Unleash Your Geek

"Welcome To Unleash Your Geek!"

Friday, September 26, 2008

Keeping Your Children Safe on the Net

One would think with Shaq roaming the cyber streets looking for predators that the Internet would be a safe haven for children, but the reality is that the Internet remains a place where children are increasingly exposed to harm. So how can you protect your child and allow them the ability to roam the net?

1. Filter the Internet
Filters have the express purpose of keeping things that we don’t want out. For example, an air filter keeps allergens, etc… out of the air. Internet filters work in the same way. They block both specific content which you as a parent can identify (such as websites you know you don’t want your child to open) as well as general content which allows you to set risk levels associated with websites in general (for example, a medium risk level would block most bad websites, but may let some through depending on the nature of the content). One of the best filters around is BSafe Online (www.bsafehome.com). I have personally used this filter at home and found it very easy to install and use. It allows you to customize the filter as described above. This is also a Christian-based company.

2. The Names have been changed to Protect the Innocent
DO NOT, I repeat DO NOT allow your child to put their real name in any profile for any website. This is an easy way for predators to find a child. Emphasize with your child that they can use their first name only or a Pen Name that their friends know. This will keep them safe without hindering their communication capabilities.

3. Make a change of Location
Ever wanted to live in California? Well now is your child’s chance to live their virtually. It is best if they do not put their location (even just the state) in a profile, however, if they insist, have them choose a state a good distance away from where you live. NEVER put specific information such as a street address, phone number, or zip code

4. Not Photo friendly
One way in which predators are able to home in on a potential victim’s location is through pictures. Your child most likely enjoys sharing pictures of them hanging out with friends, on vacation, etc…with others. While there does not seem to be anything wrong with this, often times they will wear clothing which identifies where they are. Photos of your child that have a school name or logo should be avoided. Predators can simply search for the name of the school and now they know where your child is when you are not there. Also avoid pictures that have a date/time stamp on them or a photo that has a location tag. Many cameras today tag photos with these identifiers which could also lead a predator to your child.

5. Be Big Brother
As a parent, you do not want your child to be the one completely lacking a social life, however, you must make your child understand the dangers the Internet poses to them and what they need to do to protect themselves. Have them provide you an Instant Messaging, Facebook, My Space, or other account names. This will allow you to monitor their posts and the safety of the information they put on the Internet.

6. Knowledge is Power
Remember, the more aware your student is of the dangers our there, the better equipped they will be to defend themselves. Do not be afraid to ask them questions and get responses about their online social life. Do not allow them to go unprotected, educate them.

Thursday, September 18, 2008

Keep Your Computer Safe!

We have all experienced purchasing a brand new computer, hooking it up and being pleasantly surprised at how well it performs, only later to see that performance decline. Why does this always seem to be the case? A computer that once was able to perform complex tasks quickly and efficiently seems bogged down by some unknown source. The perpetrator of this lagging effect is malware. Malware is simply a term which refers to software whose intent is to harm your computer. Malware can include spyware, viruses, worms, and the like. So the next question is how does my computer become infected with this malware and what can I do to defend against it? In this case, the best defense is a good offense. While your computer may have come with a free trial of McAfee or Norton, once that subscription is up, it is time to start shopping. There are a number of free as well as paid software suites which can provide adequate protection of your PC. My personal favorite is Spy Sweeper, produced by the company Webroot (www.webroot.com). I have run this software on three different computer with a variety of connections to the Internet, each system has run flawlessly once Spy Sweeper was installed. Another great feature of this software is that it comes with free tech support, is easy to install and use, and only costs 29.95 for a 1 year subscription (At the time of writing this article, Fry’s Electronics on Windward Parkway had the software on sale for $15). My favorite free software is Spyware Terminator, produced by Crawler (www.spywareterminator.com). This package provides real-time protection and many of the features of paid software for free. While this is great software for those of us on a budget, if you can muster up the cash, I highly recommend Spy Sweeper. Regardless of whether you pay for your protection or not, it is crucial that you leave no computer exposed. Remember that a computer that is connected to the Internet (whether you browse the Internet or not) can be infected within hours of being plugged in. So protect your asset and happy surfing!

Welcome!

Welcome to the Unleash Your Geek blog, My name is Brent Hollers and I teach high school Computer Systems at a local school. I have created this blog for the express purpose of educating individuals on computers, technology, and the internet. I hope this blog meets your needs. Please email me at coachhollers@gmail.com with ideas or suggestions. Thanks for checking out the blog!