Solved

Enforcing Strict Filtering on Google

Posted on 2007-03-23
4
1,092 Views
Last Modified: 2013-12-09
Hello, I work for a small school district, and our students have been able to use inappropriate words in their search terms to access adult contact on google images. We have made it so that they cannot change their preferences to disable the safe search. However, it only works to an extent. Google does offer a higher level of filtering, called Strict filtering. Is there a way that I can FORCE the strict filtering to be used for all of our students?? We tried duplicating cookies and such with no luck.
0
Comment
Question by:khyer123
  • 2
4 Comments
 
LVL 12

Expert Comment

by:Sinoj Sebastian
ID: 18784460
0
 
LVL 4

Author Comment

by:khyer123
ID: 18784526
Wow.... that's a LOT to do if I have to do that for EVERY student.... I'm talking 800 students here... I'm hoping there's another way...
0
 
LVL 2

Accepted Solution

by:
joshnunn earned 500 total points
ID: 18798611
If your school uses some sort of proxy caching (such as Squid http://www.squid-cache.org/), it's possible to grab every web-request for Google and tack the "&safe=active" command onto every URL passed to Google. This site:
http://www.granths.com.au/edwiki/index.php?title=Google_Safe_search_redirector
has more information on the actual script you would use, if your site uses squid. If you do not, I would investigate whether you have some sort of proxy between you and the internet and talk to whoever is in charge of that and ask for such a script to be put on the device. Apparently squid is easy to set up, so if you have a spare machine lying around you could cobble this together yourself.
0
 
LVL 4

Author Comment

by:khyer123
ID: 18800509
Awesome!! I will have my ISP do this for me :) Thanks!!
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This video teaches users how to migrate an existing Wordpress website to a new domain.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now