Thursday, December 17, 2009

15% of Kids are Sexting…WAKE UP PARENTS!

What do you get when you give tech-savvy kids cell phones and have hormones that are out of control?  Something else for parents to worry about.

About 15 percent of American teenagers have received nude or semi-nude photos of their peers on their cell phones in a practice called "sexting," according to a new Pew Internet and American Life survey http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx

The nationally representative phone and written survey of 800 teens (ages 12 to 17, actually) also found that 4 percent of teens are sext message senders.

Please parents…don’t be naive about this.  My son has received 3 separate sext messages from girls he barely knows and from girls he knew well.  Each girl was trying to get his “attention”, feeling like this was a way for them to be “liked” by him.

Girls are just as likely as boys to sext, and older teens and teens who pay for their own cell phone are most likely of all to engage in the naughty cell phone practice, the survey found. 

Relationship currency

Teens in the survey said sext messages have become a form of "relationship currency" among their generation, Amanda Lenhart, Pew Senior Research specialist and author of the report, said in a statement. 

"These images are shared as a part of or instead of sexual activity, or as a way of starting or maintaining a relationship with a significant other," she added.

"And they are also passed along to friends for their entertainment value, as a joke or for fun."

For some teens, sexting has become a part of the American dating ritual. Gone are the days of sending flowers to your crush. Instead, some guys sext naked pictures of themselves or their "private parts" to girls. "It happens about 10 times a month," one high school girl wrote.

The survey also confirmed some of parents' worse fears about sexting. Another high school girl wrote: "Sometimes people will get into fights with their exes, and so they will send the nudes as blackmail ..." 

In addition, some teens admitted to feeling pressured to send sexually explicit photos of themselves. 

Attitudes to sexting varied amongst the teens themselves. Some viewed it as a safer alternative to real life sex, while others worried about the legality of the practice and the potential for public release of the images. 

Solutions?

So what is a parent to do? Marilyn Maxwell, a pediatrician at Saint Louis University who was not involved in the study, said the key thing is for parents to talk to their children.

"Sometimes parents are afraid to tell their kids what they want from them because they feel hypocritical because of the things they did as a young person," said Maxwell, who is a contributing author of the book "Questions Kids Ask about Sex: Honest Answers for Every Age." 

Maxwell's advice: Get over it. "You have to get over feeling hypocritical because you want the best for your child," she said. 

Parents should also establish ground rules before giving their child a cell phone. "Parents need to let their kids know up front that they have the right to read their text messages, emails, and other electronic communications if they suspect something is wrong," Maxwell said. 

In my house…my wife and I have “Surprise Phone Audits”, where, without warning, we ask for their phone and review all texts and pictures.  Our rule also includes…if we see ANY evidence of “deleted” texts (you’ll see gaps in the timelines of a text thread), then they loose their phone for a week.

-SuperDale

Tuesday, December 15, 2009

WARNING: Acrobat Reader Exploit…TURN OFF JAVASCRIPT NOW!

Malicious hackers are exploiting a zero-day (unpatched) vulnerability in Adobe’s ever-present PDF Reader/Acrobat software to hijack data from compromised computers.

According to an advisory from Adobe, the critical vulnerability exists in Adobe Reader and Acrobat 9.2 and earlier versions.  It is being exploited in the wild.

The company has activated its security response process but declined to offer any more details until an investigation is complete.

Unfortunately, the company did not provide any mitigation guidance for customers.

The folks at ShadowServer describe the situation as “very bad.”

We did not discover this vulnerability but have received multiple reports of this issue and have examined multiple different copies of malicious PDFs that exploit this issue. This is legit and is very bad.

Here’s what we know so far:

We can tell you that this exploit is in the wild and is actively being used by attackers and has been in the wild since at least December 11, 2009. However, the number of attacks are limited and most likely targeted in nature. Expect the exploit to become more wide spread in the next few weeks and unfortunately potentially become fully public within the same timeframe. We are fully aware of all the details related to the exploit but do not plan to publish them for a few reasons:

  1. There currently is no patch or update available that completely protects against this exploit.
  2. There is little to no detection of these malicious PDF files from most of the major Antivirus vendors.

With that said we can tell you that this vulnerability is actually in a JavaScript function within Adobe Acrobat [Reader] itself. Furthermore the vulnerable JavaScript is obfuscated inside a zlib stream making universal detection and intrusion detection signatures much more difficult.

In the interim, Adobe PDF Reader/Acrobat users are urged to immediately disable JavaScript:

Click: Edit -> Preferences -> JavaScript and uncheck Enable Acrobat JavaScript

Or, better yet, use an alternative PDF Reader software program.

Monday, December 14, 2009

How to Setup and Configure OpenDNS

I’ve written about using OpenDNS in past post (and other blogs), but I’ve never really sat down and given step by steps on how and why to configure this free service.

First I’ll start with the “why”…WARNING…A little “GEEK” info coming at you:

When you type an address like www.yahoo.com in your browser address bar, the computer doesn’t know where yahoo.com points to and it will therefore ask the DNS server.

The job of a DNS server is to translate this human-readable web address (like www.yahoo.com) into a computer-readable number also known as an IP address (209.131.36.158). Once your computer knows the IP location of a web domain name, it opens the website in your browser.

DNS is such an integral part of our Internet life working behind the scenes every time we connect to a website. In most situations, our Internet Service Provider specifies the DNS Server address that we key into the browser network settings or the router.

Unfortunately, this can prove to be the weakest link in protecting our families.

The honest bottom line is that there's no way to absolutely, positively block porn, or anything else for that matter. You can make it more difficult, and maybe that's enough, but for every approach we might consider taking there will be ways to circumvent it.

So with that out of the way, let's block some porn...

You Are The ISP

The approach is actually quite simple: when a computer connects to your network at boot time, it asks your router for an IP address. Along with that IP address the router also provides the IP addresses that should be used for DNS lookups (the lookups that translate human readable "google.com" into what your computer really uses to connect: 74.125.19.104.).

OpenDNS

  1. You’ll need to go to www.opendns.com 
  2. Write Down “Your IP:” in upper right, and click “Create Account”.image
  3. Select your DNS Source (normally the Router option).image
  4. Choose your Router Brand…if you don’t see your router brand, select the “general router instructions” link. image
  5. Follow the instructions for configuring your router.
  6. After you Finish the configuration settings, you’ll be directed to your “Dashboard”.  You’ll be promoted to enter your IP address (remember the number you wrote down on step 1?). If you have a dynamic IP (one that rotates every couple of days), then use the “client-side software” and follow the configuration wizard.

The Dashboard is you MAIN interface with OpenDNS.  From here you can customize which filters you want to use, custom error messages and look at the websites that are being blocked as well as the most popular site requested.

image

You can use the pre-built settings (High, Moderate, Low, Minimal or Custom).  I personally use custom so I can block all social networking, but I can put in an exception for Facebook.com

image

(Note: fbcdn.net is part of www.facebook.com)

With these settings any computer/device that connects to the internet through this router would use OpenDNS's service.

So what happens if your IP address changes?

This is a very common scenario for consumer internet connections, and is called "dynamic IP addressing". One day your internet connection might be on one IP address, and another day it might change. This is totally normal, and is controlled by your ISP.

You can update your IP address with OpenDNS manually, of course. However, OpenDNS does make available a small program which will automatically update OpenDNS's record of your IP address when it changes. You only need to install it on one machine - yours. Once OpenDNS understands that the internet IP address has changed for your account, its features are applied to all computers accessing sites through that connection.

With a little “tweaking” you can even add your own error messages. image

I like my kids to know that they’re being monitored…just like the corporate world, when users know someone’s monitoring, web traffic to inappropriate sites drops dramatically. ;-)

One final caveat: what we've been talking about is web access. OpenDNS doesn't filter incoming email, so any porn spam you might be getting will continue, but the links to those site should be blocked. You'll need to investigate spam filtering solutions for that, and those are likely not things you'll be able to implement without impacting the computers involved.

I’m OUT!

-SuperDale

Monday, December 7, 2009

Facebook Users…Still giving out too much personal info.

I came across an article about how bad ID theft on Facebook is getting….yeah…..it’s worse.  Please read this article and WATCH the video!  Then educate your family and friends.

"According to Sophos, Facebook users are getting sloppier with their personal info, not better. Revisiting a 2007 survey in which a plastic frog got 87 hits out of 200 friend requests, this time a rubber duck and a cat got 87 out of 200 friend requests, plus a bonus 8 friends who decided to trust them anyway. The research also suggests that older Facebook users are sloppier than the young, being keener to build their list of friends. (The older users had more than 4x the friends each, on average, than the young.)"

http://www.sophos.com/blogs/duck/g/2009/12/06/facebook-id-probe-2009/

-SuperDale

Friday, December 4, 2009

Great Googly-Moogly

So Google just released “Public-DNS” (it’s still in beta). Configuring your DNS to point to Google should give you faster access. If you know DNS and you think about what Google does…their DNS cache/database is got to be huge…which should make things faster/more secure.

http://code.google.com/speed/public-dns/

Give it a try!

I’m OUT!

-SuperDale

Thursday, September 24, 2009

Twitter WARNING!

OK folks…I knew it was coming…PLEASE for the safety of your identity and your family safety…review this article about the latest scam.

http://www.f-secure.com/weblog/archives/00001773.html

-Dale

Tuesday, May 26, 2009

50 Top Text Acronyms you should be aware of...

Here's a link to some acronyms that kids are using today...WARNING..some of these are descriptive!

http://www.myfoxatlanta.com/dpp/news/fox_5_links/Top_50_Text_Acronyms_Parents_Should_Know_052009

-SuperDale

Friday, May 15, 2009

Holy Swap-File, Batman!

One method of increasing your system performance and increasing your security, is to…(are you a ready for this one!)…delete the Swap-File (also known as the PageFile).  Now I’m not saying to permanently remove the swap-file, that would be VERY bad…but rather remove it as the computer shuts down and recreate it as the computer reboots… WHY? you ask.. couple of reasons.

  1. Sensitive information may have been temporarily stored in the virtual memory pagefile. For this security reason and others, it may be a good idea to enable this setting to clear the virtual memory pagefile occasionally or when you suspect this. When this setting is enabled it will clear the virtual memory pagefile, and the hibernation file only on a portable computer, when you restart or shutdown the computer.
  2. If you leave the file in place…over time it get “fragmented”, which makes the system work harder to find the files it needs…by deleting it, and restarting the computer, a NEW and IMPROVED swap file is created, which is not fragmented.

So how do you do this?….It’s a little “Geeky”, but here you go:

WARNING: THIS METHOD ONLY WORKS ON VISTA ENTERPRISE, BUSINESS, AND ULTIMATE…for Vista Home and Preium, look towards the bottom of this article for section 2.

Section 1)

Open the Local Group Policy Editor.
2. In the left pane, click on Computer Configuration, Windows Settings, Security Settings, Local Policies, and Security Options. (See screenshot below)

image
3. In the right pane, right click on Shutdown: Clear virtual memory pagefile and click on Properties.
4. To Enable Clear Paging File at Shutdown -
A) Select (dot) Enabled and click on OK. (See screenshot below step 5A)
B) Go to step 6.
5. To Disable Clear Paging File at Shutdown -
A) Select (dot) Disabled and click on OK.
image
6. Close Local Group Policy Editor window. Your done.
7. If you enabled this setting, then restart or shutdown the computer to clear the Virtual Memory Paging File.

 

Section 2)

1. To Disable Clear Paging File at Shutdown -
A) Click on the download link below to download the
Disable_Clear_Page_File.reg file.
B) Go to step 3.
2. To Enable Clear Paging File at Shutdown -

A) Click on the download button below to download the
Enable_Clear_Page_File.reg file.


3. Click on Save, and save the .reg file to the Desktop.
4. Right click the .reg (On Desktop) file and click on Merge.
5. Click on the Run button for Security Warning pop-up.
6. Click on Continue (UAC), Yes, and then OK when prompted.
7. When done, you can delete the .reg file (On Desktop).
8. If you enabled this setting, then restart or shutdown the computer to clear the Virtual Memory Paging File.

-SuperDale (http://myfamilysafety.blogspot.com)

(Note: I’m not responsible for any issues that these files may or may not cause…there’s my disclaimer)

Thursday, May 14, 2009

Lying Low on the Social Networks…

Here is a GREAT article by Kim Komando (A nationally talk radio show about computers).

Good rules to live by…http://www.usatoday.com/tech/columnist/kimkomando/2009-04-30-facebook-privacy_N.htm?csp=34

-SuperDale

More Sexting information

An article in today’s Washington Post about sexting  (sending sexually explicit photos by cell phone) accurately portrays the difficulties schools, law enforcement, and prosecutors have when new uses of technology don’t necessarily fit into laws and polices already on the books.  Often young people embrace technology and find new, and sometimes negative uses, before parents, schools, and the community have the opportunity to proactively respond.

One paragraph in the story particularly caught my attention:

Sexters are often "the good kids” police said, with strong grades, involved parents and no criminal history. Many send photos without grasping that they could be widely circulated or posted on the Internet in view of strangers, predators and potential colleges and employers.

It’s that last part that I actually think we can do something about. Young people in America should not grow up without a grasp of how the Internet works, the longevity of images and text in cyberspace, or the impact and ethical considerations of sending, receiving, or distributing explicit photos.

Sharing explicit photos most certainly did not start with the Internet. However, the Internet is an accelerator button that has few brakes and a memory that lasts forever. The responsibility of teaching young people about the safe and secure use of technology belongs to all of us—parents, teachers, uncles, aunts, grandparents, industry, and government.

Learning to use technology responsibly in a civil society is not even about the technology.  It is about learning the universal behaviors that are relevant, whether you are using a megaphone, email, social networking, texting or even just word of mouth.  Young people need to understand the consequences of behavior, appreciate the rights and feelings of others, and be aware of the lasting impact of their actions. By learning these life lessons young people will be prepared to safely and securely integrate every new technological bell and whistle, and harness the power of technology to enhance their lives.

Here’s the kicker…the article goes on the say that “ In Loudoun County, Ting-Yi Oei, 60, an assistant principal at Freedom High School, said he had never heard the term when he and a school security specialist investigated a teacher's report in March 2008 of a risqué photo being circulated by students.”   READY…..”Ultimately, Oei was arrested on child pornography charges for possessing the photo he had investigated.”!

Please…let’s all sit down with our kids (yes, there are reports at the elementary school level)…talk about what’s wrong and right.  Let them know they don’t have to do something like this to be popular, or to get someone to “like” them.

It’s a NEW world!

-SuperDale

Friday, May 8, 2009

Look out! You think the Swine Flu is bad!

There's a new series of email messages going out, numbering in the millions. Many of them have links to Web sites and those Web sites seem vaguely official.

When you click on the link in the email, you're taken to these official-looking sites, where you're told your version of Flash or your version of Acrobat isn't up-to-date and they offer you the opportunity to download an updated version.

Guess what…the software you download isn't Flash or Acrobat, it's something designed to infect your computer. The trojan attempts to steal confidential information from the computer and upload it to a server in Ukraine.

So let's go over our list of cautions once again, but we'll lead this time with Acrobat and Flash.

Never, ever, ever install Flash or Acrobat from a Web site you're visiting because the site says you need to. If you're not sure you're running the latest version, type http://www.adobe.com directly into your browser's address bar, go to Adobe's site, and download from them.

Downloading Flash and Acrobat from Adobe.com is safe. Downloading these files from anywhere else is not.

Just because repetition often leads to learning, let's go over our steps for safe computing once again:

  1. Never, EVER open email attachments UNLESS you’re expecting something from someone….Ever!
  2. Update your computer using Windows Update whenever you're told updates are available.
  3. Make sure your virus definitions are updated daily.
  4. Update your anti-spyware definitions daily.
  5. Update your browser to Internet Explorer 7/8 or Firefox 3. These have much better anti-phishing protections.
  6. Use a router or firewall. If you don't know what this is, call your ISP and ask them for help. Shouldn't cost you more than $50 and can help keep you safe.
  7. NEVER, NEVER, NEVER (I’ll come over to your house and slap you, if you do) give your personal information to ANYONE on the internet.  Your bank, Ebay, Paypal and anyone else you can think of will NEVER ask for your info from a email (even if it direct you to a “official looking” site)…if they really do, drop them FAST!
  8. This is a big one…”Lunch is NEVER FREE”!  You DID NOT win a lottery in Africa, you did not loose an millionaire Uncle in South America who left you millions and there is no FREE XBox, FREE Ipod, Free Flat Screen TV….STOP ALLOWING GREED TO JEOPARDIZE YOUR SAFETY AND INDENTITY!

And, once again, don't download Flash or Acrobat from sites other than Adobe. Don't download QuickTime from any site other than Apple.com. Don't open email attachments.

Don't open email messages that look like they're just baiting you. Don't go to questionable Web sites. Don't put your credit card into any site you're not already very comfortable with.

Do visit this site! ;-)

-SuperDale (http://myfamilysafety.blogspot.com)

Thursday, May 7, 2009

How do I configure my router for my families safety?

If you don't know the ip of the router you can try clicking start-->run-(“start search” if you’re using Vista)

Type cmd and click "OK". In the command prompt type: ipconfig and press "Enter" on the keyboard. If there's a "gateway address" that will the the number to type after http:// in your browser.

Ethernet adapter Wireless:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 192.168.1.101
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

You’ll have to type in the username and password.  If you haven’t changed it from the defaults (SHAME ON YOU!), try looking at your manual.  Once in, you should see a website with different settings.

If you want to configure your router, for OpenDNS, go to this website first (http://www.opendns.com/support/videos/getstarted/) and watch the video on getting started.  After you’ve followed the video, go to this site (https://www.opendns.com/start/router/), select what your router looks like and follow the directions.

Last thing…if you have wireless on your router, PLEASE change the SSID to something that someone won’t be able to identify as coming from your home….I’m a BIG fan of “misdirection”.  On a Linksys router…change the SSID to “belkin” or “dlink”.   This will make someone think (and possibly try to hack) your wireless network is something it’s not.

-SuperDale (http://myfamilysafety.blogspot.com)

Tuesday, May 5, 2009

The FREE Version of “LifeLock” ;)

 
You know me…always trying to share information

I’m sure we’ve all heard about Life-Lock.  A service (for only $10 a month) will  quote “Protect your identity from being stolen”

Well….here’s the skinny:

First you might want to note that the owner, who advertises his SS#, has had 87 attempts on his identity…and guess what…someone was successful

(see: http://www.foxnews.com/story/0,2933,357090,00.html)

Q; Life-Lock DOES offer $1,000,000.00 guarantee….

Read the small print…their guarantee “only covers a defect in LifeLock's service,”…AZ and CA are currently suing the company for misleading customers.

So…here comes SUPER-DALE! 

What LifeLock does…only Free - A 10 min guide to save $10 a month

We’ve all seen the very catchy ads from LifeLock - “I’m Todd Davis and this is my social security number….” It doesn’t get much better than the president of the company plastering his social security number on billboards, banner ads, full page ads in the Wall Street Journal, and everywhere else in between. The concept is simple, take as many steps as possible to reduce the chance of identity thieves working you over. LifeLock’s execution and timing have been excellent. The only catch is you’re not paying for an exclusive LifeLock service. Instead, you’re paying for LifeLock to take care of a government mandated resources that you can do for free. Thus, you’re really paying to save a few minutes of your time. Of course this certainly isn’t a bad thing. We all can only do so much. The question becomes is it worth $10 a month for the next 20 years? For me, it’s not. Therefore, I put together a quick cheat sheet on how to protect your identity for free.

Here’s a breakdown of what LifeLock provides so you can do it yourself. If you think the $10 a month is worth it, visit LifeLock and sign up.

1. Set a credit fraud alert. This is really a new credit request alert that lets you decide if you are the victim of fraud or not. The simple way is to fill out the online form every three months. You can also fill out a letter and mail it in to get coverage for several years. Go the easy route like LifeLock and do the 90 days online. To place your credit fraud alert go to the link below at Equifax which also alerts Transunion and Experian (the three major credit reporting agencies). Here’s the link https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp

2. Do step 1 Again in 90 days. Unless you print out the form from the link above and send it into the credit bureau you have to resubmit the form every 90 days to keep the credit fraud alert active. Set an Outlook or Google calendar reminder to go to that link again in 3 months and fill out the form again. Simple. And by doing it yourself you’ll be saving $30 a pop (3 months of monitoring for each submission). That’s enough to keep my subscription to HBO going for the upcoming season of Entourage.

3. Reduce junk mail (most importantly preapproved credit card offers). There’s really three benefits to this. First, you are reducing landfill waste, pollution from the dyes that are used, and junk mail transportation costs. Second, you’re reducing the time you spend shredding the offers. Third, you are reducing the opportunities credit thieves have to fill out a new credit card requests in your name.

To reduce junk mail and preapproved credit card offers go to the Federal Trade Commission’s(FTC) website http://www.ftc.gov/bcp/conline/pubs/credit/prescreen. shtm the specific page to opt out is https://www.optoutprescreen.com/

4. Order free credit reports. By law, all of the credit bureaus must provide you with a free credit card report once a year. Of course, they always try to up-sell you on more advanced features which you often do not need. To get the federally mandated free credit report just go to https://www.annualcreditreport.com/cra/index.jsp

5. LifeLock’s WalletLock. This service just contacts the credit bureaus when you lose your wallet. Here’s an easier and better way to do it. First, keep the credit cards you carry in your wallet to a minimum (sounds simple but a lot of people carry all of their cards in their wallet). Second, for the cards you do carry keep the phone numbers for the banks in your phone or somewhere else that is readily accessible. Obviously, as soon as you lose the wallet you’ll want to contact the banks to cancel the cards. You’d be surprised at how hard it is to track down the right department when you don’t have the exact number that is printed on the back of your card. So keep the numbers handy. When the card is lost first cancel the credit cards then contact the credit bureaus. Third, since closing down credit card accounts hurts your credit, keep the accounts open but shred the cards. Just in case someone breaks in to your house, they won’t have any cards to steal. Fourth, keep you important personal documents safely hidden e.g. your birth certificate, social security card, etc.

6. Insurance. Since this is a free post I’m sure as hell not going to offer insurance for your identity theft. But if you follow the steps above the chances of having your identity stolen are significantly reduced. Is $10 a month worth the insurance? Not for me.

7. Bonus link - National do not call list. Get rid of telemarketers fast. Go to https://www.donotcall.gov/

Summary - 10 minutes to save $10 a month

Is LifeLock worth it? Maybe for some. But the above links detail what they do for you so it’s your call. To LifeLock’s credit they are very clear that the steps LifeLock takes to protect your identity can be done for free. Go through the steps above then ask yourself is it worth $10 a month for the next x number of years?

Oh, and I won’t charge you $10 a month…but if you want to slide me a couple of Diet Cokes (I’ll take dollars as well ;) ) for the info… I won’t complain!

Have a GREAT DAY!

-SuperDale

Monday, May 4, 2009

Sexting – Concern for your kids

sexting1228917187

A new, dangerous trend is growing among teenagers: text messaging explicit photos of themselves, also known as sexting. Students as young as 12 are exchanging salacious pictures and messages through their cell phones.

"A picture got out of somebody else's older sister and that kinda spread like wildfire through our school," said a tenth grader.

 
The phenomenon is raging as wildly as their hormones. It's known as sexting or sex texting, sending lewd messages and pictures through a cell phone. "Nude body pictures, topless, bottomless, poses, inappropriate," said one tenth grader.

Its invaded middle schools as well. A seventh grader said, "It's not usually strangers. It's just somebody you've been talking to lately and they want to see more of you... literally."

Almost half of all 12 year olds have heard of this happening in their school.  Both genders agree the boys are the instigators, but some girls play along.

"I think the girls, they just want to get their attention and usually it works," said an eighth grader. Another student in the same grade said, "Sometimes they'll say, 'Send me a picture of your boobs' or 'Send me a picture of your butt.'"

The risqué game has very real consequences. "The phones these days are like very good so they can just like send it to the Internet and they can put it on MySpace and other people can save it so it's like all over the place," said a seventh grader.

The National Center for Missing & Exploited Children said, "Once it's out there, while they might think it's just their classmates looking at these images, well, it's also the dirty old men. It's the pedophiles. It's those that want to sexually prey on children who take these images, who collect them and spread them worldwide."

It's a very real fear for parents. "It's alarming. They're not protected." "It's really disappointing! It's hard to be a parent today."

The kids said very often it starts as a girlfriend sending a boyfriend a picture, but then they break up, he shows a friend and it quickly gets forwarded around. It's a felony for children under 18 to not only receive one of these pictures on their phone, but taking a photo and sending it could lead to pornography production and distribution charges.

The National Campaign to Prevent Teen and Unplanned Pregnancy reported last month that a survey of 1,280 teens and young adults found that 20 percent of the teens said they had sent or posted nude or semi nude photos or videos of themselves. That number was slightly higher for teenage girls — 22 percent — vs. boys — 18 percent.

Make sure you talk to your kids about this…it’s effect on them, and their friends.  Several kids nationally are being charged and listed as a “Pedophile”. 

One of my suggestions is to do “random” inventories of your kids phones.  Check with your carrier to see what (if any) parental control features they offer… you can also lock up you child until they’re 18 ;)

-SuperDale (no relation to SuperDell!)

Holy Archive, Batman!

Many of us are concerned about the loss of important and sometimes irreplaceable information and files.  I’ve actually had the thought of, “If a fire burnt down my house…what would I be heart-sick over loosing?”.  Nope, it’s not my comic book collection, my computers, my movie sword collection (I know…nerdy huh?)…it would be my pictures, my letters from Santa to the kids, tons of stuff that I store digitally.  The one thing we tend to forget over look is: “What If?”. 

OK…here’s the stats… 1 in 8 computers  will have some sort of data failure…Well, I have 5 computers…so I’ve got some pretty good odds working against me…that or my neighbor is about to have a bad weekend ;).  I’m not worried…I found a solution that I’m REALLY happy with.

I’d like to introduce you to “Carbonite”. 

Online backup software from Carbonite

Boston based Carbonite is the closest to perfection I’ve seen so far. It requires a simple installation, and users choose to back up their entire hard drive or just parts of it. Carbonite then begins the backup process, uploading your files until finished. Files are encrypted, and there is no limit on total storage. 

If you delete a file, Carbonite keeps it stored for 30 days in case you change your mind. Carbonite monitors files that are changed and backs them up right away.

And if you have a problem and need to get the data downloaded to a reformatted hard drive or new computer, Carbonite will download at up to until your system is restored.

Carbonite says that one in eight computers have some sort of data failure. The number one reason is user error, although crashes, fires, floods, theft and viruses all play a part as well. The 30 day cache solves the user-error problem and the fact that data is stored on the Internet solves the fire/flood/theft issue (where USB or network drives may also be affected).

I know, “how much Dale?”  For 1 year of a secure backup of all your data (did I mention there’s no limit to how much you save?  I’m up to almost 900GIGs..Pictures, MP3, Documents, etc.) is only $55!  Plus, you can “Try before you buy” for 15 days. 

I’ve been using it for over a year now…and I sleep a lot better.

Website: http://www.carbonite.com

-Dale Meredith

Monday, March 30, 2009

“A Man has got to know his limitation!” (Dirty Harry)

Parents are always looking for ways to keep their kids safe.  Windows Vista has added a cool feature called Parental Controls which are very easy to use which help when it comes to computers and the Internet. 

While it is great to have your children use and learn the latest technology, spending too much time with video games and surfing the Web can be unproductive.  Ultimately it is the parent’s responsibility to monitor their children’s activities but today’s tip will show you how to utilize a great tool in Vista to help out.  This feature of Vista actually allows you to control the time a user can access their account.

Open Control Panel and click on Set up parental controls for any user.

image

Next, choose your kids account … or whoever you want to limit time on.

image

Make sure Parental Controls are on then click on Time Limits under Windows Settings.

image

Now simply select the the schedule for time allowed on the Internet and when it will be blocked then click OK.  That is all there is to it!

image

While you child is logged into their account there will be an icon in the lower right corner by the clock showing Parental Controls are enabled.  Also, as the time gets closer for them to get off the computer, balloon notifications will appear in periodically telling them how much time is left.  When the time runs out…the user is logged off automatically.

I’m OUT!

Protect Your Family with OpenDNS

This week I have been covering tools to use within Windows Vista to help keep your kids safe using the PC and while being online.  This article will apply will show how to use Open DNS with any Operating System to help filter undesirable web content.  Simply put DNS (Domain Name System) translates IP address to an easy to remember hostname.  For example if you were to type “216.239.51.99” without the quotes into your web browser you will be directed to google.com.

There is a lot of web content filtering possibilities which include specific sites, specific content, and adult website filtering.

opendns_logo1

The first thing you will want to do is sign up for a free account and download the OpenDNS Updater application.  OpenDNS will automatically detect your IP address and will prompt you to create a name and download the Updater application.

image

After signing up go to your Dashboard where you can start creating rules for filtering, manage your administrator settings, and add additional networks.  Basically your dashboard is where you will make all changes you need.  If you ever get stuck or have questions they also have a cool support system which includes a knowledge base and user forum.

image

Lets take a look at filtering content.  From your dashboard click on Settings.  You will then be prompted to choose a basic filtering level from None to High.  This might be a good choice if you want to easily filter out several categories.  To view what the categories are in each level just click on View for a detailed look.

image

This is an example of the detailed categories in the Low filter setting.  This helps you choose what types of content you want blocked.

image

Here is a list of all the categories available to block through OpenDNS.  As you can see this service will work for your children as well as any user on your network and also for business.

image

You can choose a filtering level and add customized domain filtering to it, or completely customize everything.  Probably one of the more publicized social sites you may want to block your child from is MySpace so I will use it as my example.  Below the filtering levels you will see Manage individual domains.  This is where you can get more specific in what your filtering.  The two options are Never Block or Always Block.

image

Just type in the address of the site to block and click on the Add Domain button.  You can then choose to just block the domain or better yet, block all of the categories in the sub-domain.  This means although you block myspace.com if you do not block the sub-domains within the user can access some of the content.  Any changes you make will take about 3 minutes to update.

On the reverse side…I can always allow a site that might otherwise be blocked…Example: I might want to allow facebook.com.  It might be blocked because it’s category is under “social networking” (which I block).

image

Once you have created all of your filters and a user tries to go to a blocked site they will get a message telling them it is blocked and why.  This is the standard message they will get.

image

Another cool feature is the ability to customize the message the user sees.  You can customize it with say your company logo or a picture of yourself.  So if you child tries to go to a pornography site and they see a picture of their parent … well … that might urge them to never try that again!  This is an example of a custom message I made.

image

You can also get statistic logs  which will show you what type of traffic was blocked and other stats to allow you to better filter content.

image

OpenDNS is a great way to protect your kids from undesirable Internet content but that is not all.  Businesses can definitely use it in the workplace.  I personally use it to improve my Internet experience.  In future articles we will be covering a lot more on this incredible web service!  To get an idea of how popular, effective, and trusted OpenDNS is you can check out a list of their business customers.

I’m OUT!

Monday, March 16, 2009

It’s not just computers!

Houston Chronicle (www.chron.com)
Ky. man got Humble girl to send him nude photos

A Kentucky man is accused of persuading an 11-year-old Humble girl to send him nude photos of herself while the pair played video games online.

Anthony Scott O’Shea, 24, of Somerset, Ky., has been charged with promotion of child pornography, online solicitation of a minor and sexual performance of a child. He will soon be transferred to Houston, said Sgt. Gary Spurger of the Harris County Precinct 4 Constable’s Office. The girl sent the man photos over the course of several weeks as they played games online with their PlayStation 3 consoles in December, Spurger said.

“She realized what she had done and felt bad about it and told her parents,” said Spurger, who investigated the case and coordinated the man’s arrest with Kentucky officials.

Online contact

The Precinct 4 Constable’s Office routinely investigates child pornography cases, but this is the first case Spurger said he’s aware of where the online predator contacted a child through a game console’s online network.

“This is another venue these guys are getting to use now that hasn’t been seen before,” Spurger said. “They’re on PlayStation or Xbox playing online games.”

According to court documents, the girl “performed” for the man using a Web camera. She said she met O’Shea playing the game Warhawk and that he had used the screen name “Thunder-kid.”

During interviews with investigators, the girl said that the man “kept pressuring her for more pictures and wanted to set up a meeting with her in order to engage in sexual activity,” the court record states.

The girl told the man that she was only 11, according to records.

Spurger subpoenaed information tied to the screen name, which led him to O’Shea in Kentucky.

On March 2, authorities searched O’Shea’s home. He acknowledged that he had been in contact with the girl and that he had received her photos, officials said.

Authorities said they also discovered that O’Shea had distributed the girl’s photos to other people.

Why…is the big question

My name is Dale Meredith.  As a Certified Ethical Hacker and Microsoft Trainer, I find myself educating IT directors and personal in “What is coming at you” as far as security is concerned.  I teach them to “think” like an “attacker”, which in turn helps them to understand what to lookout for as far as security and protection is concerned in this digital age. 

A couple of weeks ago, I had the thought…”Who’s teaching parents?”…”Where can parents go to learn to protect themselves and their families?”  As a parent, I’m always trying to protect my children from certain aspects of the internet.  I’m also going through the day to day battle of protecting who I am.

I’ve started this blog as a help to those parents that feel “outdated” when it comes to the digital world that we live in. 

I will focus my attention on helping parents learn about different tools, articles and techniques that they can use to protect themselves and their families. 

Our kids are EXTREMLY smart, as they grow up around this fantastic time where information is available anytime, anywhere and (unfortunately) by anyone.  Computers and digital devices are second nature to our kids…kind of like when I grew up, my father struggled to set the clock on a VCR…as a kid I thought “Come on dad…it’s not that hard”, our kids are learning at an incredible rate.  Information is available to them, which is great.

Before I start, please note that I have a RULE.  It’s a RULE that is true in may things in life…it goes like this:

EVERYTHING CREATED IS FOR GOOD, HOWEVER THERE ARE PEOPLE THAT WILL ALWAYS DISTORT AND USE THE SAME THING FOR EVIL.

That being said…This blog is not meant to scare anyone…One of my favorite quotes is “Knowledge builds Confidence”.  This is a wonderful time to be live.  To witness the advancement in this computer/digital age is amazing.  I think I know how my grandparents felt when they witnessed “the horseless carriage”, “talking movies” or telephone.  I’m sure one day my great-grandkids will say “my great-grandpa, worked on a computer with only 4GIGS of RAM” or “can you believe my great-grandpa used a keyboard and mouse!”.

So, I hope the information I share with you will be of help to you.  I don’t claim to know everything, I’m always learning….so here we go!

-SuperDale