Director Test Research: David Walkiewicz
|
|
- Cody Porter
- 7 years ago
- Views:
Transcription
1 7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees ought to use parental control software. It is available either as a standalone product or is usually an enhanced feature built into an Internet security suite. AV-TEST labs examined 17 solutions in what represents the first truly comprehensive test. Children often have access to the Internet without any adult being present. After all, younger children are often better informed than the older generation. But anyone who knows the Internet also knows that there is a vast amount of content not suitable for children. Usually all it takes is a search in Google or one false click on a banner, and the user is in an area with very revealing images and text. 17 solutions put to the test In the labs at AV-TEST, 7 solutions specially developed for child protection were tested. An additional 8 Internet security suites each offering enhanced child-features in the package were included in the test. For better comparison, the free parental control features that come with Windows 8 and Mac OS X were also tested. Microsoft includes the Microsoft Family Safety enhancement; Mac OS X features the Parental Controls tool. The products are offered by Bitdefender, BullGuard, escan, F-Secure, Kaspersky Lab (two solutions), McAfee, Mobicip, Net Nanny, Quickheal, Salfeld (two versions), Symantec, Telekom and Trend Micro. In the test, all the products were installed with default settings and configured for a 7 year-old child, or rather, the predefined settings were chosen for that age group. Afterwards, a test was conducted as to whether the available search machines such as Google, Bing, or Yahoo, for instance, were set to safe-search mode. This mode filters out all content and links that are only intended for adults. At the same time, other search machines that do not offer any safe-search function, are not allowed to be selectable. Any other control options were also tested and noted. This includes time limits for PC and Internet use, as well as a program control. The latter option only allows applications that a child needs. Video players or download programs can be blocked in this manner. On some applications, protection for Facebook is included among the additional features. It is intended to ensure that harmful links and spam are intercepted. This function is offered by only 7 out of the 17 applications. Somewhat surprising: Only the 4 dedicated parental control software packages prevent children from getting around the protection function by running Windows in safe mode. Remote Monitoring For some products, the additional function "remote control and administration" is tied to the essential log and report functions. Only roughly half of the solutions allow the activity of the parental control function to be monitored via a website or a tool on another device. This enables parents to also lock contacts in the Instant Messenger, for example, or block special Internet domains. As previously described, all the activities end up in log and report files. 12 out of 17 solutions note all the websites visited. If a website was visited that was not blocked or was not a site detected as being forbidden, parents are not informed of this when running F-Secure, Net Nanny, Quickheal, Telekom and Trend Micro. All the programs, except for those from Telekom and F- Secure, log visits of blocked websites. Regardless of whether they were previously blocked or detected by the program logic due to the content. Many products also log the entire search history, as well as the list of all blocked programs that the user has attempted to launch. Those seeking to monitor their children in their PC and Internet usage time also have to settle for compromises on many protection tools. Only F-Secure, Kaspersky (Internet Security) and Salfeld offer this full capability. An additional 4 products either note the usage time of the PC or the time spent online in the Internet. 9 products do not log anything at all in this category; also included are 4 dedicated parental control packages.
2 The fine art of blocking web addresses The most important test segment is the detection and analysis of terms and web addresses that children normally input or click on. Many programs offer various categories that can be adapted or deactivated. There are some differences among some of the programs tested. Not all have the same categories. In particular, the tested enhanced features of Windows and Mac OS X only pay attention to the category of "sex, pornography, nudity". It is necessary for them to catch missing categories with logical detection algorithms and word matching. Many products offer so-called whitelisting. In this feature, only websites explicitly entered in a list are allowed. Access is denied to all other sites. Because the manufacturers come from different countries, however, their lists reveal heavy regional and language influences. Therefore, the testers did not use this function in the test. The products were required to classify and, if necessary, sort out the websites solely based upon their own techniques, logic, syntax, and word analysis. As an initial step, the lab visited over 12,000 inappropriate websites, followed by 13,000 websites that are suitable for children. In tests by other laboratories, often in this phase only links to websites with pornographic content were used. But that would be too easy for the programs. That is why in the laboratory, the 12,000 links were compiled from 8 categories: chat rooms & forums, dating & meeting sites, illegal data and file sharing, gambling, entertainment games, shopping websites, and auctions, weapons and ammunition, as well as sex, nudity, and pornography. The analysis of the 12,000 websites definitely unsuitable for children is excellent for most of the products, whereby it is unrealistic to expect to achieve 100 percent in the test, however. Because if the various filters are too sensitively adjusted, this prevents visiting websites that are in fact suitable. This can then result in what is known in professional circles as overblocking. In real terms, this means that harmless websites are constantly blocked, thus causing frustration among kids. The packages from Symantec, Quickheal and Trend Micro are particularly effective at sorting out and blocking websites with very high success rates. In the counter-sample, the products were required to easily recognize 13,000 websites appropriate for children as well as legitimate websites. After all, the website of an automobile accessories dealer may not be a children's site, but it is indeed not forbidden for children and therefore it should not be blocked. Moreover, the list also included websites for which the URLs already contain partial words which the word filters often recognize as being obscene, such as analyst, class, chicken breast or cocktail. In order to ensure that the result is internationally comparable, the websites selected were even in 6 languages. A total of 8 products superbly mastered the counter-sample and blocked only 1 to 5 percent too many websites. The remainder are somewhat higher at 6 to 8 percent. Only the solution from Bitdefender was too stringent and sorted out a total of 16 percent. Who does the best job of protecting children? The problem with parental control software or relevant enhancements in Internet security suites: there is no defined scope of standard functions. Each product offers a vast number of setting options that hardly anyone can keep track of. For comparison, the lab only singled out the most important features. One thing is certain: all the products lower the risk of children encountering inappropriate web content. In terms of detection, filtering and blocking, each manufacturer's philosophy plays a role. Microsoft says, for example, that they decidedly block less content than other manufacturers in order to prevent overblocking at all costs. According to their own surveys and studies, they claim that young users would purposely try to defeat the parental control if they feel too heavily annoyed. Net Nanny relies on a technology in which content is organized dynamically and not according to fixed categories (Dynamic Categorization Technology). That is why, according to Net Nanny, the test environment does not fit the product. The enhanced analysis also occurs dynamically with an evaluation of words and phrases in context (DCA, Dynamic Contextual Analysis). This enables websites to constantly be re-evaluated. To be fair, it should be mentioned that the Salfeld Parental Control 2015 and Kaspersky Safe Kids still had beta status during the test. The final versions may perform even better than in the test. Kaspersky also sent additional information that they were working on a product line offering versions for Mac, ios and Android. Later, these products are also intended to seamlessly work together. More technology or more attention Ultimately, parents need to decide which product they want to use. Some solutions rely strongly on control and blocking features on the device. Others put a stronger emphasis on monitoring and logging even remotely. If you combine desired functions with performance in the detection and filtering of links, it is not difficult to choose. But regardless of how well the technology works for parents children should never be left completely unattended to explore the digital world.
3 Report and logs instead of digital blocking? When using parental control software, it is always important to consider the user group. After all, there are clear differences on how to protect a 6 to 7 year-old versus a 9 to 10 year-old child in the digital world. The attempt to protect a school child from everything that is out there in the Internet is bound to fail sooner or later. It's important to achieve a healthy medium: the vast majority of websites and content not appropriate for children are blocked using the tools. Other websites that are not particularly suited for children but can still be called up, ought to be discussed with the child. Because the older the children, the more they will generally outpace their parents in the use of digital media. That is also the opinion of many manufacturers who have therefore ended the discussion about blocking rates. They rely more heavily on children accepting the parental control software as helpers and not merely as nannies who say no to everything. Thus, there are detailed reports and logs in many products that provide a basis for discussion for parents. If children can successfully defeat a blocked function, then they can usually also reactivate it again. From that moment on, parents will be out of touch with what's going on and will fall short of achieving their aim of guiding their children into the digital world. Director Test Research: David Walkiewicz Kids on the Internet: According to international statistics, 6 to 8 year-olds already surf the Internet regularly.
4 Detection and Filtering: With only a few exceptions, all the products were very effective at filtering and blocking the selected websites. Additional functions in parental control software: The selection of additional protection or blocking functions varies widely. Log and Report Functions: Many solutions increasingly rely on the evaluation of overall usage.
5 Microsoft Family Safety: The tool has been available free of charge since Windows 7.
6 Parental Controls: Mac OS X also offers an internal tool with parental control functions. Copyright 2016 by AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany Phone +49 (0) , Fax +49 (0) ,
Endurance Test: Does antivirus software slow
23rd April 2015 created by Markus Selinger Endurance Test: Does antivirus software slow down PCs? Critics maintain that protection software for Windows really puts the brakes on PCs. In a 14-month, extremely
More information10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015).
28th April 2015 created by Markus Selinger Mac OS X under attack 10 security packages put to the test The legend that Mac OS X is supposedly invincible is not borne out by the facts. In the aftermath of
More information26 Protection Programs Undergo Our First Test Using Windows 8
Test: Internet Security Packages 1/2013 26 Protection Programs Undergo Our First Test Using Windows 8 Windows 8 is considered to be a secure system thanks to its internal protection package containing
More informationSecurity Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014).
18th September 2014 created by Markus Selinger Mac OS X in the Crosshairs 18 Malware Scanners Put to the Test For a long time, Mac OS users believed they were safe, that there was no malware for their
More informationTest of the Antivirus Software For antivirus solutions, the test was divided up into two typical infection scenarios.
29th July 2014 created by Markus Selinger 17 software packages in a repair performance test after malware attacks Can antivirus software packages or recovery/clean-up tools completely clean and repair
More informationComprehensive Internet filtering for networks of all types and sizes
Comprehensive Internet filtering for networks of all types and sizes COMPREHENSIVE INTERNET FILTERING UserGate Web Filter is a gateway solution for controlling Internet use on all devices on a local network,
More informationF-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
More informationName of Filtering Software
List of Filtering Software 1 Copyright Name of Filtering Software page ContentProtect. 2 CYBERsitter.. 4 Net Nanny.. 6 Cyber Patrol.. 7 ContentBarrier.. 9 KidsGoGoGo... 10 CYTANET s Safe Internet. 11 List
More informationParental Control Single Product Test
Parental Control Single Product Test Kaspersky Safe Kids 1.0 Parental Control Test August 2015 Language: English August 2015 Last Revision: 14 th September 2015 Content Introduction: parental control software
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationUser's Guide. Copyright 2012 Bitdefender
User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationDetection of Linux malware
5th October 2015 created by Markus Selinger Linux: 16 Security Packages Against Windows and Linux Malware Put to the Test As Linux PCs are increasingly used to connect Windows PCs, they ought to use a
More informationInternet Filtering in Primary Schools
Internet Filtering in Primary Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Internet Filtering... 2 Assigning
More informationPhone Apps for Online Safety Apple and Android
Phone Apps for Online Safety Apple and Android Safe Eyes Mobile (Mobile App) Control your child's Internet usage while she's on the iphone by blocking questionable sites. This app has YouTube filtering
More informationInternet Filtering in Secondary Schools
Internet Filtering in Secondary Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Internet Filtering... 2 Assigning
More informationImplementing Parental Controls. Internet Safety Presentation
Implementing Parental Controls Internet Safety Presentation Edit Parental Controls in: Windows 7 Windows Live Windows Vista Xbox Live 2 22 Windows 7 3 22 Windows 7 Time Limits: Games Control: Limit your
More informationKaspersky Whitelisting Database Test
Kaspersky Whitelisting Database Test A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: February 14 th, 2013, last update: April 4 th, 2013 Summary During November 2012
More informationWhite Paper: Protecting Your Family on the Internet
Internet Protection Tools... When You Want To Be Sure. White Paper: Protecting Your Family on the Internet ContentWatch World Headquarters 2369 West Orton Circle Salt Lake City, UT 84119 USA Tel: 801.977.7777
More informationWindows Family Safety Filter
Protecting Your Kids with Family Safety Keeping your kids safe online can be complicated, but Windows Live Family Safety helps make it easier for you. Family Safety provides a website and a free program
More informationAV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets
Protection Apps for Android Feb. 2013 AV-TEST Examines 22 Antivirus Apps for Android Smartphones and Tablets Millions of Android smartphones are currently accessing the Internet without any protection.
More informationMcAfee Family Protection
User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed
More informationEnsure safe and appropriate web surfing for all users with customizable filtering.
Features Comprehensive and accurate education-friendly URL database with more than one billion entries. Multiple layers of anonymous proxy detection and blocking to keep users from bypassing your filter
More informationSet internet safety parental controls with Windows
How to Microsoft lets parents set up internet safety settings on a Windows computer for their kids, using Family Safety. Family Safety provides a website and a free program that you install on the computers
More informationSafe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
More informationFirewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014
Firewall Test Firewall protection in public networks Commissioned by CHIP Language: English Last Revision: 11 th April 2014 www.av-comparatives.org Commissioned by - 1 - Contents Firewall protection in
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationUser Guide. for Windows. 2002-2013 ContentWatch Inc. All rights reserved. 6949 S. High Tech Drive, Midvale, UT 84047
User Guide for Windows 2002-2013 ContentWatch Inc. All rights reserved. 6949 S. High Tech Drive, Midvale, UT 84047 Legal Notices ContentWatch, Inc. makes no representations or warranties with respect to
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationReal World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
More informationIn addition, all versions were examined in terms of whether the PE files are signed with a valid certificate.
20th November 2015 created by Markus Selinger Self-Protection in Windows Applications: How Secure are PDF Readers, Java and Browsers? Well-known Windows software is repeatedly criticized for being an Achilles'
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationParental Control 2014
Parental Control 2014 Parental Control Software Test and Review Language: English Last Revision: 14 th September 2014-1 - Contents Review and Test of Parental Control Software for Windows, ios and Android...
More informationSPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
More informationWhitepaper: Understanding Web Filtering Technologies ABSTRACT
Whitepaper: Understanding Web Filtering Technologies ABSTRACT The Internet is now a huge resource of information and plays an increasingly important role in business and education. However, without adequate
More informationAnti-Virus Comparative
Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English April 2016 Last Revision: 23 th May 2016 Table of Contents 1. Introduction 3 2. Tested products
More informationBanker Malware Protection Test Report
Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test
More informationMobile Security Apps. Hendrik Pilz Director Technical Lab / Mobile Security hpilz@av-test.de
Hendrik Pilz Director Technical Lab / Mobile Security hpilz@av-test.de The test report is also available on About AV-TEST 24 employees in Magdeburg and Leipzig Tests of security solutions for consumers
More informationAV-Comparatives. Support-Test (UK) Test of English-Language Telephone Support Services for Windows Consumer Security Software 2016
AV-Comparatives Support-Test (UK) Test of English-Language Telephone Support Services for Windows Consumer Security Software 2016 Language: English March 2016 Last Revision: 14 th April 2016 Commissioned
More informationParental Control Single Product Test
Parental Control Single Product Test ESET Smart Security 8.0 Parental Control Test August 2015 Language: English August 2015 Last Revision: 14 th September 2015 Content Introduction: parental control software
More informationNorton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
More informationEndpoint Business Products Testing Report. Performed by AV-Test GmbH
Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed
More informationDriveLock Websecurity
Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION
More informationMailbox control panel. User guide
Mailbox control panel User guide Close this window Mailbox control panel user guide Mailbox control panels enable you to configure your settings for a specific mailbox with ease, with features ranging
More informationSAFARI Montage Troubleshooting Guide. SAFARI Montage Copyright 2005-2011; SAFARI Video Networks, LLC
SAFARI Montage Troubleshooting Guide SAFARI Montage Copyright 2005-2011; SAFARI Video Networks, LLC Play All Feature is Not Working Symptom: When clicking the Play All icon or link, the playlist playback
More informationUser's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:
NAME Safe Eyes Company McAfee Version 6.0.244 Type of product Devices supported Operating systems Client Computer Windows XP Windows 7 Vista Mac OS (with some limitations on functionalities) Price* 1 year,
More informationAre free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More informationCascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
More informationWho Needs Parental Controls?
A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationHome Network Manager User Guide version 2.4. 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com
version 2.4 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com February 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise
More informationConducting Virtual Meetings
Page 1 oovoo Chat & Video Conferencing Information gathered by, International Faculty 2013 Faculty Training General Information What can I do with oovoo? oovoo offers free high quality video chat and instant
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationDETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
More informationwww.entensys.com KinderGate Parental Control User Guide
KinderGate Parental Control User Guide Table of Contents Introduction... 4 About KinderGate... 4 KinderGate Features... 4 Filtering Methods... 4 KinderGate Installation... 5 System Requirements... 5 Installing
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationNORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS
NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named
More informationThe internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
More informationSubcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006
Subcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006 Making the Internet Safe for Kids: The Role of ISPs and Social Networking
More informationLANCOM Techpaper Content Filter
The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for
More informationMobile Game and App Development the Easy Way
Mobile Game and App Development the Easy Way Developed and maintained by Pocketeers Limited (http://www.pocketeers.co.uk). For support please visit http://www.appeasymobile.com This document is protected
More informationVerizon Family Protection Powered by McAfee. User Guide
Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6
More informationTeamViewer 9 Manual ITbrain
TeamViewer 9 Manual ITbrain Rev 9.2-201407 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 General 3 1.1 About ITbrain 3 1.2 About the manual 3 2 Requirements 4 2.1
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationOPTENET PC Web Filter. Version 10.09
OPTENET PC Web Filter Version 10.09 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any
More informationIT Security Survey 2015
IT Security Survey 2015 Language: English Last Revision: 18 th March 2015 Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the Internet
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationAvira Small Business Security Suite Version 2.6.1 Release Information
Avira Small Business Security Suite Version 2.6.1 Release Information Product characteristics Avira Small Business Security Suite is a complete security solution, designed to fulfill the expectations and
More informationVersion 6.7 OPERATOR S GUIDE
Version 6.7 OPERATOR S GUIDE Contents 1 Netop Live Guide... 1 2 Log on to Netop Live Guide Operator Console... 1 3 Manage chats... 2 3.1 Queue... 3 3.2 Chat area... 5 3.3 Tools... 6 3.4 Operator status...
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationWindows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4)
NAME Xooloo Company Xooloo Version 12.1 Type of product Devices supported Operating systems Client Computer Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on)
More informationPARENTAL CONTROL WITH VISTA. Prepared by Betti McTurk, MSIS
PARENTAL CONTROL WITH VISTA Prepared by Betti McTurk, MSIS Parental Controls The new parental controls in Windows Vista allow parents to monitor their children s activities online as well as set time limits
More informationAnti-Virus Protection and Performance
Anti-Virus Protection and Performance ANNUAL REPORT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com CONTENTS Annual Report 2015... 1 Contents... 2 Introduction...
More informationAnti Phishing Test July 2013
Anti-Phishing Test July 2013 Language: English July 2013 Last revision: 10 th August 2013 www.av-comparatives.org 1 Introduction What is Phishing? Taken from Wikipedia 1 : Phishing is a way of attempting
More informationData Sheet: Work Examiner Professional and Standard
Data Sheet: Work Examiner Professional and Standard Editions Overview One of the main problems in any business is control over the efficiency of employees. Nowadays it is impossible to imagine an organization
More informationWhite Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
More informationRepresentative Console for Android Phone. Version 2.1
Representative Console for Android Phone Version 2.1 Thank you for using Bomgar. At Bomgar, customer service is a top priority. Help us provide you with excellent service. If you have any feedback, including
More informationHome Internet Filter User Guide
Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter
More informationUser Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
More informationHowTo. Firewall Avira Premium Security Suite
HowTo Firewall Avira Premium Security Suite Avira Support July 2009 Contents 1. BASIC KNOWLEDGE ABOUT THE FIREWALL...3 2. EXPLANATION OF THE TERMS...3 3. CONFIGURATION POSSIBILITIES...5 3.1 SECURITY LEVEL...5
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationOpenScape Web Collaboration for Microsoft Windows OS
OpenScape Web Collaboration for Microsoft Windows OS Starting a Web Conference How to start a conference is described in the manual of the client used. Logging on to a Web Conference To log on to a started
More informationCyngor Sir Ceredigion Ceredigion County Council. Internet Filtering in Schools
Cyngor Sir Ceredigion Ceredigion County Council Internet Filtering in Schools C O N T E N T S Page Background... 1 Internet Filtering... 1 Smoothwall How does Ceredigion web filtering work?... 2 Internet...
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationGetting Started Guide
Getting Started Guide Before you set up your account, you may want to spend a few minutes thinking about what you want to get out of Flextivity. Of course, Flextivity helps you successfully manage basic
More informationU.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationRecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
More informationParental controls NOTICE TO PARENTS. Vita system before allowing your child to play. Set parental controls on the PlayStation 4-419-422-01(1)
Parental controls NOTICE TO PARENTS Set parental controls on the PlayStation Vita system before allowing your child to play. 4-419-422-01(1) The PlayStation Vita system offers functions to help parents
More informationMercy School. Internet Safety Policy
Mercy School. Internet Safety Policy School name: Mercy School School Address: St. John s Road, Wexford : 053 9123294 : mercyschoolwexford@gmail.com Website Address: mercywexford.scoilnet.ie Internet Usage
More informationUSER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com
USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationAndroid Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试. 2015 Dec. Celebrating Technology Innovation
Android Malware Detection Test 手 机 安 全 软 件 病 毒 检 测 率 测 试 2015 Dec Celebrating Technology Innovation 报 告 目 录 Table of Contents P1 P2 P2 测 试 背 景 测 试 流 程 待 测 软 件 Background Test Process Tested Software P3
More informationAvira Internet Security FireWall. HowTo
Avira Internet Security FireWall HowTo Table of Contents 1. Basic knowledge about the Firewall... 3 2. Explanation of the terms... 3 3. Configuration Possibilities... 5 3.1. Security Level...5 3.1.1 Block
More informationMobility Security Product Test and Certificate http://www.pcsecuritylabs.net
Mobility Security Product Test and Certificate For Android April, 2012,2011 Introduction For many people around the world, a smartphone is their primary -- and sometimes only -- means of accessing the
More information