Sunday, July 4, 2010
Blocking site or key logging is one better than the other?
3 Arrests in 8 days in one small town, the first arrest an engineer, the second arrest was a Doctor, and the third was a 26 year old. All three of them were using the Internet to lure teenage girls into meeting with them for the express purpose of molesting them. "The message is, I hope the parents of children will start monitoring what their activities are on the Internet. There are a lot of pedophiles preying on these children," said Johnston. (James Johnson is a police officer in Ardmore, Alabama). "Check your caller I.D. Know who your kids are talking to. If you can, go into the history on your computers. Know what times they are talking to these people. They always want to talk when their parents are gone," he said. This is such a serious problem that the FBI admits to playing catch-up when it comes to combating clever pedophiles using the Internet, and Law Enforcement agencies plea for more money to combat this growing threat. The Bottom line is this; try as they may the government can’t stop pedophiles or keep online pedophiles away from your children, it’s up to you to keep them safe and the good news is that there are methods that can be used to not only stop online predators from harming your children, but protect yourself as well since many predators also threaten families if the victim talks. One of the methods available is called Blocking software, this software works by blocking objectionable content from ever showing up, the software is updated frequently, often daily with a list of sites (called blacklisted), places that cannot be accessed by the computer, using either a web browser such as Internet Explorer, or an instant messaging client and whenever someone tries to access an Internet page the site is compared to the blacklist and the site/chat room is either allowed or not. The other method is keylogging, this method work by recording everything that is typed on the keyboard or clicked by the mouse. One of the advantages that is provided by this approach is if your child has been approached online they generally will not come out and tell you since an online pedophile almost always threatens the child or their family if they talk, and many times the child feels guilty or somehow responsible for the pedophile’s approach in the first place. Unfortunately the online pedophile knows this and capitalizes on guilt, shame or fear this is all part of the grooming process that the offender uses to ease the child into an abusive relationship. Blocking software has its place, and is generally better used for young children since it will keep unwanted material from ever showing up, but it’s use is apparent, that is anyone over the age of 8 or perhaps even younger will know that they are being redirected to a safe website, as a parent or guardian you are definitely the best judge of your child and what they should be allowed to see, and where they should go. Which brings us to key logging software, there are many key loggers available some of them will even email you when a certain word or words that you choose are used. Please remember that child predation is the most underreported crime in the United States, and although the statistics vary greatly depending on the source and many other factors, but the fact remains that as a parent or guardian something should be done.