Tuesday, December 1, 2009

Internet parental control software



When using internet parental control software, it allows you to filter harmful web content and to control what is being downloaded. This software gives you the ability to control and monitor your child's use of the Internet no matter where you are. It helps you to protect your child from the dangers of the Internet.

Also these types of program help you see whenyour child can use the computer for entertainment, and when for doing homework. It allows you to restrict the times when the computer can be used, and to set the times that your child can look on the Internet, play games, use certain programs, and watch movies.

Fiber Optic communication



Fiber optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. It is a technology that uses either glass or plastic threads to transmit data. Fiber Optic communications have a few advantages over the traditional metal communication lines. They can carry a lot more data and are less prone than metal cables to interference. They are also much thinner and lighter.




The disadvantages, however, of fiber optics is that the cables can be expensive to install. They are also more fragile than wire. These fiber optics are known to be a popular technology for local-area networks. It has been said that in the future almost all communications will employ fiber optics.



Wireless networking precautions




In 2004, a study was done to prove that sixty to seventy percent of all wireless networks are insecure. When having an unsecured wireless network in your home, anyone who is in close distance can access your online activities. Therefore, to secure your wireless network you should use encryption. Almost all wireless access points have some sort of encryption mechanism built in. Use a WPA encryption because the WEP encryption can be deciphered if the person captures enough data.



Another precaution to take is if your wireless access point allows you to disable the identifier broadcaster, you should do so. You should also change your SSID or ESSID because you don't your access point to have an out of the box name. These are the names that are assigned to the wireless access point. Another thing you can do to help secure your wireless access point is to limit which computers are allowed to use it. Every network interface card comes with a MAC address. Most wireless access points contain a mechanism that you can use to tell the access point that only network cards with these specific MAC addresses are allowed to use the network.



Strong password



It is extremely important that you create a password that is completely secure. If someone were to retrieve your password they would be able to access all sorts of private accounts such as your credit card, e-mail, etc. However, there are many ways to prevent this. You should focus on making the length of your password at least eight characters are more. The more characters you add, the more protected your password will be. It is also important that you keep your characters to a great variety. If you combine different types of letters and symbols, the harder it will be for someone to guess your password.


When creating a strong password you should avoid using your login name. Using your personal information such as your birthday, name, social security number, are all types of information that can be retrieved. A criminal can find these through records and may automatically try any of this information. Lastly, the best way to remember your password is to write it down and securely hide it to keep it a secret.




Internet Monitoring, Blocking and tracking



The internet has turned into such an unsecured environment over the years. Parents have chosen to monitor their kids while they use the internet. Internet monitoring is the process of testing how end-users interact with a website. It is often used to ensure that a website is available to users.



Internet tracking is the process of receiving and reviewing media that is available on the internet web to determine if a particular media item has or has not been made available. It involves searching through different web pages and looking for those that have descriptive text, watermark images, file names or embedded links.



http://www.how-to-monitor-internet-use.info/



Internet Filter




Internet filters, also known as a web filter, is a program that determines whether or not all of the incoming Web page should be displayed. What the filter does is it checks the content of a Web page along with a set of rules provided by the person who has installed the Internet filter. Its main purpose is to keep out Web sites that can cause viruses such as pornographic content, spy ware viruses, etc. Some of these internet filter products also include reporting so that the person installing can see what kind of travel is being filtered and who is requesting it.



Certain products of internet filtering allows soft blocking where the administrator is allowed to unlock a page. Even though internet filters do block a certain amount of unwanted Web sites, security experts still suggest other forms of protection. An internet filter is often installed as part of a proxy server and firewall.



Internet parental guidance



Due to the increase with insecure internet networks, parents must be responsible for what their children search on the web. They must use internet filtering software to protect their children from predators on the internet. What responsible parents need to do is prevent objectionable material from coming into their home and to limit their children’s time on the computer.



Parents need to learn about the internet, and get involved. Their involvement in a child’s life is the best way to keep a child safe. It is also important to stay informed about the parental control tools that can help restrict unwanted websites. It is important for children to have supervised internet access to keep them safe. Restrictions need to be made so that no child accidentally comes across an adult-only area that can be controlled by a predator.





Tuesday, September 29, 2009

Homework 1


Since our posting this afternoon, we’ve gotten some great feedback, as well as some insightful questions about the new CNN App. We’d like to take the opportunity to address a few points head-on, all of which are related to how we’re able to make CNN’s mobile products even better.
Full disclosure: We’re charging a one-time fee of $1.99 for the CNN App on the iPhone and iPod touch, and the App also has ads in it. We did this for two reasons: 1. To deliver on a premium experience with unique features and functionality never before available from CNN on a mobile device; and 2. to ensure we were positioned to continue building new, improved mobile products to offer consumers.
It is imperative to us that the ads are incorporated in a way that is respectful to our consumers. It includes modestly-sized banner ads with ability to expand – but only if the user initiates it. Further, you can go back to the content quickly, typically with one click and without closing the app.
From the beginning, our goal was to build a groundbreaking app at a reasonable price point. We understand some of you don’t want to pay for that experience; but we hope you’ll continue to use CNN’s mobile site optimized for the iPhone – which you can access for free. But we also know that many of you already have downloaded the App for $1.99, and really are enjoying it. If you’d like to learn more about all the App has to offer before downloading it, check out www.cnn.com/iphone – it’s a good resource.
I know that’s a lot of info, but we thought we owed it to you to explain all this just a bit more. Regardless, thanks for being such fantastic users – your feedback is critical to making all of our platforms and products better!

Tuesday, September 22, 2009