Parents Against Predators Step-by-Step Training Manual for Parents

Transcription

Parents Against Predators Step-by-Step Training Manual for Parents
Parents Against Predators
Step-by-Step Training
Manual for Parents
Protecting Our Children from Internet Predators
Developed by the
Community Resource Centre (Killaloe) Inc.
This Project has been made possible by a grant from the Ministry of Community Safety
& Correctional Services
Community Resource Centre (Killaloe) Inc.
2
Table of Contents
1. Introduction:
Community Resource Centre………………………………………………………5
Introduction of the Step-by-Step Training Manual for Parents……………….7
Internet predators: Who is at risk………………………………………………….8
Are you web aware? Take this quiz!.............................................................….......10
2. What Is…:……………………………………………………………………….…11
Operating Systems………………………………………………………………….13
The Internet………………………………………………………………………......13
World Wide Web……………………………………………………………….........13
A Web Browser………………………………………………………………………14
A Search Engine……………………………………………………………………..14
Internet Service Providers………………………………………………………….14
Email…………………………………………………………………………...……..14
Public Chat rooms……………………………………………………………..……14
Chat……………………………………………………………………………..…….15
Instant messaging……………………………………………………………..……16
Newsgroups/Forums………………………………………………………….……16
Peer-to-Peer…………………………………………………………………….……16
Videoconferencing ………………………………………………………………...16
Virtual Keyboard…………………………………………………………………..17
3. How to…:…………………………………………………………………………19
Windows:
Set Computer Passwords………………………………………………………….21
Screen Saver Passwords…………………………………………………… ……..24
Find Internet Service Providers…………………………………………………..25
Get Online………………………………………………………………………….25
Access Email………………………………………………………………………...26
Access Instant Messengers………………………………………………………..27
Access Chat Rooms………………………………………………………………...31
Check Browser History……………………………………………………………32
Favorites Folder / Bookmarks Folder……………………………………………35
Set Blocking Systems……………………………………………………………...36
Mac:
Set Computer Passwords…………………………………………………………39
Find Internet Service Providers…………………………………………….……39
Get Online………………………………………………………………………….39
Access Email………………………………………………………………….…….40
Community Resource Centre (Killaloe) Inc.
3
Access Instant Messengers………………………………………………………41
Access Chat Rooms……………………………………………………………….44
Check Browser History…………………………………………………………..45
Favorites Folder / Bookmarks Folder……………………………………….….46
Set Blocking Systems…………………………………………………………….47
Windows and Mac
How to…Effectively Search Online……………………………………………48
How to…Buy Blocking and Filtering Software………………………………52
4. Safe Sites………………………………………………………………………...55
For Kids…………………………………………………………………………….57
For Teens………………………………………………………………………...…64
5. Protecting your Child……………………………………………………...…75
Kids……………………………………………………………………………...….77
Teens………………………………………………………………………………..84
6. Signs your child is at risk……………………………………………………..91
Kids…………………………………………………………………………………93
Teens…………………………………………………………………………….….95
7. What can I do: Canadian Law………………………………………………...97
What Can You Do If A Predator Contacts Your Child………………………99
What Can You Do: Canadian Law Definitions……………………………….101
8. Statistics…………………………………………………………………………103
9. References………………………………………………………………………107
Community Resource Centre (Killaloe) Inc.
4
Community Resource Centre (Killaloe) Inc.
The Community Resource Centre (CRC) was established in 1987 as a project of Women
Initiating Responsible Change, a non-profit corporation. It was funded initially by a
small Ministry of Community and Social Services-Community and Neighborhood
Support Services Program grant. The CRC was incorporated as a non-profit
corporation in September 1991 (Ontario Corporation Number 954868). Since that time
the CRC has managed and delivered a variety of projects, developing many Countywide initiatives and services as well as local, neighbourhood services. We have always
retained an interest in reaching and increasing access for rural and isolated
communities. In the first few years the CRC received funding to operate a Mobile Toy
and Book Lending Program (the Toy Bus) as well as to begin the process of establishing
an electronic database inventory of human services. Since 1993/94 we have delivered
Public Health Agency of Canada Community Action for Children, adding the Canada
Prenatal Nutrition Program in 1995/96. Other current funding relationships exist with:
• Ministry of Community Safety and Correctional Services
• County of Renfrew Social Services and National Child Benefit Project
• District of Nipissing Social Services Administration Board
• Ministry of Child and Youth Services and the Ministry of Community and
Social Services
• Ministry of Education and Training
• Industry Canada
• HRSDC
• Renfrew County District Health Unit
• Ontario Library Association
• United Way of the Upper Ottawa Valley
• The Ontario Early Years Centre
• Community Futures Development Corporation
• Trillium Foundation
There are 11 volunteers who serve as directors on the Board of Directors. Many of our
directors are parents of young children who are or have been participants in our
various programs. The Board of Directors, as the governing body of the Community
Resource Centre is responsible under the Corporations Act of the Province of Ontario
for the overall operation and financial well-being of the Centre and is subject to all the
statutes, regulations, and precedents pertaining to corporate law. Representation on the
board is community-wide, including members from our various consumer populations,
members from the Killaloe and neighbouring business community, and members
representing other children’s service agencies in Renfrew County. Elections are held
annually at the Annual General Meetings. Membership in the organization is free of
charge and all Board meetings are “open” to members who wish to attend.
Community Resource Centre (Killaloe) Inc.
5
Mission Statement
The Community Resource Centre (Killaloe) Inc. is people working in our
communities encouraging and supporting individuals to improve quality of life for
the positive growth in family life, co-operation, right livelihood, and social
development.
Vision Statement
The Community Resource Centre (Killaloe) Inc. is a not-for-profit corporation
established for the following goals: “The establishment and maintenance of a
community organization to serve and reach out actively to all the people of the
southwest section of Renfrew County and the Townships of Airy, Murchison,
Sabine, Lyell and Dickens in the District of Nipissing for the purpose of:
• Developing services and programs in keeping with the evolving needs of children
and adults in the community.
• Providing services and programs, which are integrated, holistic, innovative,
flexible and accessible in a safe working environment.
• Encouraging the exchange of information and ideas, recognizing that we all learn
from one another.
• Supporting individuals in recognizing and developing the skills and strengths
that will enable them to make informed choices in their lives and such other
complementary purposes not inconsistent with these objectives.”
15 Lake St.
Killaloe, ON, K0J 2A0
Phone: 613-757-3108
Fax: 613-757-0208
Toll Free: 888-757-3108
www.crc-renfrewcounty.com
Opening Doors…Growing Together…Making a Difference
Special Thanks to Jathina Blais for all her work researching and preparing
this manual and for leading “Parents Against Predators” educational
workshops.
Community Resource Centre (Killaloe) Inc.
6
Parents Against Predators
The Parents Against Predators program is a Community Resource Centre initiative
directed at keeping our communities safer. This manual is offered to all members of the
community as a way of increasing parents’ knowledge and skills that will help them to
better protect their children.
The purpose of this Step-by-Step Training Manual for Parents is to instruct and inform
parents about various ways of protecting their children from Internet predators.
This manual:
•
explains to parents various aspects of the internet such as email, chat rooms and
messaging programs that may put their children at risk;
•
instructs parents with easy to understand steps that will help protect their children
from dangerous people on the Internet;
•
teaches parents how to block certain programs, enable passwords, and monitor their
child’s email and chat sessions;
•
explains to parents the warning signs that their child may be in danger;
•
provides helpful tips on what to do if they find out their child is at risk of being
contacted or has been contacted by a potential predator;
•
briefly looks at Canadian legislation developed to combat Internet predators and
child luring.
This manual is intended to teach parents with little or no Internet knowledge. Those
who do have previous experience with the Internet are also encouraged to read through
the content as it may contain new and useful information. We invite you to take this
knowledge and share it with others. The more this information is shared, the more
children will be protected from the dangers of Internet predators.
Community Resource Centre (Killaloe) Inc.
7
Internet Predators: Who is at risk?
What are Internet predators and how do they work?
Internet predators are people who take advantage of people’s false sense
of trust and feelings that their identity can remain hidden to build online
relationships with inexperienced young people. Predators establish
contact with children through conversations in chat rooms, instant
messaging, email, or discussion boards. Many teens use “peer support”
online forums to deal with their problems. Predators use these online
areas to look for vulnerable victims.
Internet predators try to gradually seduce their targets through attention, affection,
kindness, and gifts. They devote lots of time, money, and energy into this effort. They
take interest in what is “cool” with kids, such as the latest music, movies, and hobbies.
They often fill the void felt by the child by listening and sympathizing with the child’s
problems and make the child feel as though he or she is the most important person in
the world.
Internet predators are skilled at lowering vulnerable young people’s inhibitions by
gradually introducing sexual content into their conversations once they have built a
rapport. They also gradually expose their victim to sexually explicit material.
Some predators work faster than others, engaging in sexually explicit conversations
immediately. This more direct approach may include harassment or stalking.
Predators may also evaluate the kids they meet online for future face-to-face
contact.
Who is at risk?
Young adolescents are the most vulnerable age group and are at high risk of being
approached by Internet predators. They are exploring their sexuality, moving away
from parental control and looking for new relationships outside of the family. Believing
that their identity is hidden, they are more likely to take risks online without fully
understanding the possible implications.
Young people who are most vulnerable to Internet include those who are new to online
activity, actively seek attention or affection, rebellious, and isolated or lonely. Youth
who are curious, confused about their sexual identity, easily tricked by adults, and are
attracted to a subculture apart from their parent’s world are also susceptible to Internet
predators.
Community Resource Centre (Killaloe) Inc.
8
In a 2001 survey conducted by the Crimes against Children Research Centre in New
Hampshire, 77% of the victims of online sexual solicitations were 14-17 years old. A
quarter of those solicited sexually on the Internet were 10-13 years old.
(Be Web Aware, Media Awareness Network)
Community Resource Centre (Killaloe) Inc.
9
Community Resource Centre (Killaloe) Inc.
10
What is…
This section of the manual is designed to describe to parents the various
aspects of the Internet. It provides definitions and examples of each topic
such as what chat rooms, email and the Internet are.
Community Resource Centre (Killaloe) Inc.
11
Community Resource Centre (Killaloe) Inc.
12
What is…
Operating Systems
Operating systems perform basic tasks, such as recognizing input from the keyboard,
sending output to the display screen (monitor), keeping track of files and directories on
the disk, and controlling peripheral devices such as disk drives and printers. Examples
are Windows 98, Windows XP, and DOS. For Mac users, common operating systems
are OS 8, OS 9, and OS X.
The Internet
The Internet is an immense, global network that connects computers via telephone lines
and/or fiber networks to storehouses of electronic information. With only a computer,
a modem, a telephone line and a service provider, people from all over the world can
communicate and share information with little more that a few keystrokes.
The World Wide Web
The most popular use of the Internet is the World Wide Web, which consists of a
network of web pages. Users may view web pages by using a web browser program
such as Internet Explorer or Netscape. It is a common misconception that the web and
the Internet is the same thing. This is not the case. The web is only one of several
Internet environments, including email, Internet Relay Chat (chat), FTP (File transfer
Protocol), and Usenet newsgroups.
Community Resource Centre (Killaloe) Inc.
13
A Web Browser
A web browser is the software program that allows you access to the Internet.
Common web browsers are Internet Explorer and Netscape.
A Search Engine
A search engine is a tool that allows you to surf or look around on the Internet. It
allows you to type in keywords or phrases of topics you are interested in. Common
search engines are Google, MSN, and Yahoo!
Internet Service Provider (ISP)
Examples of ISPs are Rogers, Sympatico, and NRTCO. These services provide direct,
full access to the Internet at a flat, monthly rate and often provide electronic-mail
(Email) service for their customers. ISPs often provide space on their servers for their
customers to maintain World Wide Web (www) sites (also knows as website or web
pages). Not all ISPs are commercial enterprises. Educational, governmental, and
nonprofit organizations also provide Internet access to their members.
Electronic Mail (Email)
Email is the transmission of messages and files between computers over a
communications network similar to mailing a letter via the postal service. Email is
stored on a server, where it will remain until the addressee retrieves it. Email allows
you to send messages to one person or a group of people. You can include text,
attachments, and images in your email message.
You access email on a computer either through a special email program on your
computer such as Outlook (Windows) or Eudora (Macintosh), or else through a web
browser and a web based email service like Hotmail, Yahoo, and Gmail (from Google).
Public Chat Rooms
A chat room is a virtual place where people interested in a
particular subject can meet and talk. When you register for a chat
room, you pick a nickname or handle. Once you have entered the
room by logging on, you can talk to anyone there, but their true
identities are hidden.
Community Resource Centre (Killaloe) Inc.
14
Chat
Chat is real-time (occurs right at that moment) text conversations between users in a
chat room with no expectation of privacy. People can send messages to another person
and 2 seconds later, they will be able to read it and answer back. All chat conversations
are accessible by all individuals in the chat room while the conversation is taking place.
There are, however, private chat rooms where people can invite others to chat without
everyone else seeing. These private chat rooms are not monitored.
Instant Messaging
Instant messaging (IM) is like instant email. When you are online, any IM user on your
buddy list can send you a real-time message that will pop up on your screen. You can
ignore it or reply to it. You are alerted when anyone on your list goes on or offline and
your friends are alerted to your availability, too. Unlike chat rooms, you can only talk
to people you have put on your buddy list. You can add or block people at any time.
Some IM programs have a button you can press that allows you to open up a chatroom
page. An example of this is Yahoo! Messenger. If you click on the icon “Chat” (shown
here), you will access a chatroom and will no longer be limited to chatting with only
the people on your buddy list.
Yahoo! Messenger
MSN Messenger
Community Resource Centre (Killaloe) Inc.
15
Newsgroups (Forums)
Like a giant, cork bulletin board where users post messages, questions, and
information. Each posting is like an open letter and is capable of having attachments,
such as graphic image files (GIFs). Newsgroups are not real-time.
Peer-to-Peer (P2P)
P2P communication allows people to download files from someone else’s computer if
they both have the P2P software. Such software is free to download from the World
Wide Web. Popular programs include Napster, Gnutella and Kazaa. One of the main
purposes of kids having these programs is to allow them to download and upload
pirated (illegally copied) music and video files. There are also chat components on some
P2P programs that allow users to chat with each other.
Videoconferencing/ Video Chat
Videoconferencing is the live transmission of video and audio over the Internet. All
that is required is a microphone and a webcam attached to a computer plus some
software. Live videos can be captured and saved for later viewing, posting to a web site
or copying to a CD.
Videoconferencing/Video Chat
Webcam hardware
Community Resource Centre (Killaloe) Inc.
16
Virtual Keyboard (No Keys Virtual Keyboard)
http://leithauserresearch.com/nokeys.html
If you thought that taking away your child’s keyboard as a way of reducing online
chatting, think again. No-Keys is a computer software program that displays an on
screen keyboard, also known as a virtual keyboard (a picture of a computer keyboard
on the screen).
Users can "type" on this onscreen keyboard using a mouse, trackball, or similar pointing
device. (A scan option is also provided for people who cannot move any pointing
device at all.) Whatever keys are typed on the virtual keyboard are sent to another
program (such as a word processor, email program, text-to-speech program, etc.)
selected by the user. This allows you to operate the computer entirely with the mouse or
other pointing device.
There are other such virtual keyboards as well. Just type in your search engine
“keyboard on screen” or “virtual keyboards” to locate other products.
Community Resource Centre (Killaloe) Inc.
17
Community Resource Centre (Killaloe) Inc.
18
How to…
This section of the manual is intended to teach parents how to do some of
the things previously described. We will show you how to find an Internet
provider, how to get online, how to set up an email account and much
more.
This section is especially for parents who want to understand how their
child uses their computer.
Community Resource Centre (Killaloe) Inc.
19
Community Resource Centre (Killaloe) Inc.
20
How To…
Windows (Based on XP)
Set computer passwords
You have two choices when setting up your computer. You can have a computer that
requires a user name and password to use it or not. If you choose to have a password
for using the Internet, you need to set it. Choose a password that is not easy to guess
but not hard for you to remember.
To set passwords, you need to find the control panel. Click on the “Start” button.
Depending on the Operating System you are using, it could easier or more difficult to
find.
It may be under the file called “My Computer”.
Community Resource Centre (Killaloe) Inc.
21
Once you locate the control panel, double click on the icon (image) that says “User
Accounts”.
Once in there, click on the icon that says “Computer Administrator”.
Community Resource Centre (Killaloe) Inc.
22
It should take you to a list of options. One of those options should say “Create a
Password”.
Follow the instructions provided. Write the password down in a secure location in the
event you forget it. You will need to type in this password every time someone uses the
computer.
Community Resource Centre (Killaloe) Inc.
23
To remove password, go into “Control Panel”. Click on “User Accounts” and
“Computer Administrator”. Then click on “Remove My Password”.
Screensaver Passwords
If you want to keep your computer turned on but want to control who goes onto the
computer, a screensaver password is what you need. First, you must have a computer
password (see above), as it will be the same password for the screensaver.
Click on the Start menu and select “Control Panel.” Then select the icon “Display”,
which will open another screen. Click on the tab marked “Screensaver.” Choose what
type of screensaver you would like and how long you want it to wait before activating.
Then check off the box marked “On Resume, Password Protect.”
Community Resource Centre (Killaloe) Inc.
24
When your screensaver is activated, the password protector will be enabled. When you
want to access your computer, simply move the mouse or hit a key on the keyboard and
a box will appear asking you for the password. If your children don’t know if, they
won’t be able to access the computer.
Find an Internet service provider
Here are some local Internet service providers. A web address is provided if you have
access to the Internet, as well as a phone number if you don’t. Also check your local
phone book in the Yellow Pages under “Internet-Products and Services”.
Sympatico: You can go online at www.bell.ca . Click on the province you reside in.
Click on the “Internet” icon at the top of the screen and choose which type of service
you want. You can also call 310-7873 and talk to a customer service representative.
Vianet Internet Solutions: You can go online at www.vianet.ca/index.php . Select
which type of service you are interested in (High Speed DSL is available in Renfrew
County). Choose a package that most suits your needs or call (613) 735-4686 to talk to a
customer service representative.
NRTCO: You can go online at www.nrtco.net . Click on dial-up prices and choose the
package you want. You can also call (613) 638-7873.
Get Online
To use your Internet service, you will need to install software onto your computer.
Included in this software is a program that allows you to access the World Wide Web.
The most popular programs are Netscape and Internet Explorer.
Once you are hooked up to the Internet and you have installed all your software, you
need to find the program that will allow you access to the Internet. Most likely there
will be an icon on your Desktop that says Internet Explorer, for example. Once you
locate the icon, you will need to double click it. A page will open up and you will be on
the Internet!
Community Resource Centre (Killaloe) Inc.
25
Access Email
There are two common types of email services.
The first comes with your Internet service provider when you purchase dial-up or highspeed Internet. It is usually run through Outlook Express or Microsoft Outlook. Your
service provider should supply you with detailed instructions on setting up your email
account. Remember: If asked to choose a password, pick something hard to guess (for
others) but easy to remember for you!
The second email service is a web based email service like Hotmail and Yahoo. These
types of email services are free to the user and can be accessed from any computer
anywhere. You can locate these types of email services by accessing a search engine
(like Google) and typing in “Free Email”.
You can find hotmail by typing into the address (ULR) bar at the top of your Internet
browser www.hotmail.com . To locate yahoo’s free email service, type in
www.yahoomail.com. Finally, go to gmail.google.com to access Goggle’s free email
service. Remember: When choosing a username, pick something appropriate as this is
what people will type in when they email you. Also, remember to choose a password
that you will not forget but cannot be guessed by others.
When setting up an email account for children or teens, choose a user name that does
not give away the identity of the child or family. Do not include personal information
such birth dates, nicknames, or ages. An Internet predator could use this information
and may endanger your child or your family.
Also, when setting up an account for your young child, be sure to write down the
password so that you can check the child’s email periodically to ensure his or her safety.
If your child changes the password on his own, request that he share the new password
with you immediately. This may not be applicable with teens, as they deserve a
reasonable amount of privacy.
Community Resource Centre (Killaloe) Inc.
26
Access Instant Messengers
To access instant messengers (IMs), you can open your web browser and then open a
search engine. Type in “Instant Messengers”. A list of commonly used IMs will
appear. The most commonly used are MSN Messenger, Yahoo Messenger and ICQ. All
of these websites have information about the program so that you can understand
exactly what it is you are downloading.
MSN Messenger: To access MSN Messenger, go to http://messenger.msn.com/ . To
install this program on your computer, you need to download free software located on
this page. Simply click on the “Download Now” icon.
It will bring you to a page that allows you to choose whether you are a new MSN user
or if you are looking to upgrade your MSN Messenger. You need a Hotmail address to
use this program.
Community Resource Centre (Killaloe) Inc.
27
Safeguarding MSN: MSN has a feature that allows you to select who you accept on your
chat list. All others will be blocked unless approved by you. Click on “Tools” then
“Options”. Click on the “Privacy” and click on “Only people on my Allow List can see
my status and send me messages”.
Community Resource Centre (Killaloe) Inc.
28
Yahoo Messenger: Open your Internet browser and type in
http://messenger.yahoo.com/. Then click on “Get It Now” in the Yahoo Messenger
box.
Yahoo! Messenger is not suitable for young children
and young teens. It has a chat component built into
the program so users can access all chat rooms.
Community Resource Centre (Killaloe) Inc.
29
If you want to use Yahoo! Messenger for
chatting with friends, you can disable the
random instant message component.
Click on “Messenger” heading in Yahoo!
Messenger. Click on “Preferences.” A
screen will appear (example on left). Click
on “Ignore List”. You will then have the
option to “Ignore anyone who is not on
my Messenger List” or “Ignore only the
people below”. The latter option only
works if you have blocked a specific
person from talking to you; you will still
receive random instant messages from
people not on your list.
ICQ: You can download ICQ from www.icq.com by clicking on the icon “Download”.
Community Resource Centre (Killaloe) Inc.
30
Chances are that if you have a teenager in your home, he or she has already
downloaded an instant messaging program. Most likely, there will be an icon on the
bottom of your screen on the right hand side or there will be an icon on your desktop:
MSN Messenger
Yahoo! Messenger
ICQ
If your child is young, you should request they supply you with the password.
Access Chat Rooms
There are hundreds of chat rooms on the Internet that do not require you to download
software.
Yahoo! Chat: This site is for adults. Go to http://chat.yahoo.com
Yahooligans!: http://yahooligans.yahoo.com/ . This chat site is for younger children.
Chathouse: www.chathouse.com . This site is not intended for young children.
However, they do have a room for Teens. Unfortunately, adults can enter this room and
pose as teens, so be sure to treat teen chat rooms the same as all chat rooms. These chat
rooms also have a feature called “Whisper” which enables people to talk privately. The
chathouse monitor does not view these private messages.
Chatroom: www.chatroom.com links you to other sites that are geared towards adults.
MSN Chat: http://chat.msn.com/ This site does not allow people under 18 years old
access to chat. It requires a hotmail address, which includes personal information such
as the user’s birth date. If the user specifies that he is under 18, he will not be granted
access.
TeenSpot: www.teenspot.com You have to be registered with Teenspot.com to use the
chat service.
Community Resource Centre (Killaloe) Inc.
31
The only way you can find out what chat service your child is using is to ask them
directly or to check the browser history, which will be discussed next.
How to block users in chat:
For whatever reason you may wish not to see messages from a particular person
anymore or receive private messages from them. If this is so you can block this person.
To do this you right click on the name of the person in the contact list which should
give you a range of options, and one of these is Block. It will mean that you will not
receive messages from this person anymore. Block is sometimes called ’Ignore’, and if
right-clicking doesn’t work, have a look in your Preferences for this function, or there
may be a block/ignore button in the chatroom itself.
How to save a copy of your chat conversations:
Saving your conversations can provide useful evidence if you come to make a report
about something or someone.
Highlight the conversation with your mouse.
Copy the highlighted text
Paste the conversation into a word processing document, which you can save.
Check Browser History
Checking your browser history allows you to see what Internet sites people have been
using on your computer. Be aware that many teens are capable of deleting all the
Internet pages in History so that you will not be able to find out where they went.
Internet Explorer
To check your browser history, you need to open your browser while connected to the
Internet. At the top of your browser are icons. The history icon looks like a clock with
an arrow going around it.
Community Resource Centre (Killaloe) Inc.
32
You will need to click on this icon to access Internet history. A list of recently viewed
Internet pages will appear on the left of the screen. All you need to do is click on a
specific page and it will open up for you.
You can set how long you want that information to be kept in the history folder by
clicking “Tools” then “Internet Options”.
Community Resource Centre (Killaloe) Inc.
33
A box will appear and one of the headings in that box is called “History”. There is an
option to change how long you want to keep pages in history. When you want to delete
all the pages in your history, simply press “Clear History”.
Browsers also make temporary copies of Web pages, known as cache files, and store
them on your computer. Internet Explorer allows users to click on Tools. Next, select
Internet Options and click on General and then Settings.
Community Resource Centre (Killaloe) Inc.
34
Finally, click on View Files to see a list of all the cached Web pages on your computer.
Netscape
Users of Netscape can click on Communicator on their toolbar, select Tools, and then
History. This will show a list of the Web sites visited, along with dates and times.
Another option is to press the Ctrl (control) and H keys both together—that will also
bring up the history listings.
Browsers also make temporary copies of Web pages, known as cache files, and store
them on your computer. In Netscape you select Edit, then Preferences. Click on
Advanced and select Cache. Look beside the Choose Folder button to see where your
cache files are stored on your hard drive.
Make a Favorites Folder / Bookmark Folder
Internet Explorer
Making a Favorites folder for your child with kid friendly web sites helps encourage
them to access pre-approved sites. It allows for easy access and saves time finding
appropriate sites.
Open your web browser and enter the web address for the site you want to put in your
favorite’s folder. Once you have opened the site, click on the “Favorites” button at the
top of the screen.
Community Resource Centre (Killaloe) Inc.
35
Next, click on “Add” or “Add to Favorites”. Select “Create In” and choose “New
Folder”. Type in a folder name and press OK. Select the new folder as the destination
for your site to be located. Press “OK”.
To access this folder the next time your child wants to play on the Internet, simply click
on the “Favorites” button, locate your folder and double click on it, and select the web
site you want to open.
Netscape
Making a Bookmark folder for your child with kid friendly web sites helps encourage
them to access pre-approved sites. It allows for easy access and saves time finding
appropriate sites.
Open your web browser and enter the web address for the site you want to put in your
favorite’s folder. Once you have opened the site, click on the “Bookmark” button at the
top of the screen. Click on “Add” and either select “OK” or create a new folder.
Set Blocking Systems
The blocking system provided with your operating system that allows you to block
access to some websites is not the best quality. It will only block sites that have a rating
and many sites do not have a rating. For a better quality program, view our “How
to…Buying Blocking and Filtering Software” section of the manual.
Community Resource Centre (Killaloe) Inc.
36
To access the blocking system, open your web browser and click on “Tools”. Select
“Internet Options”.
Click on “Content”. At the top of the page there should be a button marked “Enable”.
Community Resource Centre (Killaloe) Inc.
37
By clicking on this, you can select the type of content you want blocked. It allows you
to create a password so that you can access restricted sites.
Community Resource Centre (Killaloe) Inc.
38
How To…
Macintosh (Based on OS-X)
Set Computer Passwords
To set computer passwords, click on the Apple icon. Then click on “System
Preferences” which leads you to a page of icons. Click on the icon “Accounts”; a page
will open that has the words “Display Login Window”. If you click on “List of Users”
and then click the “+” button, a new user will be created. It will ask you to type in the
name of the Account (e.g. Jane Doe), a password and a password hint. You will need to
remember this password every time you log onto your computer. This is a great device
to utilize as children won’t be able to use the computer without parental permission
and knowledge.
Find Internet Service Providers
Here are some local Internet service providers. A web address is provided if you have
access to the Internet, as well as a phone number if you don’t. Also check your local
phone book in the Yellow Pages under “Internet-Products and Services”.
Sympatico: You can go online at www.bell.ca . Click on the province you reside in.
Click on the “Internet” icon at the top of the screen and choose which type of service
you want. You can also call 310-7873 and talk to a customer service representative.
Vianet Internet Solutions: You can go online at www.vianet.ca/index.php . Select
which type of service you are interested in (High Speed DSL is available in Renfrew
County). Choose a package that most suits your needs or call (613) 735-4686 to talk to a
customer service representative.
NRTCO: You can go online at www.nrtco.net . Click on dial-up prices and choose the
package you want. You can also call (613) 638-7873.
Get Online
When you purchase an Internet service, you will install software onto your computer.
Included in this software is a program that allows you to access the World Wide Web.
The most popular programs are Safari, Netscape, and Internet Explorer.
Community Resource Centre (Killaloe) Inc.
39
Once you are hooked up to the Internet and you have installed all your software, you
need to find the program that will allow you access to the Internet. Check the menu bar
at the bottom of the screen for the icon. Once you locate the icon, you will need to
double click it. A page will open up and you will be on the Internet!
Access Email
There are two common types of email services.
The first comes with your Internet service provider when you purchase dial-up or highspeed Internet. If you look at the menu bar on the bottom of your screen, you may see
an icon that looks like a stamp. This is your email service. Your service provider should
supply you with detailed instructions on setting up your email account. Remember: If
asked to choose a password, pick something hard to guess (for others) but easy to
remember for you!
The second email service is a web based email service like Hotmail and Yahoo. These
types of email services are free to the user and can be accessed from any computer
anywhere. You can locate these types of email services by accessing a search engine
(like Google) and typing in “Free Email”.
Community Resource Centre (Killaloe) Inc.
40
You can find hotmail by typing into the address (ULR) bar at the top of your Internet
browser www.hotmail.com . To locate yahoo’s free email service, type in
www.yahoomail.com. Remember: When choosing a username, pick something
appropriate as this is what people will type in when they email you. Also, remember to
choose a password that you will not forget but cannot be guessed by others.
When setting up an email account for children or teens, choose a user name that does
not give away the identity of the child or family. Do not include personal information
such birth dates, nicknames, or ages. An Internet predator could use this information
and may endanger your child or your family.
Also, when setting up an account for your child, be sure to write down the password so
that you can check the child’s email periodically to ensure his or her safety. If your
child changes the password on his own, request that he share the new password with
you immediately.
Access Instant Messengers
To access instant messengers (IMs), you can open your web browser and then open a
search engine. Type in “Instant Messengers”. A list of commonly used IMs will
appear. The most commonly used are MSN Messenger, Yahoo Messenger and ICQ and
can be used for Mac computers.
You may want to specify in your search that your want a Mac version. All of these
websites have information about the program so that you can understand exactly what
it is you are downloading.
MSN Messenger: To access MSN Messenger, go to http://messenger.msn.com/ . To
install this program on your computer, you need to download free software located on
this page. Simply click on the “Download Now” icon. It will bring you to a page that
allows you to choose whether you are a new MSN user or if you are looking to upgrade
your MSN Messenger. You need a Hotmail address to use this program.
Community Resource Centre (Killaloe) Inc.
41
Safeguarding MSN: MSN has a feature that allows you to select who you accept on your
chat list. All others will be blocked unless approved by you. Click on “Tools” then
“Options”. Click on the “Privacy” and click on “Only people on my Allow List can see
my status and send me messages”.
Yahoo Messenger: Open your Internet browser and type in
http://messenger.yahoo.com/. Then click on “Get It Now” in the Yahoo Messenger
box.
Yahoo! Messenger is not suitable for young children
and young teens. It has a chat component built into
the program so users can access all chat rooms.
Examples of what occurs in these chat rooms can be
found in “Chat Log”.
Community Resource Centre (Killaloe) Inc.
42
If you want to use Yahoo! Messenger for
chatting with friends, you can disable the
random instant message component.
Click on “Messenger” heading in Yahoo!
Messenger. Click on “Preferences.”
A screen will appear (example on left).
Click on “Ignore List”. You will then have
the option to “Ignore anyone who is not
on my Messenger List” or “Ignore only the
people below”. The latter option only
works if you have blocked a specific
person from talking to you; you will still
receive random instant messages from
people not on your list.
ICQ: You can download ICQ from http://www.icq.com/download/mac/.
Community Resource Centre (Killaloe) Inc.
43
Chances are that if you have a teenager in your home, he or she has already
downloaded an instant messaging program. Most likely, there will be an icon on the
bottom of your screen on the right hand side or there will be an icon on your desktop.
MSN Messenger
Yahoo! Messenger
ICQ
If your child is young, you should request they supply you with the password.
Access Chat Rooms
There are hundreds of chat rooms on the Internet that do not require the downloading
of software.
Yahoo! Chat: This site is for adults. Go to http://chat.yahoo.com
Yahooligans!: http://yahooligans.yahoo.com/ . This chat site is for younger children.
Chathouse: www.chathouse.com . This site is not intended for young children.
However, they do have a room for Teens. Unfortunately, adults can enter this room and
pose as teens, so be sure to treat teen chat rooms the same as all chat rooms. These chat
rooms also have a feature called “Whisper” which enables people to talk privately. The
chathouse monitor does not monitor these private messages.
Chatroom: www.chatroom.com links you to other sites that are geared towards adults.
MSN Chat: http://chat.msn.com/ This site does not allow people under 18 years old
access to chat. It requires a hotmail address, which includes personal information such
as the user’s birth date. If the user specifies that he is under 18, he will not be granted
access.
TeenSpot: www.teenspot.com You have to be registered with Teenspot.com to use the
chat service.
Community Resource Centre (Killaloe) Inc.
44
The only way you can find out what chat service your child is using is to ask them
directly or to check the browser history, which will be discussed next.
How to block users in chat:
For whatever reason you may wish not to see messages from a particular person
anymore or receive private messages from them. If this is so you can block this person.
To do this you right click on the name of the person in the contact list which should
give you a range of options, and one of these is Block. It will mean that you will not
receive messages from this person anymore. Block is sometimes called ’Ignore’, and if
right-clicking doesn’t work, have a look in your Preferences for this function, or there
may be a block/ignore button in the chatroom itself.
How to save a copy of your chat conversations:
Saving your conversations can provide useful evidence if you come to make a report
about something or someone.
Highlight the conversation with your mouse.
Copy the highlighted text
Paste the conversation into a word processing program, which you can save.
Check Browser History
To check browser history, you must have your browser open. Click on the History
button. A screen on the left side of your page will open displaying all the locations
users have been to. Be aware that many teens are capable of deleting all the Internet
pages in History so that you will not be able to find out where they went online.
Community Resource Centre (Killaloe) Inc.
45
Make a Favorites Folder / Bookmark Folder
Internet Explorer
Making a Favorites folder for your child with kid friendly web sites helps encourage
them to access pre-approved sites. It allows for easy access and saves time finding
appropriate sites.
Open your web browser and enter the web address for the site you want to put in your
favorite’s folder. Once you have opened the site, click on the “Favorites” button at the
top of the screen.
Next, click on “Add” or “Add to Favorites”. Select “Create In” and choose “New
Folder”. Type in a folder name and press OK. Select the new folder as the destination
for your site to be located. Press “OK”.
Community Resource Centre (Killaloe) Inc.
46
To access this folder the next time your child wants to play on the Internet, simply click
on the “Favorites” button, locate your folder and double click on it, and select the web
site you want to open.
Netscape
Making a Bookmark folder for your child with kid friendly web sites helps encourage
them to access pre-approved sites. It allows for easy access and saves time finding
appropriate sites.
Open your web browser and enter the web address for the site you want to put in your
favorite’s folder. Once you have opened the site, click on the “Bookmark” button at the
top of the screen. Click on “Add” and either select “OK” or create a new folder.
Set Blocking Systems
The blocking system provided with your operating system that allows you to block
access to some websites is not the best quality. It will only block sites that have a rating
and many sites do not have a rating.
Internet Explorer
This method blocks sites that Internet Explorer has rated as inappropriate.
Open Internet Explorer and select “Preferences” from the top menu. Next, click on
“Ratings”. A box will be open with the words “Rating Settings - Enable - Disable Change Password”. If you want to have certain sites blocked, click on “Enable” which
should provide you with an option to create a password.
Next, select “Options” at the bottom of the screen and then select “Rating Options”.
Uncheck the option of “User can see sites with no ratings”, as this allows every user to
see every type of site. You may want to select the option “Supervisor can type a
password to allow users to view restricted sites” so that adults can review sites that
might be considered inappropriate for children.
Community Resource Centre (Killaloe) Inc.
47
How To…
Effectively Search Online
Effective Online Searching
Due to the sheer size of the World Wide Web, finding relevant information demands
very specific searching skills and techniques. Learning how to choose and use the right
search engine and practicing effective search methods helps minimize the irrelevant
and offensive material that can turn up in a search.
Choosing the right search engine
The first step is to become familiar with the different types of search engines and the
various services they provide. There are hundreds of search engines from which to
choose, and there are several distinct styles of gathering, grouping and presenting
information.
For example, “Ask Jeeves” permits users to type in questions. www.ask.com
Community Resource Centre (Killaloe) Inc.
48
“Google” ranks results by importance and relevance of the site.
“Yahoo!” has a directory where you can search by topic. http://ca.yahoo.com/
“Vivisimo” http://vivisimo.com/ clusters search results into categories selected from
the words and phrases contained in the search results. Some search engine features may
be better suited to a specific type of search than another.
Community Resource Centre (Killaloe) Inc.
49
Use Multiple Search Engines
Most of us use just one search engine, and often settle for the first, relevant Web site on
the list. Some researchers advise using more than one search tool because each offers
different features, and because no search tool can access the billions of Web pages on
the Internet. According to researchers, no single search engine captures more than 16
per cent of the entire Internet – and all search engines, combined, capture less than 50
per cent of online information.
Sponsored Links
On most search engines, companies can pay to have their sites appear during a search.
These paid listings are usually separated from the main editorial results and identified
as “sponsored links.” For example, “Google” places sponsored links on the right-hand
side of the page away from editorial content. “Altavista”, on the other hand,
incorporates them into the search results list, which can be misleading.
Community Resource Centre (Killaloe) Inc.
50
Conducting your search
Finding the right search engines is only the beginning. Developing effective search
techniques greatly improves your chances of accessing quality information.
Here are some helpful tips from the Media Awareness Network Web site:
•
•
•
•
•
•
Use six to eight key words, preferably nouns.
Most users submit only one or two key words per search, which is not enough
for an effective query.
Avoid verbs, and use modifiers if they help define your object more precisely,
e.g. “feta cheese” rather than just “cheese.”
Combine key words into phrases by using quotation marks, as in “solar system.”
Most search engines will only look for this phrase rather than the individual
words, solar and system.
Spell carefully, and try alternative spellings.
Some search engines use a method known as BOOLEAN to fine-tune a search.
The three most common BOOLEAN commands are “and,” “or” and “and not.”
o
“and” or “+” between key words means: “I want only documents that
contain both or all words
o
“or” between key words means: “I want documents that contain either
word; I don’t care which
“and not” or “-” means: “I want documents that contain this word, but not
if the document also contains another word” (i.e. “teens and not sex”). The
term “and not” applies only to the word or phrase immediately following.
o use a two step search process. Use your first search to find more specific
keywords that you can then use in your second search to find sites more
useful to you.
o
Family Friendly Search Database
GetNetWise
http://kids.getnetwise.org/tools/
You can enter your own search terms in the GetNetWise Tools for Families database.
Community Resource Centre (Killaloe) Inc.
51
How To…
Buy Blocking and Filtering Software
For Windows Users
Warning: No blocking software is perfect. Do not install one and think your child is
completely safe from accessing inappropriate sites. It cannot substitute for the
techniques described in “Protecting your child” and “Protecting your teen”.
Cybersitter
( http://www.cybersitter.com)
There are thirty-two filtering categories, and auto updates for the first year. Parents can
override blocked sites and add forbidden sites, monitor newsgroups, chat, www sites,
e-mail and instant messenger. Cybersitter creates a log of access attempts and attempts
to override, controls day/time of access, and can suspend filtering for user defined
time. Cybersitter has the most advanced anti-tampering functions available. It is
password protected, and the settings you choose cannot be modified by even the most
determined users.
According to experts, Cybersitter is the best parental control software. As with most
filtering software, you can customize and fine tune access settings to most accurately
reflect your child's maturity level. Cybersitter has more filtering categories than other
software (32), as well as control over chat, newsgroup, e-mail and instant messenger
content. The software keeps logs of blocked sites, as well as a log of any override
attempts, and parents can choose to temporarily suspend filtering. Cybersitter can only
be installed on one computer. Approx. cost: $40
ContentProtect
( http://www.contentwatch.com)
It has twenty-two filtering categories, can monitor and block chat, can monitor websites
and e-mail, offers remote management and remote reporting, updated URLs and
filtering rules, daily time limits, can override blocked Web sites with a password, has
dynamic categorization, and parents can edit filtering lists.
Community Resource Centre (Killaloe) Inc.
52
It has full Internet protection anytime your computer is connected to the Internet,
regardless of your ISP; powerful administration and reporting tools that can be accessed
from any Web browser, so you can view your family’s Internet activity and make
changes to family profiles from work or while traveling; the most robust filtering
technology; utilizes a combination of “white” and “black” lists and dynamic, real-time
filtering to ensure a safer experience than that achieved by products using solely a black
or white list. Approx. cost $40
Net Nanny
(http://www.net-nanny-software.com/ )
Net Nanny 5.1 software is the newest and most advanced way to protect your family on
the Internet. Finally, you can prevent access to inappropriate sites, limit the amount of
time your children spend online, prevent them from revealing private information via
email or IM, and generally control their entire Internet experience!
Older Internet filtering programs did not work well - they blocked too much and did
not have enough flexibility. Net Nanny software is proud to say we are the most
advanced and flexible product - with separate profiles for up to 12 family members.
It allows you to block pornography, hate literature, bomb formulas, and anything else
that you deem inappropriate. Filter out the negative sites or only allow access to the
positive sites. Schedule automatic updates to the database free of charge. There are no
subscription fees ever. Approx. cost $40
Community Resource Centre (Killaloe) Inc.
53
Community Resource Centre (Killaloe) Inc.
54