Ninja Cloak is web based on proxy server for fast, free anonymous web browsing
12 Ways To Protect Children’s Privacy Online
1. Determine Where Your Children Can and Cannot Go On The Internet
• Visit some sites for kids and notice when sites gather personal information.
• Read privacy statements. If not in agreement, find a comparable site not requesting personal information.
• Block content that is unsuitable.
• A good strategy for inappropriate subject matter is to block it before seeing it. There are some ways for doing this with Microsoft software.
• Windows, Windows 7 and Windows 8. These three include parental control features for helping parents manage, monitor and oversee computer use by their children to keep them protected. See “Keep Your Family Safer” in Windows 8 parental controls, and see “Protecting Your Kids with Family Safety” in Windows 7.
• Parental controls are available for Xbox restricting your children’s capability to play games and watch DVD movies that are inappropriate.
• Read “Set Parental Controls” for Xbox live and Xbox 360 for additional information.
2. Increase Your Security And Pivacy
• Blocking sites and downloads that can put your privacy and security at risk is a good idea.
• Set limits with your children on downloading free music and games, toolbars that are animated, and downloads having the potential to put your computer at risk by exposing it to unwanted spyware or software.
• Teach your children, depending on their ages, not to download any software from the Internet that is unknown. Have them ask for your permission before downloading anything. This will prevent unwanted software from being on your computer.
• Ktunnel Some common sites that your kids might accidentally download can possibly infect your computer with viruses, malware, Trojan horses or spyware without them having your permission beforehand. For more information to avoid this, see No. 3 for monitoring where your children go online.
• Windows XP, Windows Vista, Windows 7 and Windows 8 permit the creating of multiple user accounts on your computer. Each user will log on with a distinct profile and have their own Desktop and My Documents folder. Give yourself an Administrator account and Limited User accounts for your children.
• Microsoft Security Essentials is a good antispyware and antivirus software. This will help you notice, disable or remove spyware, viruses, and other unwanted and possible software not wanted. It can be downloaded free from Microsoft for Windows XP, Windows Vista and Windows 7. See “Help Protect Your PC” with Microsoft Security for additional information. Windows 8 or Windows RT does not require Microsoft Security Essentials.
• Norton Symantec offers Internet Security protection that can be downloaded from its site and it’s a bit pricey but powerful.
• Microsoft Internet Explorer permits you to adjust the browser security settings protecting your children by assigning website security levels under Tools/Internet Options.
3. Observe Where Your Kids Visit Online
• It is impossible to be with your children at all times when they are online. It is possible to check where they have been later.
• In Internet Explorer, you can review the History list as the Administrator to see the places your children have visited. Click on the History button on the browser’s toolbar to view the Internet History.
• See, “What Are Parental Controls?” in Windows Vista, Windows 7 and Windows 8 that will allow you to observe where your kids visit online.
4. Tell Your Kids Never Talk To Strangers Online
• Facebook Proxy Social networking, instant messaging, and real-time chatting is a wonderful way kids can connect for discussing their interests and to form friendships. The ability to be anonymous on the Internet can put kids at risk becoming victims to predators and imposters. Children are vulnerable and to curtail their risk, have them take precautions, for example:
Identify themselves with a nickname or only a first name
Never give out their address or phone number
Never send photos of themselves or anyone else
Do not agree to meet anyone they have met online without a parent
• See “Protecting Young People from Online Risks” for further information to help children from being contacted by strangers during instant messaging. Parents can configure their software to permit only contacts that have been approved.
5. Do Not Inadvertently Reveal Personal Information
• Configure your Web browser, or have a professional do it for you, if it’s too difficult. You might be removing personal details and e-mail addresses as well as other contact information without being aware you are doing this.
• Go to your browser. In the “Setup,” “Options,” or “Preferences” menu use a pseudonym (false name) rather than your real name. Do not enter your e-mail address or personal identifiable information (PII). If you browse to a website that you think you can trust, you can give your PII in required forms on their site. Your browser should not permit this information be available to all sites.
• Be aware for “internet defaults”—programs that are system-wide on your computer including Window’s Internet Control Panel, and Mac operating system’s Configuration Manager, including a third-party Mac utility, Internet Config.
• The aforementioned should be ktunnel configured so that they are anonymous, as your browser is. Remove any PII from any of the locations. Homes having kids can have further security issues. Have explicit rules with children so they are aware not to disclose PII. If you, the parents trust certain sites, then you would allow your children to go there.
• Use cookie management software such as: http://download.cnet.com/MAXA-Cookie-Manager/3000-2144_4-10833465.html or http://www.ampsoft.net/utilities/CookieMonster.php – There are others available online by searching for “cookie management software.”
6. Turn On Cookie Notices In Your Web Browser
• Tidbits of information are called cookies that web sites you visit keep temporarily and can be permanent. Cookies are harmless and useful normally. There are other types of cookies that are used for “mining” searching for data for tracking your every move and click you make for determining where you’ve been and your time there. These are used for marketing to try to sell you something.
• Besides the normal browser, most people are not aware that there are new super cookie types that have developed. These cookies do not delete together with your browser cookies being used by all browsers. Web bug cookies track your browsing and create a profile of your habits and interests.
• Read more: MAXA Cookie Manager, free download and software reviews, CNET Download.com http://download.cnet.com/MAXA-Cookie-Manager/3000-2144_4-10833465.html#ixzz2e9RLHsFN
• Only the cookie creator at sites can read most cookies. Some companies managing banner ads are cookie sharing rings, tracking the pages you load, the ads you click and more, then share this info with thousands of their web site clients. Cookie sharing rings are: DoubleClick, AdCast and LinkExchange. Don’t go there! DoubleClick somehow sneaks onto your computer and must be removed from the programs uninstall in your control panel (Windows). You can run Spybot, a wonderful program to find and destroy malicious items that have snuck in without your knowing. Kids are especially vulnerable when surfing.
7. Have A “Clean” E-Mail Address
• When sending e-mail to unknown people, posting to blogs, in chat rooms or other public places on the Internet, or publishing your own Web page, mention your e-mail address from a side account, such as Yahoo Mail, or Hotmail and others as an alternate e-mail address and to use your preferred e-mail address with trusted individuals.
8. Minimize Access To Your Information
• You probably know people who could easily gain physical access to your computer or laptop, such as family, children, roommates, visitors and others. Identifying people who could gain remote access to your computer is more difficult. While having a computer connected to a network or the Internet, you and your family are vulnerable to something or someone accessing or corrupting your information. To make this more difficult, you can foster good habits, see Nos. 9 and 10, below.
9. Log-Off
• When you are away from your computer, log-off or lock it. Have it pass word protected when logging on, and this is for your children as well. This will prevent someone from waiting for you to leave then accessing your computer for your personal information.
10. Disconnect Your Computer
• For added security, disconnect your computer from your cable modem making it impossible for anyone to compromise your computer. It is less convenient this way, but the convenience of being connected comes with risk. Being always connected allows scanning the network for available computers is higher when you or your children are constantly plugged in.
11. Privacy Statements
• Check for ninja proxy privacy policy statements or seals indicating that the site stands by privacy standards. Read how your privacy will be protected. Teach this to your children.
• Look for indicators that you are using a secure web page. These sites scramble or encrypt personal information that cannot be intercepted easily. Screen notices state that you are at a secure site and there may be a closed lock in the bottom corner of your screen. The “http” in the Internet address might change to “https” (“s” means secure) and change color as well. These are good indicators for children as well keeping them secure.
12. Online Privacy Compromised
• If you think your information or your children’s information has been compromised, get in touch with your bank and financial organizations immediately to close accounts. Watch for charges that you or the children did not make.
• Be sure to check all credit reporting agencies for activity that is unusual. Report this to the police and report it to the Federal Trade Commission (FTC).
Subscribe to:
Posts (Atom)