Controlling Internet access for kids.

Posted on 1998-12-15
Last Modified: 2016-03-23
I'm going to configure a machine (486, running Win95) for intenet access and was asked to include limit access for kids.
Does anyone of a farily secure software to to this?.
I've heard of some names like Cyber Patrol, but have not tried any of them.
Will appreciate any help on this.
Season's Greetings !.

Efrain R Portales
Question by:efrain12
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3

Accepted Solution

vikiing earned 50 total points
ID: 1013657
CyberPatrol is at, and you can try these another ones:


Expert Comment

ID: 1013658
What is the Browser you are using ?. 1) Internet Explorer 2) Netscape Navigator
1) If you are using Internet explorer 3.0 or above go to 'View' - 'Options', Select the 'Security' Tab. Click on 'Enable Ratings', Give a password, re-enter the password for confirmation. Select the 'Ratings'  Tab , Now Select the appropriate 'Cateogory' and set the 'Rating' level for each category. Now Goto 'General' Tab where you have options for enablig users to see sites which have no rating. Select the choice's which you prefer.
After everything is set properly, Press 'OK' .

2)For Netscape Navigator there are no such options to 'Enable Ratings', In this case you have to download special softwares which are available such as


Expert Comment

ID: 1013659
Sureshmovva: the "Enable ratings" button is under "Content" tab, not in "Security".

Besides that, the way you suggest to block children access is too poor, provided that a curious kid can access Web world thru Outlook, ICQ, mIRC, Pirch and a lot more. Specialized software can take care of all that, not only at browser-level operations.

Three Considerations for Containers

Containers like Docker and Rocket are getting more popular every day. In my conversations with customers, they consistently ask what containers are and how they can use them in their environment. If you’re as curious as most people, read our article on Experts Exchange.


Author Comment

ID: 1013660
Thanks to both vikiing and suresh*.
I guess the points will go to vikiing, and this is kind of unfair for suresh*.
Thanks to both again.
Feliz Navidad !.

Efrain R Portales

Expert Comment

ID: 1013661
Gracias por los puntos !!!; y Felices Fiestas también para vos !!

(Thanks for the points !!!; Merry Xmas for you too !!)


Expert Comment

ID: 1013662
Viking, According to IE 3.0, The 'Enable Ratings' button is under 'Security' Tab. It has changed in IE 4.0. I had already read Ur suggestion, U had asked to download software whcih restricts access, So I suggested a different way, (i.e) That is through Browser.
Thanks for Ur suggestion.

Expert Comment

ID: 1013663
Suresh: sorry for the miss; many times one forgets the difference of versions. Thanks for the explanation.

(btw, ¿where are you from?, the name "Suresh" suggests me India, or something like, ¿am I wrong?. Tnx.)


Expert Comment

ID: 1013664
  Yes I am from India, where R U from ?..
Merry christams


Expert Comment

ID: 1013665
I'm from Buenos Aires (Argentina).

Merry Xmas and a Happy New Year, for you and all experts, and to all E.E. staff !!!!!!!!


Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question