How to Block my Teenager from Explicit Chat Rooms

Posted on 2005-05-05
Last Modified: 2013-12-04
My son has a computer in his room that is connected to the internet.  I have Windows Explorer's security turned up to block explicit web sites, but he can still access chat rooms such as "sexandthecity" and "bachelorette," both of which seem to have plenty of explicit converstations and request for pictures, etc.  

Is there a product I can buy that will block sexually explicit or violent chat rooms?  If not, is there one which will just block all chat rooms?  He is using AOL IM Chat.

Question by:rjsteinm
    LVL 18

    Accepted Solution

    If I were in the situation that I wanted to block content to someone, I would do it this way.  Blocking content is all about compromise, you can never get it all.
    The first step is to remove the internet connection.  That way, no unwanted content is getting in.  Then, instead of giving a full connection, use a proxy running on another machine to grant partial access.  In this case, we would run an HTTP (web) proxy.  There are many proxies available, and even "content filtering proxies" that will keep the explicit web content from going any further right there, in addition to the web browser settings.

    If this isn't good enough to please your son, I'd then advise installing an additional proxy (From what I know, almost anything that's proxy-compatible can run through a SOCKS proxy) with password proteection.  He doesn't get the password, but when you can be in the room monitoring him, you can enter it yourself.

    This might be a bit more strict than you desire, but you didn't specify enough of your goal for me to know, so I offer it as a possibility.
    LVL 20

    Assisted Solution

    LVL 9

    Assisted Solution


    This link says that it can filter instant messaging.,1759,1618830,00.asp

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    Article by: btan
    The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
    Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    how to add IIS SMTP to handle application/Scanner relays into office 365.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now