Wednesday, April 29, 2009

How to Choose Your Parental Control Software

If you have kids growing up to be teenagers, you would likely start wondering why they're spending so much time on the Internet. Are they doing research on the Internet for their homework as they claim? Or, are they simply spending time chatting with friends? Are they visiting websites with inappropriate content? Whom are they meeting on the social network? Welcome to parenthood in the Internet era!

Parental control is about managing behaviors of your kids on the computer and over the Internet. Parental control can be implemented in several ways.

If you use a router to support Internet connectivity of multiple computers in your home network, you may want to first look into what functionality your router already provides. Most of routers support simple access restriction, such as, domain and URL blocking. Yet, only a few routers provide effective logging that shows you the visited websites or URLs. If you're willing to try your luck with some public domain firmware and monitoring software, you may get to squeeze some juice out of your router. In general, though, the result won't be worth of your effort.

Windows Vista (except Business edition) offers its own built-in parental control. The functionality is fully integrated with the security control of the operating system and is very easy to use. Although not as powerful as the third-party parental control software, parental control from Windows Vista is likely all you need.

If your computers are not running Windows Vista or you are looking for more sophisticated features, there are several software vendors to consider. Based on my research, the two vendors on that top my list are SpectorSoft and Spytech. I'll discuss some of the most important considerations below to help you make your purchase decision.
  1. Logging: Many of the third party parental control offer a wide range of logging features starting from basics, such as, keystrokes, websites, and URLs to advanced features like email capturing, social networks, online chats, and screen recording.
  2. Control: Almost all the products allow you to set a schedule during which Internet access is allowed, URL, or website blocking. Widows Vista supports website blocking according to the pre-compiled website ratings in their database. This is useful, because you can't possibly enter all the unwanted websites by hand. Vista also allows restrictions on gaming playing and applications.
  3. Access: Most of the products require you to have physical access to the monitored computer to see the logs or generated reports, while a few of them can send the reports to your email box. With some upgrade, some products let you access all the logs at a centralized location on the Internet or monitor the activities in real time. At the moment, Spector Pro 2009 of SpectorSoft offers the most powerful feature set followed closely by Spytech's SpyAgent. With help from eBlaster, Spector Pro of SpectorSoft allows you to access the logs and reports remotely. SpyAgent of Spytech offers remote access with SpyAnywhere and real-time monitoring with Realtime-Spy.
  4. Stealth mode: If you prefer not to have your kids find out that they are being monitored, "stealth mode" can come in handy. Many products is capable of running in stealth mode that hides itself from the user on the computer.
  5. Pricing: Spector Pro 2009 costs $99.95 per computer with some discount, if you purchase more than one license. Spytech appears to offer a more attractive pricing towards multiple licenses. IamBigBrother of Internet Safety Software costs only $29.95, but charges additional $9.99 per month for accessing data over the Internet that can add up quickly. Some vendors require you to renew your license every year. So, do not rely only on the price tag to calculate your cost.
Even though technology is available and mature, perhaps the most effective way to parental control is a frank conversation between you and your kids. After all, trust is the most valuable property within a family.

[picture source: http://www.northeastern.edu/offcampus/images/Detective.jpg]

Wednesday, April 22, 2009

Beyond Copyrights Protection

In my post "Understanding Trademarks and Copyrights", I discussed basic concepts. Even if you're willing to pay $45 to register every piece of your creation with the Electronic Copyright Office of The Library of Congress, how would you find out who makes illegal copies of your work?

It is neither feasible nor practical hoping to identify offending contents or websites simply by having YouTube employ a group of staffs eye-browsing the uploaded videos. To make the problem even worse, there are many types of media files ranging from text, image, music, to video.

Technology seems to show glimmers of hope finally. A week ago, I came across a new start-up called Attributor that is currently developing a new generation of technology that helps police the content over the Internet. Here is how it works:
  1. The content creator registers the original content with Attributor.
  2. Attributor screens and indexes over 100 million web pages a day.
  3. Attributor detects the copies of the content and the offending web sites.
  4. Attributot also generates reports with details of the offending websites, such as, whether or not an attribution link back to the original web site exists, the web site traffic, the advertising revenues, and so on.
Attributor is shooting beyond copyrights protection, though. The reports allow the content creator to take proper actions. One simple action could be to require the offending web site to include an attribution link back to the original site. Not only does the attribution link improve authority of the original web site (e.g. Google PageRank), but would also bring in additional traffic. Other actions include removal of the offending content, blockage of the offending web site by the search engines, negotiating a share of the advertising revenue, or legal actions.