Computer Security Tips for Parents


If you want to keep tabs on who your son or daughter talks to on the Internet, there are steps you can take as a parent.

COMPUTER SECURITY TIPS FOR PARENTS

  • Put in place a required BIOS Password for the main family laptop or desktop.
    • This prevents your kid from just using a LiveCD to get around the parental monitoring software that you should have installed on your Windows or Mac laptop.
  • Install a hardware keylogger on your family laptop/desktop
  • Install monitoring software on your family’s devices.
  • Make a habit of checking the logs!
  • Configure the parental controls in your Wifi router
    • Find out your device’s MAC address.
    • Find out your son or daughter’s device’s MAC address.
    • Access your home WiFi router
      • Type “192.168.1.1” and enter your login information
        • Most of the time the username will be “admin” and the password will be blank
        • Be sure to change the router password (which is different from the WiFi password) to something that you can remember but cannot be guessed easily.
    • After you have accessed the  home WiFi router’s there should be a tab for parental controls,
      • Set the controlling computer as your laptop’s MAC address
      • Set the child computers to the MAC addresses of your children’s devices.
        • This includes iPads and iPhones.
      • The best approach is to set the access controls to block access during certain times of the day.
  • The only way around this is to install a MAC address changer (such as MADMACS)
    • This means that you should setup their Windows accounts with reduced permissions.
    • You can also configure parental controls on the iPod Touch, iPad, and the iPhone.
      • Settings ==> General ==> Restrictions
  • Put a band-aid or masking tape over the laptop’s camera.
  • Be familiar with your software and track who has accessed what sites and forums.
    • Be wary if they are accessing sites like 4Chan.org and Omegle or other video chat sites.
  • Move the computer to a well-trafficked area so that the user and the monitor are easily observed.
  • Sit down with your children and have them demonstrate their Internet savvy to gauge if they have been “adventurous” already.
  • Call and speak to the parents of your children’s friends to make sure they are vigilant when your child is visiting.
Advertisements

Firearms Instructor in the DC Metro Area

Tagged with: , , , , , , , , ,
Posted in Cybersecurity

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: