        Teachers need to help students use the Internet appropriately and safely.
        Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing.
        Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities.
        It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.

        A little perspective from a parent who's been there:

        Just as adults need to help kids stay safe, they also need to learn not to overreact when they find out a child or teenager has been exposed to inappropriate material or strayed from a rule. Whatever you do, don't blame or punish your child if he tells you about an uncomfortable online encounter. Your best strategy is to work with him, so you both can learn from what happened and figure out how to keep it from happening again.

        The challenges posed by the Internet can be positive. Learning to make good choices on the Internet can serve young people well by helping them to think critically about the choices they will face. Today it's the Internet; tomorrow it may be deciding whether it's safe to get into the car of someone a teen meets at a party. Later it will be deciding whether a commercial offer really is "too good to be true" or whether it really makes sense to vote for a certain candidate or follow a spiritual guru. Learning how to make good choices is a skill that will last a lifetime.

        Guide to Online Privacy:

        While kids are often more computer savvy than their parents -- they can easily sign up for a game or subscribe to a chat room service -- they don't understand the consequences of revealing personal information to strangers. As a rule, children should not reveal personal information about themselves online without a parent's permission. This includes their name, email address, postal address, phone number, photo, school address, etc.

        Teach your children about some of the risks involved if they reveal their name, address, telephone number and/or email address online and print out some of these general rules for your children to follow as they surf online. You can help children protect their privacy and themselves if you teach them to be privacy-wise.

        Tips For Parents


        Communicate with your child:

        Be involved in your child's activities, know their friends, hobbies, and interests

        Take time to teach your children to use the Internet responsibly.

        Make sure the computer is in a high traffic area.

        Familiarize yourself with the computer, programs, and the method that your child uses to communicate online.

        When possible, use the Internet with your children.

        Use Internet filters or blocking software, and parental controls.

        Set time limits for Internet use.

        Develop an 'online rules' agreement with your children, and have everyone sign it.

        Make sure you know your children's logon passwords - and no one else does.

        Know your children's friends - and their parents. Find out what rules/safeguards other parents have at homes where your child might be spending time online.

        Children should not complete profiles for a service provider or enter any personal information on any form.

        Children's screennames should be nondescript so as not to identify that the user is a child -- no cute names, school names, or names with year of birth.
        It's even safer for girls to use a gender-neutral or boy's name, since most predators are on the lookout for young girls.


        Use child-friendly search engines.
        Find out who children are exchanging E-mail with, and only let them use chat areas when you can supervise.
        Be aware of any other computers or Internet access available to your child.Unfortunately, just protecting your child from online predators through your home computer is not enough. Many children and teens have access to computers at school, libraries, other friends' homes, and even internet cafes. A child can be exposed to a predator online elsewhere, and bring the threat and danger home. With cellular phones as prevalent as they are today, many children have a phone with them 24 hours a day. This can present a problem when attempting to keep track of who your child is talking to.Just because you get the monthly bill, does not mean they cannot be making and receiving calls that you don't know about. Most calling plans offer 'free minutes' during off-peak hours, and occasionally, these calls are not itemized on the monthly bill. Consult your wireless carrier to determine how minutes are billed and phone calls are tracked.
        Consider the possibility that you may need to keep your child's cell phone in your room each night to prevent unauthorized calls late at night when no one else is listening.
        This is a precaution that should also be taken with home phones. Keep track of where all of your cordless handsets are in the house, and, if necessary, lock them up or do away with them completely.
      • Also, be aware that your child could still be using the phone, even if you've secured all of your family's phones in the house.
        As you might expect, teens can go to great lengths to attempt to 'outsmart' the parent, or get around the rules. You may need to disable the phone jack(s) in unmonitored areas of the home in order to prevent your teen from buying or borrowing a small phone, and plugging it into their own jack. Then, in the morning the phone could have been unplugged and hidden.
        Caller ID has become helpful in preventing unwanted calls, but remember that a teen can easily delete the history on a caller ID phone, much like they can delete the history on a computer. Consider getting 'caller ID blocking blocking', thus preventing unknown callers from calling your home. Also, keep a caller ID phone in a secure place in order to record all incoming calls received.

        Even cell phones can be purchased without a parent's knowledge. Cellular phones are so readily available these days, that phones and calling cards for them can be purchased at many drug, convenience
        .

      • Reporting Illegal Activity on the Internet

        This web site, the Internet Crime Complaint Center (IC3), representa a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3 provides a central referral mechanism for complaints involving Internet related crimes:
        http://www.ic3.gov/

        Educational site for parents about child safety hosted by the Navy:
        http://www.ncis.navy.mil/info/safekids.cfm


        The below site is funded by the federal government and allows people to report all types of crimes against children:
        http://www.missingkids.com/cybertip/

        Contact the  National Center for Missing & Exploited Children at 1-800-843-5678.

        For Canadian citizens: You can contact the CyberTipline if you have information regarding incidents of child pornography, luring, child sex-tourism, or child prostitution. You can make report directly online at:
        www.cybertip.ca,
        or use the toll free phone line: 1-866-658-9022.





        NEW -- Where to Report SPAM and General Illegal Internet Activity

        http://www.us-cert.gov/
        Computer Emergency Readiness Team -- report Internet incidents, illegal activities and find out about latest scams
        Internet Crime Complaint Center:
        IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime.
        Consumer Fraud Reporting
        If you have observed a scam or been the victim of a scam, spam or fraud and want to report it for enforcement, they have a list of where to report different types of scams in the US, UK, Canada and multiple countries.
        Ripoff Report
         
        Ripoff Report® is a worldwide consumer reporting Web site and publication, by consumers, for consumers, to file and document complaints about companies or individuals.
        Federal Trade Commission If you think you have been taken advantage of by a spam scam, file a complaint with the FTC online at www.ftc.gov. Complaints will help the FTC find and stop people who are using spam to defraud consumers.

        Use 
        Spam Cop to help stop Spam at the source.
        SpamCop determines the origin of unwanted email and reports it to the relevant Internet service providers.

        Not illegal -- but irritating
        Stop telemarketers calls

        Register your home phone number(s) on the national Do-Not-Call list by phone or by Internet at no cost. For more information and to add your home phone number to the national Do-Not-Call list via the National Do-Not-Call website. To register by phone, call 1-888-382-1222 (voice) or 1-866-290-4236 (TTY). You must call from the phone number you wish to register.
        File a complaint if calls continue.
        If your number has been on the registry for at least 31 days, and a telemarketer calls, complain to the FTC. FILE A COMPLAINT or call 1-888-382-1222 (TTY1-866-290-4236).

        Tips for Safe Surfing

        There are many precautions you can take as a child, teen or young adult while surfing the Internet.

        First, ALWAYS remember that you should NEVER give ANY personal information out about yourself unless you are with an adult, and they approve. While not all sites or individuals that collect information from children are illegal, it is better to be safe than sorry. It is also illegal to collect any personal information about children under the age of 13. This is called COPPA, the Children's Online Privacy Protection Act of 1998.

        Perhaps one of the best pieces of advice that you've probably heard over and over, "don't talk to strangers" is good to remember when you're on the Internet. The only problem is, pretty much everyone is a 'stranger' online, when you think about it.

        Some predators have even been known to pose as friends, neighbors, or classmates in order to gain personal information from kids who are online.


        Remember, anything you say in a chat room can be monitored by anyone else there. It may seem strange, but predators will actually keep logs of messages they see going back and forth, and may use them to fool you into thinking they are someone they're not.

        Predators may use information from your 'online' profile if you have one, your screen name or user ID, and any messages they see.

        Even a screen name as simple as "cachrtger1990" might give a predator enough information to know how old you are and what school you go to. If your family or friends know what your screen name means, don't count on the fact that no one else can figure out its meaning.



        A Checklist For Safe Surfing

        Never give any information out about yourself (or anyone else) over the Internet.

        Never download any files on to your computer without a parent or adult's consent.

        If anyone online says anything inappropriate to you, harasses you, or sends you unwanted e-mail, tell an adult immediately, and report it to the proper authorities.

        Remember that on the Internet, people can pretend to be who they are not, and they may go to great lengths to sound convincing.

        If you use chat rooms, use a different chat name (if possible) than your user name or e-mail address.

        Remember, Internet friendships, relationships, and conversations can never be as true, personal, and rewarding as they are in person. If you really need to talk to someone, find a friend, family member, or adult you trust.

        Be wary of ANYONE who wants to know personal information about you.

        Remember that sometimes, when you are on the Internet, you may accidentally meet bad people or see things that are bad, but it's not your fault! If something you read or look at is upsetting, stop looking at it, and go tell an adult you trust or parent.

        If you feel like you have no one you can turn to to talk to at home, you can call a place called 'Covenant House,' at 1-800-999-9999.

        Never buy anything over the Internet without your parent or guardian's approval.

        Internet 'Chat Room' Safety Tips
        Follow all of the above guidelines, and:

        Don't include any part of your name, date of birth, location, or anything sexually suggestive in your 'chat' name.

        Don't go in to private chat rooms.

        When choosing an online chatroom, be cautious of the chatroom name. Stick to chat rooms created by the online service, rather than 'member created' rooms.

        Don't say anything in a chatroom that you wouldn't say in public, in front of your parents or friends.

        If you start to chat regularly with someone, let an adult or parent know.

        Remember, you are in control. If a conversation starts to get strange or make you feel uncomfortable, then leave. Leave the chatroom, and log off. If it is someone saying sexual things to you, tell an adult.

        Never meet anyone face to face that you met on the Internet unless you tell a parent or adult first, and they go with you.

        Don't think of people you've met on the Internet as 'real life' friends. They're just not!

        Don't click on links or go to sites that you're not familiar with.

        Never post a picture of yourself online and never e-mail pictures of yourself to people you don't know.

        Never give out your password and make sure it's something only you know.

        Don't respond to 'flames'- people trying to start an argument, or insults, bad language, etc.


        Internet Security Tips for Seniors

        image
        According to the U.S. Census Bureau 40% of of people 65 and older have a computer at home. Of this total, approximately  25% of these individuals are connected to the Internet.
        If anything, I’m sure these numbers are now even higher, since these numbers were taken from the census of 2005. In Canada, where I live, recent statistics indicate older adults are the fastest growing group of computer buyers and internet users.
        Many of the older people that I have met feel, to some extent, that they have been left behind by technology and the computer age, or as I like to term it “the age of the interconnectedness of all things electronic”.
        Part of this disconnection, in my view, is caused by the mistaken notion that the “younger” generation is tech savvy in the extreme. While it may be true, that in developed countries, those in their teens to 40’s are comfortable texting via cell phones, using social apps like Face Book, Twitter and so on, its sheer media generated hype to extrapolate this level of skill into “a tech savvy” generation.
        My personal experience with older adults has shown me that the perception, sometimes held by older adults themselves,  that the older generation has a  limited interest ,or limited skills in using computers, does a disservice to this varied group.
        Many older adults are now realizing they don’t have to understand computer technology to send e-mail to friends and family, shop online, play games, make greeting cards, read book and film reviews, look into family genealogy or find valuable health information on the Internet.
        So, if you fall into this newly liberated group and have recently acquired a computer, or you just need a refresher course on the fundamental precautions you need to take to secure your computer against the ever increasing exposure we all face to Trojans, Spyware, Viruses, Phishing Scams, and Identity Theft, while connected to the Internet, this article is for you.

        FUNDAMENTAL SECURITY PRECAUTIONS:



        Patch your operating system. Download and install all available patches and service packs by connecting to Windows Update. It is now beyond dispute that 50% of unpatched and unprotected systems will be infected with malicious code within 12 minutes of being connected to the Internet.
        image

        Install a firewall. Windows XP comes with a basic firewall, and if you are running Windows Vista, it comes with a more robust firewall (Windows Firewall) than XP, as well as anti-spyware utilities (Windows Defender). However, the consensus is; third party applications are usually more effective. Keep in mind that the XP firewall offers only minimal protection.

        image

        Choosing a firewall. There are a number of free firewalls that are worth considering. The following are two that do the job particularly well.

        Comodo Firewall Pro:
        The definitive free firewall, Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 14 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!

        PC Tools Firewall:
        I’ve been running with PC Tools Firewall for a few months, first on Win 7 Beta, and now on Windows 7 RC, and in this short time period I have been impressed with its performance. It installed easily, set up quickly, and has not caused any conflicts with my machine despite my sometimes esoteric running requirements.
        The default settings are well thought out, and provide excellent protection for less experience users – and despite the hype put out by the IT industry, most computer user can be classified as having limited system experience.

        Install anti-virus software: There is no doubt that an unprotected computer will become infected by viruses and malware within minutes of first being connected to the Internet. There are many free versions of anti-virus software available and the programs that have a well justified reputation are listed below.

        image

        Avira AntiVir Personal:

        This anti-virus program offers comprehensive protection with an easy to use interface. In the time that I have been testing Avira I have been impressed with its performance, and I have come to rely on it as my primary anti-virus program on an XP Pro system. I highly recommend this one.

        PC Tools Free Antivirus:
        Having tested virtually all of the major antivirus applications, and updates, over the last several years, I’m comfortable recommending the free version of this application as a front line antivirus defender. In the time I have been testing PC Tools Free AntiVirus on my Windows 7 systems, I have been more than satisfied with its performance.
        This free antivirus program offers it’s comprehensive protection within an easy to use interface, and it should meet all of your requirements.
        Install Anti-spyware and Adware Software: It’s not only a virus that can put your computer down for the count, but a multitude of nasties freely floating on the Internet. Listed below are a number of free programs that offer very good protection against malware.


        image

        Spyware Terminator:

        Having tested virtually all of the major anti-spyware applications over the past year or more, I’ve settled, for now, on Spyware Terminator primarily due to its strong real-time protection against spyware, adware, Trojans, key-loggers, home page hijackers and other malware threats.
        Spyware Terminator excels in strong active protection against know and unknown threats. If anything, I find it perhaps a little overly aggressive. On the other hand, better this than the alternative.

        Microsoft Security Essentials:

        I’ve been running Security Essentials as a tester for months on my Win 7 machine, backed up by my usual, on demand, security applications and I’ll state, without any hesitation, I’m impressed. I highly recommend this free application.

        Ad-Aware:
        Many software reviewers consider Ad-Aware Free as the best free adware remover available. It does a relatively good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components.
        The only downside with the free version is real-time protection is not included.

        ThreatFire:
        ThreatFire blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. I highly recommend this one!

        Internet Browser Protection:

        image

        Web of Trust (WOT):
        WOT is a free Internet Browser add-on (my personal favorite), that has established an impressive 4.5/5.0 star user rating on CNET. WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

        SpywareBlaster:
        SpywareBlaster prevents ActiveX-based spyware, adware, dialers, and browser hijackers from installing on your system by disabling the CLSIDs (a system used by software applications to identify a file or other item), of spyware ActiveX controls.
        A secondary but equally important function offered by SpywareBlaster, is its ability to block spyware/tracking cookies and restrict the actions of spyware/adware/tracking sites in Internet Explorer, Mozilla FireFox, Netscape, Seamonkey, Flock and other browsers.
        If you have not yet taking the precautions as outlined above, you are extremely vulnerable and it is critical that you take the following precautions:
        Stop surfing the Web and patch your operating system. Only then download your choice of the protective software as noted above, or software that you are familiar with that will do an appropriate job of protecting your computer.
        Do not visit any other websites until you have done this!

        Additional security precautions:
        Establish a password for the administrator account. Only you should have access to the administrator settings on your PC. Unfortunately, XP installs with open access to the administrator’s account. Be sure to change this.

        Create a new password protected user account. Using this account for your general day-to-day activities adds another layer of protection to your computer. A user account does not have the same all-access permissions as your administrator account, and in many cases this extra layer of protection will restrict malware from gaining a foothold on your PC.
        My apologies for using the word”Senior” in the title of this article – it is not a word I’m personally comfortable with.
        imageAccording to the U.S. Census Bureau 40% of of people 65 and older have a computer at home. Of this total, approximately  25% of these individuals are connected to the Internet.
        If anything, I’m sure these numbers are now even higher, since these numbers were taken from the census of 2005. In Canada, where I live, recent statistics indicate older adults are the fastest growing group of computer buyers and internet users.
        Many of the older people that I have met feel, to some extent, that they have been left behind by technology and the computer age, or as I like to term it “the age of the interconnectedness of all things electronic”.
        Part of this disconnection, in my view, is caused by the mistaken notion that the “younger” generation is tech savvy in the extreme. While it may be true, that in developed countries, those in their teens to 40’s are comfortable texting via cell phones, using social apps like FaceBook, Twitter and so on, its sheer media generated hype to extrapolate this level of skill into “a tech savvy” generation.
        My personal experience with older adults has shown me that the perception, sometimes held by older adults themselves,  that the older generation has a  limited interest ,or limited skills in using computers, does a disservice to this varied group.
        Many older adults are now realizing they don’t have to understand computer technology to send e-mail to friends and family, shop online, play games, make greeting cards, read book and film reviews, look into family genealogy or find valuable health information on the Internet.
        So, if you fall into this newly liberated group and have recently acquired a computer, or you just need a refresher course on the fundamental precautions you need to take to secure your computer against the ever increasing exposure we all face to Trojans, Spyware, Viruses, Phishing Scams, and Identity Theft, while connected to the Internet, this article is for you.

        FUNDAMENTAL SECURITY PRECAUTIONS:

        Patch your operating system. Download and install all available patches and service packs by connecting to Windows Update. It is now beyond dispute that 50% of unpatched and unprotected systems will be infected with malicious code within 12 minutes of being connected to the Internet.
        image
        Install a firewall. Windows XP comes with a basic firewall, and if you are running Windows Vista, it comes with a more robust firewall (Windows Firewall) than XP, as well as anti-spyware utilities (Windows Defender). However, the consensus is; third party applications are usually more effective. Keep in mind that the XP firewall offers only minimal protection.
        image
        Choosing a firewall. There are a number of free firewalls that are worth considering. The following are two that do the job particularly well.
        The definitive free firewall, Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 14 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!
        I’ve been running with PC Tools Firewall for a few months, first on Win 7 Beta, and now on Windows 7 RC, and in this short time period I have been impressed with its performance. It installed easily, set up quickly, and has not caused any conflicts with my machine despite my sometimes esoteric running requirements.
        The default settings are well thought out, and provide excellent protection for less experience users – and despite the hype put out by the IT industry, most computer user can be classified as having limited system experience.
        Install anti-virus software: There is no doubt that an unprotected computer will become infected by viruses and malware within minutes of first being connected to the Internet. There are many free versions of anti-virus software available and the programs that have a well justified reputation are listed below.
        image
        This anti-virus program offers comprehensive protection with an easy to use interface. In the time that I have been testing Avira I have been impressed with its performance, and I have come to rely on it as my primary anti-virus program on an XP Pro system. I highly recommend this one.
        Having tested virtually all of the major antivirus applications, and updates, over the last several years, I’m comfortable recommending the free version of this application as a front line antivirus defender. In the time I have been testing PC Tools Free AntiVirus on my Windows 7 systems, I have been more than satisfied with its performance.
        This free antivirus program offers it’s comprehensive protection within an easy to use interface, and it should meet all of your requirements.
        Install Anti-spyware and Adware Software: It’s not only a virus that can put your computer down for the count, but a multitude of nasties freely floating on the Internet. Listed below are a number of free programs that offer very good protection against malware.
        image
        Having tested virtually all of the major anti-spyware applications over the past year or more, I’ve settled, for now, on Spyware Terminator primarily due to its strong real-time protection against spyware, adware, Trojans, key-loggers, home page hijackers and other malware threats.
        Spyware Terminator excels in strong active protection against know and unknown threats. If anything, I find it perhaps a little overly aggressive. On the other hand, better this than the alternative.
        I’ve been running Security Essentials as a tester for months on my Win 7 machine, backed up by my usual, on demand, security applications and I’ll state, without any hesitation, I’m impressed. I highly recommend this free application.
        Many software reviewers consider Ad-Aware Free as the best free adware remover available. It does a relatively good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components.
        The only downside with the free version is real-time protection is not included.
        ThreatFire blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. I highly recommend this one!
        Internet Browser Protection:
        image
        WOT is a free Internet Browser add-on (my personal favorite), that has established an impressive 4.5/5.0 star user rating on CNET. WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.
        SpywareBlaster prevents ActiveX-based spyware, adware, dialers, and browser hijackers from installing on your system by disabling the CLSIDs (a system used by software applications to identify a file or other item), of spyware ActiveX controls.
        A secondary but equally important function offered by SpywareBlaster, is its ability to block spyware/tracking cookies and restrict the actions of spyware/adware/tracking sites in Internet Explorer, Mozilla FireFox, Netscape, Seamonkey, Flock and other browsers.
        If you have not yet taking the precautions as outlined above, you are extremely vulnerable and it is critical that you take the following precautions:
        Stop surfing the Web and patch your operating system. Only then download your choice of the protective software as noted above, or software that you are familiar with that will do an appropriate job of protecting your computer.
        Do not visit any other websites until you have done this!
        Additional security precautions:
        Establish a password for the administrator account. Only you should have access to the administrator settings on your PC. Unfortunately, XP installs with open access to the administrator’s account. Be sure to change this.
        Create a new password protected user account. Using this account for your general day-to-day activities adds another layer of protection to your computer. A user account does not have the same all-access permissions as your administrator account, and in many cases this extra layer of protection will restrict malware from gaining a foothold on your PC.
        My apologies for using the word”Senior” in the title of this article – it is not a word I’m personally comfortable with.