• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Chapter 15. Parental Controls

We have seen how easy it is for a hacker, a company, or a government to invade your privacy. You can take many steps to protect your information and your computer. What about protecting others in your household? If you are running a home network or even just have one machine that everyone shares, you really need to be concerned about who is using the Internet. If others in your house can compromise your information by modifying your computer and protection methods, you might as well have no protections in place. Your kids can be particularly dangerous to your home connectivity through inadvertent changes they make or threats to themselves by how they use the Internet.

Kids use the Internet for various reasons, including doing homework, e-mailing friends, chatting with friends and teachers, and playing games. With all this Internet activity, you should know by now that a danger to children exists. Their Internet usage is valuable to marketing companies, they can be targets of hackers, and more importantly, they can be targets of cyber stalkers. The Internet has brought forth new challenges for parents in protecting their children.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint