This article will cover the initial steps that should be taken to protect your family computer from unsuitable or unwanted content on the Internet.

The first step we need to take in managing what can be accessed on the family PC is to control which software programs can be installed.  On a Windows PC we do this by assigning an Administrator account (separate Profile or Login).  This is protected by a Password, that we keep to ourselves.  Only the Administrator can install new software programs or change the content restrictions.  The Administrator sets up an additional Limited account (or several, if you have many family members using the computer).  The users of this account will always need the Administrators intervention if they want to install new software or change the settings.

There are both Windows & Mac computers in widespread use in Family homes, plus Smartphones and various other Operating Systems.  We are going to start with Windows PCs, which have an 85% share of the market.  The 3 common versions of Windows in use are XP (half of all Windows users in 2012), Vista and Windows 7.

This is how we do it (in Windows Vista):

Start – Control Panel – User Accounts – Manage another account – Continue – Create a new account – Select Standard (Limited) Account and give it a Name – OK – Set up Parental Controls

Here you can see that you can specify Web Content restrictions, Times of Day for computer usage, Games and other programs your children can use.  You can also obtain a report of their activity.

Another area of concern is Copyright abuse.  This is often perpetrated via File Sharing services.  You may have heard of Napster, which was the first major Peer-to-Peer file sharing service.  It was widely used for the Sharing and Downloading of Music, Films, Software and other digital materials.  In many cases these files were governed by the original Publishers copyright.  So the re-transmission of these files constitutes theft.  Some of the major services still used for these purposes are Kazaa, Bearshare, BitTorrent and MegaUpload.  They also carry the risks of opening your PC to visitors from around the world and the fact that some of the files downloaded may have been tampered with, installing viruses and other infiltration tools on your PC.

Most home users now access the Internet via a Wireless Router, usually supplied by your Telephone provider.  Many of these Routers have Parental and Access control features that can determine which Devices can access the Internet, at what times, which sites can be visited or denied and other rules.  However, the consequences of re-programming your router and making a mistake is that you may lose all Internet access and your internal network could fail.  Therefore, we recommend that you use an IT professional to help you with this operation.

Malware is the term used to describe the unwanted and potentially harmful programs, pop-up adverts, viruses and other digital menaces designed to harm your computer or subject you to threats or material you do not want.  The most common term is Virus – which covers a number of different malicious programs.  A Virus is a program that is inadvertently run by the user and looks to spread itself from one computer to another, as its name suggests.  A Worm-type Virus will attempt to spread itself to many computers automatically via a network.

Spyware is a word used to describe programs installed on your Computer to analyse your inputs.  This can be relatively benign, such as the Google toolbar, or a dangerous Keylogger, which harvest your passwords and other sensitive personal information.

Anti-Virus software is really vital on your computer.  We would not recommend connecting any PC to the Internet without Anti-Virus & Anti-Spyware software and a Firewall.  Microsoft have included a decent personal Firewall on Windows since XP Service Pack 2 in 2005.  There are plenty of effective Anti-Virus programs available free of charge, from Microsoft, AVG, Avast and other software publishers.  There are also more powerful corporate strength Security programs that can be purchased via subscription, such as Norton / McAfee / Kaspersky – which often include improved Firewall and Anti-Spyware systems.  These packages are often sold to consumers as 3 packs, to cover multiple computers in the home.  You will find that many new computers have a 30 or 60 day free trial for an Anti-Virus program pre-installed.

In conclusion, you can take these few simple steps and make an enormous difference to the security of your computer.  Start by establishing yourself as the PCs “Gatekeeper” or Administrator and control the software that is installed and used on it.  You may be able to control Internet use by configuring your Router.  File-sharing services should be approached with great caution and an understanding of the legitimacy of the sources.  Finally, don’t overlook the importance of Anti-Virus software.  There are plenty of options to choose from, including some good free packages.  The premium security software publishers offer a great degree of customisation and advisory information.

Trackback

6 comments untill now

  1. I applied for Social Security Disability with the help of these guys. They are the best. http://twentie.com/disability

  2. 日本艺伎…

    逐句地看完这个文章以后,我的心久久不能平静,震撼啊!为什么会有如此好的文章!…

  3. This’s a nice post. Thanks for share.

  4. I drop a leave a response when I appreciate a post on a
    site or I have something to add to the conversation. It’s triggered by the passion communicated in the article I browsed. And on this post Family Online Safety

  5. I really do believe all of the strategies you have presented on your submit. They’re just effective and definitely will unquestionably perform. However, your threads particularly small instructor can. May possibly you want expand these individuals a little from when? Thanks for this submit.

  6. Very nice post. I just stumbled upon your blog and wished to mention that I’ve truly loved surfing around your weblog posts. In any case I’ll be subscribing in your feed and I hope you write once more soon!

Add your comment now

You must be logged in to post a comment.