Feeds

Censorware software fails to cut it

No panacea for net ills

Remote control for virtualized desktops

Parental control software is only partially effective and needs to be supplemented by parental supervision of their children's online activities, according to a study by Computing Which?, the consumer magazine.

Computing Which? tested six popular child safety (AKA censorware) packages - Net Nanny 5.1, AOL 9.0, Cyber Patrol 7, McAfee Internet Security Suite, MSN Premium, Norton Internet Security 2005 and Mac OS X Tiger - and found most were too difficult for parents to understand and manage. Only Apple's Tiger operating system scored top marks for ease of use. Dedicated parental control packages ought to be simplified, noted Which? testers, who also identified problems with questionable classification of blocked and allowed web sites.

MSN Premium and Norton Internet Security 2005 fared badly across a set of tests earning a rating of just 35 per cent. Parental control software is designed to prevent kids from accessing sites containing pornographic, racism or other otherwise objectionable content. The market segment has grown in size over recent months fueled in large part by parental fears about the internet arising from cases where children have been "groomed" online by perverts prior to abuse.

Computing Which? has the following top tips for protecting children online:

  • Keep PCs in a shared living area — not a child's bedroom
  • Supervise children's online activities
  • Encourage children to discuss any unsavory content they've found
  • Warn children about the potential dangers of chatrooms
  • Use parental control software but don't over rely on it
  • Change your parental control access password regularly

®

Remote control for virtualized desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.