Solved

Controlling Internet access for kids.

Posted on 1998-12-15
9
282 Views
Last Modified: 2016-03-23
I'm going to configure a machine (486, running Win95) for intenet access and was asked to include limit access for kids.
Does anyone of a farily secure software to to this?.
I've heard of some names like Cyber Patrol, but have not tried any of them.
Will appreciate any help on this.
Season's Greetings !.

Efrain R Portales
0
Comment
Question by:efrain12
  • 5
  • 3
9 Comments
 
LVL 3

Accepted Solution

by:
vikiing earned 50 total points
ID: 1013657
CyberPatrol is at www.cyberpatrol.com), and you can try these another ones:

bess.net
www.netnanny.com
www.dai.net
www.cyber-snoop.com
www.timesup.com

0
 

Expert Comment

by:sureshmovva
ID: 1013658
What is the Browser you are using ?. 1) Internet Explorer 2) Netscape Navigator
1) If you are using Internet explorer 3.0 or above go to 'View' - 'Options', Select the 'Security' Tab. Click on 'Enable Ratings', Give a password, re-enter the password for confirmation. Select the 'Ratings'  Tab , Now Select the appropriate 'Cateogory' and set the 'Rating' level for each category. Now Goto 'General' Tab where you have options for enablig users to see sites which have no rating. Select the choice's which you prefer.
After everything is set properly, Press 'OK' .

2)For Netscape Navigator there are no such options to 'Enable Ratings', In this case you have to download special softwares which are available such as
   www.cyberpatrol.com
   bess.net
   www.netnanny.com
   www.dai.net
   www.cyber-snoop.com
   www.timesup.com


0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013659
Sureshmovva: the "Enable ratings" button is under "Content" tab, not in "Security".

Besides that, the way you suggest to block children access is too poor, provided that a curious kid can access Web world thru Outlook, ICQ, mIRC, Pirch and a lot more. Specialized software can take care of all that, not only at browser-level operations.


0
 

Author Comment

by:efrain12
ID: 1013660
Thanks to both vikiing and suresh*.
I guess the points will go to vikiing, and this is kind of unfair for suresh*.
Thanks to both again.
Feliz Navidad !.

Efrain R Portales
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 3

Expert Comment

by:vikiing
ID: 1013661
Gracias por los puntos !!!; y Felices Fiestas también para vos !!

(Thanks for the points !!!; Merry Xmas for you too !!)

0
 

Expert Comment

by:sureshmovva
ID: 1013662
Viking, According to IE 3.0, The 'Enable Ratings' button is under 'Security' Tab. It has changed in IE 4.0. I had already read Ur suggestion, U had asked to download software whcih restricts access, So I suggested a different way, (i.e) That is through Browser.
Thanks for Ur suggestion.
Suresh
0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013663
Suresh: sorry for the miss; many times one forgets the difference of versions. Thanks for the explanation.

(btw, ¿where are you from?, the name "Suresh" suggests me India, or something like, ¿am I wrong?. Tnx.)

0
 

Expert Comment

by:sureshmovva
ID: 1013664
Viking,
  Yes I am from India, where R U from ?..
Merry christams

0
 
LVL 3

Expert Comment

by:vikiing
ID: 1013665
I'm from Buenos Aires (Argentina).

Merry Xmas and a Happy New Year, for you and all experts, and to all E.E. staff !!!!!!!!

0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now