Solved

Controlling Internet access for kids.

Posted on 1998-12-15
9
286 Views
Last Modified: 2016-03-23
I'm going to configure a machine (486, running Win95) for intenet access and was asked to include limit access for kids.
Does anyone of a farily secure software to to this?.
I've heard of some names like Cyber Patrol, but have not tried any of them.
Will appreciate any help on this.
Season's Greetings !.

Efrain R Portales
0
Comment
Question by:efrain12
  • 5
  • 3
9 Comments
 
LVL 3

Accepted Solution

by:
vikiing earned 50 total points
ID: 1013657
CyberPatrol is at www.cyberpatrol.com), and you can try these another ones:

bess.net
www.netnanny.com
www.dai.net
www.cyber-snoop.com
www.timesup.com

0
 

Expert Comment

by:sureshmovva
ID: 1013658
What is the Browser you are using ?. 1) Internet Explorer 2) Netscape Navigator
1) If you are using Internet explorer 3.0 or above go to 'View' - 'Options', Select the 'Security' Tab. Click on 'Enable Ratings', Give a password, re-enter the password for confirmation. Select the 'Ratings'  Tab , Now Select the appropriate 'Cateogory' and set the 'Rating' level for each category. Now Goto 'General' Tab where you have options for enablig users to see sites which have no rating. Select the choice's which you prefer.
After everything is set properly, Press 'OK' .

2)For Netscape Navigator there are no such options to 'Enable Ratings', In this case you have to download special softwares which are available such as
   www.cyberpatrol.com
   bess.net
   www.netnanny.com
   www.dai.net
   www.cyber-snoop.com
   www.timesup.com


0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013659
Sureshmovva: the "Enable ratings" button is under "Content" tab, not in "Security".

Besides that, the way you suggest to block children access is too poor, provided that a curious kid can access Web world thru Outlook, ICQ, mIRC, Pirch and a lot more. Specialized software can take care of all that, not only at browser-level operations.


0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:efrain12
ID: 1013660
Thanks to both vikiing and suresh*.
I guess the points will go to vikiing, and this is kind of unfair for suresh*.
Thanks to both again.
Feliz Navidad !.

Efrain R Portales
0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013661
Gracias por los puntos !!!; y Felices Fiestas también para vos !!

(Thanks for the points !!!; Merry Xmas for you too !!)

0
 

Expert Comment

by:sureshmovva
ID: 1013662
Viking, According to IE 3.0, The 'Enable Ratings' button is under 'Security' Tab. It has changed in IE 4.0. I had already read Ur suggestion, U had asked to download software whcih restricts access, So I suggested a different way, (i.e) That is through Browser.
Thanks for Ur suggestion.
Suresh
0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013663
Suresh: sorry for the miss; many times one forgets the difference of versions. Thanks for the explanation.

(btw, ¿where are you from?, the name "Suresh" suggests me India, or something like, ¿am I wrong?. Tnx.)

0
 

Expert Comment

by:sureshmovva
ID: 1013664
Viking,
  Yes I am from India, where R U from ?..
Merry christams

0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013665
I'm from Buenos Aires (Argentina).

Merry Xmas and a Happy New Year, for you and all experts, and to all E.E. staff !!!!!!!!

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Activate recording on Zavio B7510 5M Outdoor Bullet IP camera 1 59
WORM compliant device  what is it? 12 90
Office 365 Login Audit Report 1 45
Home lab datacenter 9 96
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

766 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question