| |
| |
Acknowledgments | |
| |
| |
Foreword | |
| |
| |
Introduction | |
| |
| |
Real Threats to Your Children on the Internet and What You Can Do about Them | |
| |
| |
What Is the Internet? | |
| |
| |
What Is the Internet? | |
| |
| |
Who Created the Internet? | |
| |
| |
Who Owns the Internet? | |
| |
| |
What Does an Internet Service Provider (ISP) Do? | |
| |
| |
How Is the Internet Regulated? | |
| |
| |
Why the Internet Is Good for Your Children | |
| |
| |
What Do Children Do on the Internet? | |
| |
| |
Web Browsers | |
| |
| |
Websites | |
| |
| |
Search Engines and Directories | |
| |
| |
E-mail | |
| |
| |
Instant Messaging (IM) | |
| |
| |
Internet Relay Chat (IRC) | |
| |
| |
Peer-to-Peer (P2P) Applications | |
| |
| |
File Transfer Protocol (FTP) Applications | |
| |
| |
Usenet/Newsgroups | |
| |
| |
Message Boards | |
| |
| |
Mailing Lists | |
| |
| |
Website Chat Rooms | |
| |
| |
Voice Chat | |
| |
| |
Videoconferencing (Audio and Video Chat) | |
| |
| |
Endnotes | |
| |
| |
What Are the Threats to Your Children and How Serious Are They? | |
| |
| |
Pedophiles Are Using the Internet to Look for Kids | |
| |
| |
Who Are They? | |
| |
| |
Why Do They Prey on Children? | |
| |
| |
Pornography and Inappropriate Content on the Internet | |
| |
| |
The Pornography Industry | |
| |
| |
The Target Market | |
| |
| |
Access to Pornography | |
| |
| |
Pushing Pornography | |
| |
| |
Committing Crimes: Bombs, Drugs, Theft, and Fake Identification | |
| |
| |
Cyberbullying: How Bullies Harass Your Kids 24/7 | |
| |
| |
Invasion of Privacy | |
| |
| |
The Dangers of Free E-mail Services--The Devil Is in the Details | |
| |
| |
Privacy: The Hidden Cost of Free Software | |
| |
| |
Spyware: Your Computer Is Watching You | |
| |
| |
Adware: Creating an Online Profile of Your Interests | |
| |
| |
Endnotes | |
| |
| |
How to Avoid and Reduce the Risks to Your Kids on the Internet | |
| |
| |
Educate Your Kids | |
| |
| |
Monitor What Your Kids Do on the Internet | |
| |
| |
Stumbling Across Inappropriate Content on Websites | |
| |
| |
Inappropriate Content Can Be Sent to Your Kids via E-mail | |
| |
| |
Pop-Up Advertising Can Display Anything to Your Kids | |
| |
| |
Newsgroups Can Expose Your Kids to Inappropriate Material | |
| |
| |
The Facts about Predators and Chat Rooms | |
| |
| |
Instant Messaging Gives Predators Access to Your Kids | |
| |
| |
Privacy Risks from Message Boards and Mailing Lists | |
| |
| |
Privacy Risks from Audio- and Videoconferencing | |
| |
| |
Legal Risks from Using Peer-to-Peer Applications | |
| |
| |
Privacy Risks from Adware, Spyware, and Malicious Software | |
| |
| |
Contests Put Your Privacy at Risk | |
| |
| |
Going "Fishing" Isn't What It Used to Be | |
| |
| |
Downloading Pirated Software | |
| |
| |
Malicious Viruses, Worms, and Trojans | |
| |
| |
Removing Dangerous Software | |
| |
| |
Finding Software Installed on Your Computer | |
| |
| |
Finding Specific Files | |
| |
| |
Removing Software | |
| |
| |
Endnotes | |
| |
| |
The Best (Not Necessarily the Most Expensive) Software to Protect Your Kids | |
| |
| |
Content-Filtering Software | |
| |
| |
To Filter or Not to Filter--That Is the Question! | |
| |
| |
Are Your Kids Protected at School? | |
| |
| |
Use the Content Advisor in Your Web Browser | |
| |
| |
You Can Use Search Engine Filtering Too | |
| |
| |
AOL Users | |
| |
| |
Content-Filtering Software | |
| |
| |
Results of My Tests of Content-Filtering Software | |
| |
| |
My Verdict on the Content-Filtering Products I Tested | |
| |
| |
Content-Filtering Products in Detail | |
| |
| |
CyberPatrol | |
| |
| |
Cyber Sentinel | |
| |
| |
CYBERsitter | |
| |
| |
Cyber Snoop | |
| |
| |
Net Nanny 5 | |
| |
| |
Optenet | |
| |
| |
Privacy Service | |
| |
| |
We-Blocker | |
| |
| |
Endnotes | |
| |
| |
Using Filtering Software to Keep Out the Junk Mail | |
| |
| |
What Is E-mail-Filtering Software? | |
| |
| |
How Does E-mail Filtering Work? | |
| |
| |
Blacklists and Whitelists | |
| |
| |
Real-time Blackhole Lists | |
| |
| |
Keyword Filtering | |
| |
| |
Bayesian Filtering | |
| |
| |
Rule-based Filtering | |
| |
| |
Using Fingerprints to Identify Spam | |
| |
| |
Brands of E-mail-Filtering Software | |
| |
| |
Types of E-mail-Filtering Software | |
| |
| |
Is E-mail Filtering Compatible with My Existing E-mail Program? | |
| |
| |
Minimum System Requirements | |
| |
| |
Blocking Characteristics | |
| |
| |
How Easy Is It to Use? | |
| |
| |
What to Look for in an E-mail-Filtering Program | |
| |
| |
Testing with Live Spam | |
| |
| |
Installation and Removal | |
| |
| |
Documentation | |
| |
| |
Technical Support | |
| |
| |
Price | |
| |
| |
My Verdict | |
| |
| |
Content-Filtering Products in Detail | |
| |
| |
AntiSpam | |
| |
| |
MailWasher Pro | |
| |
| |
SpamKiller | |
| |
| |
SpamNet | |
| |
| |
SpamTrap | |
| |
| |
Endnotes | |
| |
| |
Internet Firewall Software | |
| |
| |
How a Firewall Works | |
| |
| |
Brands of Internet Firewall Software | |
| |
| |
What to Look for in a Firewall | |
| |
| |
The Features You Need in a Firewall | |
| |
| |
My Verdict on the Best Firewall Product to Use | |
| |
| |
Internet Security Suites | |
| |
| |
Problems with Internet Security Suites | |
| |
| |
How You Can Save $$$ | |
| |
| |
Firewall Products in Detail | |
| |
| |
Kerio Personal Firewall | |
| |
| |
McAfee Personal Firewall Plus | |
| |
| |
Norton Personal Firewall | |
| |
| |
Outpost Firewall Pro | |
| |
| |
ZoneAlarm Pro | |
| |
| |
Antivirus Software | |
| |
| |
What Is Antivirus Software and Why Do You Need It? | |
| |
| |
Which Antivirus Software Is the Best? | |
| |
| |
My Verdict | |
| |
| |
Antivirus Products in Detail | |
| |
| |
Kaspersky Anti-Virus Personal | |
| |
| |
McAfee VirusScan | |
| |
| |
Norton AntiVirus | |
| |
| |
Trend PC-cillin | |
| |
| |
eTrust EZ Antivirus | |
| |
| |
Malicious Software Detection | |
| |
| |
How Malware Detection Works | |
| |
| |
Software Brands Tested | |
| |
| |
What Features Will Stop Malicious Software from Getting to You? | |
| |
| |
How These Products Perform | |
| |
| |
Additional Information | |
| |
| |
My Verdict | |
| |
| |
Are Those Antivirus Software Claims for Real? | |
| |
| |
Malicious Software-Detection Products in More Detail | |
| |
| |
Ad-aware | |
| |
| |
PestPatrol | |
| |
| |
Spybot Search & Destroy | |
| |
| |
Endnotes | |
| |
| |
Putting Your Defense into Place | |
| |
| |
Patching the Security Holes in Your Computer | |
| |
| |
Setting Your Computer to Update Itself | |
| |
| |
How to Create an Effective Defense | |
| |
| |
What Do You Do If Your Kids Are Subject to an Internet Threat? | |
| |
| |
A Note about the Police | |
| |
| |
Conclusion | |
| |
| |
Endnotes | |
| |
| |
Spyware and Adware | |
| |
| |
BargainBuddy | |
| |
| |
BroadCastPC | |
| |
| |
BrilliantDigital | |
| |
| |
Claria (Gator/GAIN) | |
| |
| |
CommonName | |
| |
| |
Cydoor | |
| |
| |
Downloadware | |
| |
| |
eBates MoneyMaker | |
| |
| |
eUniverse.IncrediFind BHO and eUniverse_KeenValue | |
| |
| |
eZula | |
| |
| |
I-Lookup.GWS | |
| |
| |
IPInsight | |
| |
| |
n-CASE (180Solutions) | |
| |
| |
New.net | |
| |
| |
Radlight | |
| |
| |
Shopathome (SahAgent) | |
| |
| |
Webhancer | |
| |
| |
WhenU.SaveNow or SaveNow | |
| |
| |
WurldMedia | |
| |
| |
Endnotes | |
| |
| |
Index | |