Children protect.
The internet is a wonderful place, but it has it's dark side. There are stalkers, pornographers, thieves and all manner of evil people lurking everywhere, just like in real life. People who want to steal your money, corrupt your morals, bend your ethics or worse, people who want to target your children.
Your kids are not safe on the internet. Not at all. Don't even think they are safe for a moment. There are dangers lurking everywhere, and if you let your kids run wild they will get hurt.
What can you do? Equip your computer with one of the special filters so that your children
cannot venture into inappropriate
areas. There are several available including CProtector Pro.
Most importantly, talk to your children. Explain to them what's happening and what to avoid. Let them know the dangers. Get them to tell you when undesirable things (such as
pornographic spam emails) appear.
And watch them. Monitor their activities directly (by being with them and helping them surf the web) and indirectly (by checking their cookie files, browser caches and history lists).
You might consider placing the computer in a common room such as the family room, or at least in a place that is visible from where you normally are at. This way you can
watch over your children as they work and play on the computers.
Make sure you tell your children some simple rules, always explaining the reasons behind everything. Especially stress that they are not to give out any information about themselves to anyone on-line. This includes their name, age, phone number or anything else. Stress this over and over.
Monitor the time spent on the internet. Beware of excessive time spent on the internet by any children. Also monitor what you children are looking at when you are not around. You can do this by checking the browser cache, examining the history folder, looking in the recycle bin and so forth or use a professional child protection software like
CProtector Pro.
How to Stop the Porn Predators
There are three types of adult Web sites on the Internet.
The first type of adult site tries to operate in a responsible manner, by rating its pages and doing its best to make the site
filterable by child protection
software. They are dedicated providing their material ONLY to adults.
The second category of adult sites doesn't know any better. They either have not been informed of the ways to operate responsibly or are too lazy to do anything about it.
They need to be educated.
The third type is the most dangerous. These adult sites are run by "porn predators", people who have no ethics and would gladly use any means possible to "site spam" your children.
"Site spamming" is similar to email spamming but instead of bombarding your child's email box, these sinister sites use trickery and deception to lure your children and then bombard their monitors with filth. Once a child is in their Web site trap, there
appears to be no escape because closing one window only opens another with even more graphic images.
How do these "porn predators" operate?
How do we stop them, when they attempt to use the first amendment as a torture device for our children?
How to you escape from their porn window trap?
--------------------------------------------------------------------------------
How Porn Predators Operate
Let's begin with the first question. These sites are after bulk viewership, just like the email spammers. They hope that by getting ten million viewers, one of them will be foolish enough to submit his credit card.
However, in their mad rush to lure eyeballs, they have abandoned all connection to the truth. They want people to think that their site is anything other than a porn site, until it is too late. They use the Internet's version of the classic
"bait and switch" swindle once used by dishonest car dealers.
Back then, unscrupulous auto dealers would advertise a certain car for a ridiculously low price as the "bait", all the time knowing that it was not really available. When the buyer would show up, the dealer would "switch" them into buying another car. So many innocent car buyers were cheated that this evil publicity tactic
was outlawed.
Even though this "con-job" is now illegal in selling cars, it's become the favorite tactic of porn predators to
sell porn. Last week, we was alerted that a child innocently searching for "American Doll Furniture", at
Google, brought up several of these porn predators.
By misleading the public, the porn predators hurt everyone. The legitimate doll furniture sites loose traffic to liars, people waste time going to sites where they do not want to be, but worst of all, the simple act of searching for Barbie accessories
can now put a child at harms door.
Another practice of unscrupulous porn sites is to purchase the domain names of child-oriented Web sites that have gone out of business in an effort to skim the traffic from links that have not been updated. For example, someone puts up a page filled with links of great places for a child to visit. As does sometimes happen, one of the places closes down and loses its domain name. Immediately, a porn predator snatches it up. However, the owner of the page of child links is
still unaware that anything has happened. Only after scores of
innocent children have been ensnared, by the newly redirected porn link, is the problem discovered.
In either case, the adult site is set up like a spider trap for the
unwary. Closing one browser window only causes another browser window to open up. Sometimes, this is designed to continue forever. This results in a state of
panic in the child who is aware of no remedy other than shutting off the computer.
Often, parents trying to find the way how to restrict access to the adult sites
for their children; managers looking for the way to restrict computer time for their staff in not allowed time, etc. To solve these problems
CProtector was developed.
Purposes of CProtector
CProtector was developed to restrict browsing/navigation in the Internet, and it works with the most popular browser - Microsoft Internet Explorer. Also system allows you to
restrict browsing of offline resources, available on any kind of carrier that can be connected with PC.
CProtector allows you to apply restrictions on any kind of document that can be opened in Internet Explorer.
CProtector is easy-to-use for the end user, as it does not require special knowledge of computer science, or any changes in your network connection settings.
CProtector allows you to have different profiles for Windows users on the computer.
CProtector controls it's own database and makes sure that unauthorized people/programs cannot edit any settings
without authorized in the control list first.
CProtector restores itself in the computer's memory, even if somebody killed/deleted it from the memory. All administration tasks are closed with the password. It is very
hard to delete CProtector from the system without knowing password.
Please take a moment and download a
CProtector to save and protect future of our children. Together we can
make Internet a safe environment for our families !
God bless you,
Alex V. Norman, CEO
Toplayer Software