Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Security suggestions, Post 6 of 7


  • Please log in to reply
No replies to this topic

#1 scotty_ncc1701

scotty_ncc1701

  • Members
  • 520 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:21 PM

Posted 20 July 2014 - 10:01 AM

Please read post 1 of 7 first. http://www.bleepingcomputer.com/forums/t/541637/security-suggestions-post-1-of-7/#entry3426328
Please read post 2 of 7 second. http://www.bleepingcomputer.com/forums/t/541638/security-suggestions-post-2-of-7/#entry3426331
Please read post 3 of 7 third. http://www.bleepingcomputer.com/forums/t/541639/security-suggestions-post-3-of-7/#entry3426335
Please read post 4 of 7 forth. http://www.bleepingcomputer.com/forums/t/541643/security-suggestions-post-4-of-7/#entry3426357
Please read post 5 of 7 fifth. http://www.bleepingcomputer.com/forums/t/541644/security-suggestions-post-5-of-7/#entry3426361

============
This post - My house, my computers, my rules
============

Now this suggestion, was placed in its own post because I have no doubt will be very controversial.  Now, before I go any further, remember what I said in post 1:

1.  My wife and I, have had separate computers, since we got back together in 2000 (we've known each other for 50+ years).
2.  I maintain all the computers in our home.
3.  She doesn't use mine, and I only get on hers, when she has an issue, which is very rare, and very minor.
4.  When I work on her computer, I insist that she is there, so she can see what I'm doing.
5.  Our computers are secured down tighter than Fort Knox.  No none has ever broken into Fort Knox.

Since my computers have been virus, malware and hack free since the fall of 1995, and her computer the same since 2000, she relys on me for the security.

My wife and I are of the same opinion, that no child should be allowed to surf the internet or use a computer unsupervised.  This also applies to "OTHER FAMILY MEMBERS" and visitors that use a computer that is the property of the main family members (husband, wife, partner, etc).

When a parent, guardian, etc agrees that a child can have a computer, it is with the understanding that it is the property of the parent, guardian, etc, although used by the child.  Because of that, in that the computer is the property of a parent, guardian, etc, they have the right to establish rules for its use and install any software they deem appropriate.  Despite this comment, a parent, guardian, etc has the absolute right to do it anyway.

For the protection of the child, it is my opinion (and my wife also) that on the computers used by the child, a keylogger should be installed.  Why?  Again for protection.  Say for instance the parents are fixing dinner, and they can't watch the child every single minute, although they're in the same general area.  In this way, with a keylogger installed, the parent, guardian, etc can see what transpired, even later.

The same thing applies to any computer is used by visitors or "OTHER FAMILY MEMBERS" that live in the same home, but don't have a computer of their own.  The head of the family and his/her spouse, partner, etc establishes the rules on computer and Internet use, and since it isn't owned by the visitors, "OTHER FAMILY MEMBERS", etc, the owner has the right to install any software on their computer, without notice, and monitor the computer's use.  Even installing Net-Nanny, etc on the computer used by "OTHER FAMILY MEMBERS", to keep them from going to porn sites, etc is appropriate.

Compare this to my rules for using my home network/Internet access in my previous post.  If the guest brings their own computer, I can't dictate that they put software "X", "Y", or "Z" on their computer; but I can establish the rules for using our home network/Internet access, because I'm paying for it.  No, I will not allow "guest" access that most router/modems have.

Finally, in summary:

1.  My house, my rules.
2.  My computer, my rules.
3.  My Internet connection, my rules.

Have a great day.

:bananas: :bounce:



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users