Cyber Bullying Resource: Security Safety Software Reference
Proactive informed parents are the best deterrent. The security concerns have spawned an industry of touted “software solutions.” At best software tools are reinforcements for your personal child safety campaign.
Software tools generally focus on two major tasks: tracking and monitoring internet usage and filtering or blocking certain forms of internet access. The following chart provides a comparison of the features of some of the more prominent programs available but is not a Kamaron recommendation.
the more prominent programs available but is not a Kamaron recommendation.
Product/Price
Features
Evaluation
CyberPatrol from SurfControl
<?xml:namespace prefix = o ns = “urn:schemas-microsoft-com:office:office” />
$39.95 (12 month)
$59.95 (24 month)
Discounts for future subscriptions and for bulk purchases (5 or more licenses)
· Records all web surfing activity
· Sends email report.
· Provides site and program blocking and time restrictions.2
· PC Magazine Editor Rating of 4 (out of 5).
· Reviewers note its susceptibility to overriding, especially on outbound IMs.
CYBERsitter
$39.95 for a single computer, with discounts for additional computers. No subscription fees.
· Records all web surfing activity and IMs.
· Sends email report.
· Provides site and program blocking and time restrictions.2
· Blocks Social Networking sites such as MySpace and FaceBook.
· Five time winner of PC Magazine’s Editor’s Choice Award.
· Some minor Windows interface difficulties reported.
Safe Eyes
$50.00 per year for up to three computers.
· Records all web surfing activity and IMs.
· Sends email report
· Provides site and program blocking and time restrictions.2
· Blocks P2P file sharing.1
· Winner of PC Magazines Editor’s Choice Award
· Some trouble with URL filters blocking legitimate sites.
Allume Sustems Spycatcher
$30.00
· Beats others at detecting and blocking spam
· Activate Parental Controls
· Consumer Reports reviewed.
1Peer-to-peer (P2P) file sharing programs allow direct downloading between end user computers, without the safeguards of a mediating website. P2P programs are used primarily to share music and video files, but can be used for any kind of computer data.
2Program blocking capabilities include both programs installed on the computer and programs accessed online (e.g., video games and gambling programs). Time restrictions capabilities include both limiting the amount of time spent online in a given period (e.g., per day or week) and limiting access at certain times of the day (e.g., between 1:00 and 6:00 a.m.).
THE FIRST LINE OF DEFENSE
This seeming cornucopia of solutions may be deceptive, however. CNet reports that the <?xml:namespace prefix = st1 ns = “urn:schemas-microsoft-com:office:smarttags” />US Justice Department cast doubt last winter on the notion that software alone is adequate protection. And Anne Collier, editor of NetFamilyNews.org, argues on the StaySafe.org website that Web 2.0 (cyberspeak for the new generation of internet involving multimedia, mobile access, multidirectional communication, and user-driven content) defies control, and reliance on software to keep our children safe is a partial solution at best.
GetNetWise.org offers a helpful Online Safety Guide that provides general tips for kids, teens, and families, then breaks specific suggestions down into age groups with three-year spans.
www.kamaron.org and Kamaron Resource Center
Let's Get Connected
You are unique and so is the way you communicate. Click on the buttons below for information on how to "Connect" with Kamaron Institute and Visible Strategies Communications.
About Kamaron Institute
Product Purchase
Contact Kamaron or Visible Strategies