-->

Friday, June 1, 2018

ParentalControls on FeedYeti.com
src: falcon1.net

Parental controls are features which may be included in digital television services, computer and video games, mobile devices and software that allow parents to restrict the access of content to their children. These controls were created to assist parents in their ability to restrict certain content view able by their children. This may be content they deem inappropriate for their age, maturity level or feel is aimed more at an adult audience. Parental controls fall into roughly four categories: content filters, which limit access to age inappropriate content; usage controls, which constrain the usage of these devices such as placing time-limits on usage or forbidding certain types of usage; computer usage management tools, which enforces the use of certain software; and, monitoring, which can track location and activity when using the devices. Another feature of parental controls is the ability to block rating. In the United States, its usage is known as Parental Advisory, TV-MA for television, R and NC-17 for MPAA, and M and AO for ESRB.

Content Filters were the first popular type of parental controls to limit access to Internet content. Television stations also began to introduce V-Chip technology to limit access to television content. Modern usage controls are able to restrict a range of explicit content such as explicit songs and movies. They are also able to turn devices off during specific times of the day, limiting the volume output of devices, and with GPS technology becoming affordable, it is now possible to easily locate devices such as mobile phones.

The demand for parental control methods that restrict content increased over the decades due to rising availability of the Internet. Recent ICM survey showed that almost a quarter of young people under the age of 12 were exposed to online pornography. Restricting especially helps in cases when children are exposed to inappropriate content by accident. Monitoring may be effective for lessening acts of cyberbullying within the internet. Ninety-five percent of America's students between the ages of twelve and seventeen access the web daily, and eighty-eight percent of those students said they witnessed their peers bullying online users or were being bullied. Parents have access to 100% free online platforms to control the websites that their child goes on by restricting it or controlling the content that they can view.


Video Parental controls



Overview

Two different types of control is behavioral control and psychological control. Behavioral control consists of controlling the amount of time or how much they can view. Psychological control, involves parents trying to influence children with affecting the child's emotional side of them by manipulating or insensitivity.

Several techniques exist aimed at creating parental controls for blocking websites. Add-on parental control software may monitor API in order to observe applications such as a web browser or Internet chat application and to intervene according to certain criteria, such as a match in a database of banned words. Virtually all parental control software includes a password or other form of authentication to prevent unauthorized users from disabling it

Techniques involving a proxy server are also used. A web browser is set to send requests for web content to the proxy server rather than directly to the web server intended. The proxy server then fetches the web page from the web server on the web browser's behalf and passes on the content to the browser. Proxy servers can inspect the data being sent and received and intervene depending on various criteria relating to content of the page or the URL being requested, for example, using a database of banned words or banned URLs. The proxy method's major disadvantage is that it requires that the client application to be configured to utilize the proxy, and if it is possible for the user to reconfigure applications to access the Internet directly rather than going through the proxy then this control is easily bypassed. Proxy servers themselves may be used to circumvent parental controls. There are other techniques used to bypass parental controls.

Computer usage management method, unlike content filters, is focused on empowering the parents to balance the computing environment for children by regulating gaming. The main idea of these applications is to allow parents to enforce learning component into the computing time of children, where children must earn gaming time while working through educational contents.

Lately network based parental control devices have emerged. These devices working as a firewall router use packet filtering, DNS Response Policy Zone (RPZ) and Deep packet inspection (DPI) methods to block inappropriate web content. These methods have been used in commercial and governmental communication networks. Another form of these devices made for home networks have been developed. These devices plug into the home router and create a new wireless network, which is specifically designed for kids to connect to.


Maps Parental controls



Parental controls on mobile devices

The increased use of mobile devices that include full featured internet browsers and downloadable applications has created a demand for parental controls on these mobile, smart devices. In November 2007, Verizon was the first carrier to offer age-appropriate content filters as well as the first to offer content-generic content filters recognizing that mobile devices were used to access all manner of content from movies and music to short-code programs and websites. In June 2009, in iPhone OS 3.0, Apple was the first company to provide a built in mechanism on mobile devices to create age brackets for users that would block unwanted applications from being downloaded to the device. In the following years, the developers of all major operating systems have presented in-built tools for parental control, including Linux, Android, Windows, and even a more business-oriented platform Blackberry. There are also applications that allow parents to monitor real time conversations on their children's phone via access to text messages, browser history, and application history. Applications of this sort have created an rising competition in their market.

Mobile device software enables parents to restrict which applications their child can access while also allowing parents to monitor text messages, phone logs, MMS pictures, and other transactions occurring on their child's mobile device, to enable parents to set time limit on the usage of mobile devices, and to track the exact location of their children as well as monitor calls in and out and the content of texts in and out.

Numerous dangers that can arise from electronic communications. Numerous studies have shown that if caught early enough with parents intervention, could intervene cyberbullying.

Most internet providers offer no-cost filtering options to limit internet browsing options and block unsuitable content. Implementing parental controls and discussing internet safety are useful steps to protect children from inappropriate internet information.

Although parental controls can protect children, there are also negative factors that come along with these controls. Children are most likely to increase a sense of anxiety due to parental controls.


Nintendo Switch Parental Controls - Nintendo Switch Presentation ...
src: i.ytimg.com


Methods to bypass parental controls

Several methods of bypassing parental controls can be used.

  • If the filtering software is located locally within the computer, all Internet software can be easily bypassed by booting up the computer in question from alternative media, with an alternative operating system or (on Windows) in Safe Mode. However, if the computer's BIOS is configured to disallow booting from removable media, and if changes to the BIOS are prohibited without proper authentication, then booting into an alternative operating system is not available without circumventing BIOS security by partially disassembling the computer and resetting BIOS configuration using a button or jumper, or removing and replacing the internal button cell battery.
  • Using external proxy servers or other servers. The user sends requests to the external server which retrieves content on the user's behalf. Filtering software may then never be able to know which URLs the user is accessing, as all communications are with the one external server and filtering software never sees any communications with the web servers from which content really originated. To counter this, filtering software may also block access to popular proxies. Additionally, filtering systems which only permit access to a set of allowed URLs (whitelisting) will not permit access anything outside this list, including proxy servers.
  • Resetting passwords using exploits.
  • Modifying the software's files, and
  • Brute-force attacks on software passwords.
  • 'Incognito/InPrivate' modes with the 'image' tab: Users, parental control software, and parental control routers may use 'safe search' (SafeSearch) to enforce filtering at most major search engines. However, in most browsers a user may select 'Incognito' or 'InPrivate' browsing, enter search terms for content, and select the 'image' tab to effectively bypass 'safe search' and many parental control filters. See below for router based considerations and solutions.

Filtering that occurs outside of the individuals computer (such as at the router) cannot be bypassed using the above methods (except for 'Incognito/InPrivate' modes). However,

  • The major search engines cache and serve content on their own servers. As a result, domain filters such as many third party DNS servers, also fail to filter the 'Incognito/InPrivate' with 'image' tab.
  • Most commercially available routers with parental controls do not enforce safe search at the router, and therefore do not filter the 'Incognito/InPrivate' with 'image' tab.
  • Safe search may be enforced at a DNS server or router. For google, for example, see https://support.google.com/websearch/answer/186669?hl=en. Similar options also exist for Bing and Yahoo. Techno-savvy users may use dd-WRT on a compatible router to enforce safe search at the router. However, this requires specialized knowledge beyond most end users expertise.
  • Less knowledgeable users may purchase easy to install routers that automatically enforce safe search, in addition to other parental controls.[citation needed]

ParentalControls on FeedYeti.com
src: parentsonlinesafety.com


Criticism

While Parental Controls have been added to various electronic mediums and increased in popularity, the question has been raised if they are enough to protect and deter children from exposure to inappropriate material. It has been speculated that the strict focus on control is hindering a child's ability to learn self-governing skills and restricting the growth of open communication between parent and child.


ParentalControls on FeedYeti.com
src: www.minormonitor.com


Video game systems that have used parental controls

  • PlayStation 4
  • PlayStation 3
  • PlayStation 2 (only for DVDs)
  • PlayStation Vita
  • PlayStation Portable
  • Xbox (console)
  • Xbox 360
  • Xbox One
  • Nintendo DSi
  • Nintendo 3DS
  • Nintendo Switch
  • Wii
  • Wii U
  • GameStick
  • Nintendo DS

How to set up Parental Controls on Mac | Child safety tips for ...
src: cdn2.macworld.co.uk


Operating systems with parental controls

Below is a list of popular operating systems which currently have built-in parental control features:

  • Android operating system
  • iOS
  • Mac OS X (10.3 and later)
  • doudoulinux (Built in web filter)
  • sabily (Built in web filter)
  • ubuntu christian edition (Built in web filter)
  • Windows (Vista and later)



Windows 7 Parental Controls - Complete Tutorial - YouTube
src: i.ytimg.com


See also

  • Adultism
  • David Burt
  • Internet censorship
  • List of parental control software
  • Motion picture rating system
  • Television rating system
  • Videogame Rating Council
  • Retina-X Studios
  • Smart Sheriff

3 Ways to Bypass Parental Controls on a Mac - wikiHow
src: www.wikihow.com


References

Source of article : Wikipedia