Computer Security Tips for Parents


If you want to keep tabs on who your son or daughter talks to on the Internet, there are steps you can take as a parent.

COMPUTER SECURITY TIPS FOR PARENTS

  • Put in place a required BIOS Password for the main family laptop or desktop.
    • This prevents your kid from just using a LiveCD to get around the parental monitoring software that you should have installed on your Windows or Mac laptop.
  • Install a hardware keylogger on your family laptop/desktop
  • Install monitoring software on your family’s devices.
  • Make a habit of checking the logs!
  • Configure the parental controls in your Wifi router
    • Find out your device’s MAC address.
    • Find out your son or daughter’s device’s MAC address.
    • Access your home WiFi router
      • Type “192.168.1.1” and enter your login information
        • Most of the time the username will be “admin” and the password will be blank
        • Be sure to change the router password (which is different from the WiFi password) to something that you can remember but cannot be guessed easily.
    • After you have accessed the  home WiFi router’s there should be a tab for parental controls,
      • Set the controlling computer as your laptop’s MAC address
      • Set the child computers to the MAC addresses of your children’s devices.
        • This includes iPads and iPhones.
      • The best approach is to set the access controls to block access during certain times of the day.
  • The only way around this is to install a MAC address changer (such as MADMACS)
    • This means that you should setup their Windows accounts with reduced permissions.
    • You can also configure parental controls on the iPod Touch, iPad, and the iPhone.
      • Settings ==> General ==> Restrictions
  • Put a band-aid or masking tape over the laptop’s camera.
  • Be familiar with your software and track who has accessed what sites and forums.
    • Be wary if they are accessing sites like 4Chan.org and Omegle or other video chat sites.
  • Move the computer to a well-trafficked area so that the user and the monitor are easily observed.
  • Sit down with your children and have them demonstrate their Internet savvy to gauge if they have been “adventurous” already.
  • Call and speak to the parents of your children’s friends to make sure they are vigilant when your child is visiting.
Tagged with: , , , , , , , , ,
Posted in Cybersecurity

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: