Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM.
Enter Your Child’s Cyber World
Our thanks to:
The internet is not a babysitter.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8
Popular Blog Site
Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. .
Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.