Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Our thanks to:
The internet is not a babysitter.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8
Popular Blog Site
Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. .
Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.
Be CyberSmart, already.