Solved

Blocking Inappropriate Web Sites

Posted on 2007-03-22
4
186 Views
Last Modified: 2013-12-04
I am looking for a good program to monitor Internet sites specifically those that curious teen and pre-teen boys find themselves looking at when they think their parents are not around. We had downloaded the program provided by Earthlink but it caused nothing but problems. It caused my comouter to lock up. Ever since I removed it my system has run like a dream. Does anyone on this Exchange have a recommendation and/or experience with such programs? Thanks!

Robert
0
Comment
Question by:RobertEhinger
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 125 total points
ID: 18775230
I've had good results with cybersitter. An advantage of cybersitter is that it's a one time registration, you don't have to renew a subscription every year like with other similar software.

http://www.cybersitter.com/
0
 
LVL 47

Assisted Solution

by:rpggamergirl
rpggamergirl earned 125 total points
ID: 18775444
I have a reason for not recommending Cybersitter, though there are other programs out there that you can try.

I would recommend using a hosts file to block those unwanted sites. Most unwanted sites are already blocked with this hosts file. You won't have any trouble at all.
http://www.mvps.org/winhelp2002/hosts.htm
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20286622
Forced accept.

Computer101
EE Admin
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question