Sunday, December 7, 2008

7. How to use Google searching effectively?



Typically, when you want to find out information about something you can type in google.com and then type into the search box whatever you are looking for. There are other options that a person can use to find more information to specify what you need to search for. For example, there is the advanced search button. When you click advanced search you are given the option to write specific words to help find whatever it is you are looking for.

Besides for finding information, google also allows you to find images, maps, news, it allows you to check email, shop for items, and find scholarly articles on research. You can do this by typing what the information you are looking for in the search button. You then hit enter, and this will bring you to a new screen. Go to the top of this page and you get the options of either clicking, images, news, maps, shopping, etc.. You then can choose which of these you want to go into. Google is a very useful tool for most people. If you ever need to find something out. I would suggest using google.

www.google.com

6. Wireless networking precaugtions



When you begin to use a wireless network you make yourself susceptible for hackers to hack into your computer. Going totally wireless at home brings with it some possible problems as any new technology will do. Not the least of those concerns is security. Going wireless means by definition that access to your computing resources and the internet is occurring without wires, through the air. And just as every computer in the house can access those digital signals, so can those outside the house and those who might not wish to use those signals properly. Therefore when planning your wireless network at home, some precautions and preventative measures should be observed so assure that your network at home is just as secure in a wireless mode as it was when you used cables and physical connections.


Here is a checklist to remind you about saftey precautions when using a wireless network:
  • Change the default SSID for each wireless network access point device.
  • Disable automatic SSID broadcast.
  • Turn on WEP encryption.
  • Research upgrading your wireless network encryption to WPA/TKIP.
  • Filter the MAC address of your network card.
  • Change all default user names and passwords for new network access devices.
  • Change the default IP subnet that your wireless router is preset to (192.168.1.0).
  • Disable DHCP IP address generation.
  • Implement firewall protection between the wireless network and other networks and between the wireless network and the internet.
http://www.pool-king.com/secure-wireless-network.php

5. Strong Password



Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts. A password is strong when, you Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal.Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess.

There are six steps to creating a strong password: 1. Think of a sentence that you can remember. 2. Check if the computer or online system supports the pass phrase directly. 3. If the computer or online system does not support pass phrases, convert it to a password. 4. Add complexity. 5. Finally, substitute some special characters. 6. Test your new password with Password Checker.


http://www.microsoft.com/protect/yourself/password/create.mspx.


4. Internet Parental control software



Parental Controls" is a term that has been widely used to describe tools that allow parents to choose appropriate content for their children. Parental control software has been developed for everything from TV to the Internet. Safe Eyes falls in the later category of Internet parental control software. Safe eyes is a flexible set of tools that allows anyone to determine the type Internet usage that is appropriate.

Safe Eyes Parental Control Software Includes:

  1. Content Controls - Flexible content control allows you to select the types of website that are appropriate.
  2. Program Controls - Control Instant Messengers, P2P File Sharing, and other harmful programs.
  3. Time Controls - Control the amount of time spent online, and the times when the internet is available.
  4. Usage Logging - Create and review logs of websites visited, programs used on the Internet, and Instant Messaging Chats.
  5. Usage Alerts - Be notified instantly via email, text message, or phone call when someone visits inappropriate websites.


http://www.internetsafety.com/safe-eyes-parental-control-software.php

Saturday, December 6, 2008

3. Internet Monitoring, Blocking, and Tracking



These software's help protect your computer from viruses and other spam that will come onto your computer. The blocking software stops outside information from entering your computer. It will send you a quick message telling you that your computer is blocking an item do you want to keep it blocked.

The tracking software track viruses and other information. It will make sure that your computer is not vulnerable to getting a virus. The monitoring helps you monitor what your children can see and what your children can go on to use on the web.

2. Internet Filters




The danger for children on the World Wide Web comes with its openness. The web is completely unregulated. Anyone can post information on the Web and provide links to other pages. Parents need to do something to protect their children from these dangers. Parents can do four things to provide safety for their children. These four things are: use internet blocking or filtering software. Provide education, talking to your child about safety on the World Wide Web.
Establish family rules about internet use, and Make it a rule that the child not give out family information without the parent’s consent.

Internet filtering comes in two categories:
Software that the parent can load onto the computer at home.
Programs that can be activated through the internet provider, which will filter web sites for you.

The filtering mechanism on these programs work by:
Scanning sites and blocking those that contain specific words.
Blocking sites that are found to contain sexually explicit, violent or hateful material.
Limiting a child's search to a predefined set of sites or to sites that meet certain criteria






1. Internet Parental Guidance



It is the parents responsibility now a days to filter the internet and protect their children from predators, and from material that is not suitable for children. Parents can do this by going on the inernet and setting up parental blocks and filters that will deny their children access to certain web pages.

KidSafe.com - Child Safety and Parenting Articles and News Kid Safe is one of the largest parenting resources on the web. We offer a huge collection of child safety articles and products that will keep your family safe and secure.




http://www.resources.safestware.com/privacy-security-for-the-family.htm