<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SafeKids.com &#187; Uncategorized</title>
	<atom:link href="http://www.safekids.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.safekids.com</link>
	<description>Online safety &#38; civility</description>
	<lastBuildDate>Sun, 05 May 2013 19:38:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Net safety task force says predation risk exagerated</title>
		<link>http://www.safekids.com/2009/01/13/net-safety-task-force-says-predation-risk-exagerated/</link>
		<comments>http://www.safekids.com/2009/01/13/net-safety-task-force-says-predation-risk-exagerated/#comments</comments>
		<pubDate>Wed, 14 Jan 2009 01:33:06 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[attorneys general]]></category>
		<category><![CDATA[berkman center]]></category>
		<category><![CDATA[blumenthal]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[isttf]]></category>
		<category><![CDATA[myspace]]></category>
		<category><![CDATA[task force]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=171</guid>
		<description><![CDATA[by Larry Magid A long awaited report from the Internet Safety Technical Task Force concludes that children and teens are less vulnerable to sexual predation than many have feared. The report also questions the efficacy and necessity of some commonly &#8230; <a href="http://www.safekids.com/2009/01/13/net-safety-task-force-says-predation-risk-exagerated/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<div>
<div class="postByline">by Larry Magid<!-- MAC T 14.14.16.16 --><!-- MAC [r20081117-1345-OptimizeOn:1.13.10] c18-rb-tron-xw4.cnet.com::1210108256 2009.01.14.01.29.19 --><!-- NO AD TEXT: _QUERY_STRING="POSTHTML=%3C%2Fdiv%3E&#038;POS=100&#038;SP=2&#038;PREHTML=%3Cstyle%20type%3D%22text%2Fcss%22%3E.buttonAd%7Bbottom%3A10px%3Bposition%3Aabsolute%3Bright%3A0%3Bwidth%3A88px%3B%7D%3C%2Fstyle%3E%3Cdiv%20class%3D%22buttonAd%22%3E" _REQ_NUM="0"  --><!-- default ad --><img style="position: absolute; top: 0px; left: 0px;" src="http://adlog.com.com/adlog/i/r=11872&amp;s=501815&amp;o=13503:19518:&amp;h=cn&amp;p=2&amp;b=5&amp;l=en_US&amp;site=3&amp;pt=8300&amp;nd=19518&amp;pid=&amp;cid=238&amp;pp=100&amp;e=3&amp;rqid=01c18-ad-e114968965B21B6008&amp;orh=&amp;ort=&amp;oepartner=&amp;epartner=&amp;ppartner=&amp;pdom=news.cnet.com&amp;cpnmodule=&amp;count=&amp;ra=75.198.57.162&amp;dvar=dvar%255fversion%253d2008&amp;ucat_rsi=1%25260113%252610085%252610168%252610172%252610180%252610183%252610195&amp;pg=RNG1TwoPjAMAABe6D48AAACK&amp;t=2009.01.14.01.29.19/http://i.i.com.com/cnwk.1d/Ads/common/dotclear.gif" alt="" width="0" height="0" /><!-- MAC ad --></div>
</div>
<p><!-- photo --></p>
<p><!-- end photo -->A long awaited <a href="http://cyber.law.harvard.edu/pubrelease/isttf/">report</a> from the Internet Safety Technical Task Force concludes that children and teens are less vulnerable to sexual predation than many have feared. The report also questions the efficacy and necessity of some commonly prescribed remedies designed to protect young people.</p>
<p>The <a href="http://cyber.law.harvard.edu/newsroom/Internet_Safety_Task_Force">task force</a> was formed as a result of a joint agreement between MySpace and 49 state attorneys general.<span id="more-171"></span></p>
<p>Over the past couple of years, several state AGs have been looking into potential dangers to youth, and some have called for social-network sites to use age verification technology to confirm the ages of users in an attempt to prevent adults from or interacting online with minors. The task force includes representatives of Internet and social-networking companies, security and identity authentication vendors, and nonprofit advocacy organizations. It&#8217;s chaired by John Palfrey of Harvard Law School&#8217;s Berkman Center for Internet and Society.</p>
<p><em>Disclosure: I served as a member of the task force, representing <a href="http://connectsafely.org/">ConnectSafely.org</a>, a nonprofit internet safety organization I co-founded along with Anne Collier. ConnectSafely receives financial support from MySpace, Facebook, Google, Yahoo, and other Internet and social-networking companies. I am also founder of SafeKids.com and am on the board of directors of the National Center for Missing and Exploited Children, which is represented on the task force.</em></p>
<p>Based on data analyzed by its Research Advisory Board, the task force concluded that &#8220;actual threats that youth may face appear to be different than the threats most people imagine&#8221; and that &#8220;the image presented by the media of an older male deceiving and preying on a young child does not paint an accurate picture of the nature of the majority of sexual solicitations and Internet-initiated offline encounters.&#8221;</p>
<p>While the task force found that youth risk from predators is a concern, the overwhelming majority of youth are not in danger of being harmed by an adult predator they meet online. To the extent that young people have received an unwanted online sexual solicitation, data from a 2000 study and a 2006 follow-up from the Crimes Against Children Research Center concludes that &#8220;youth identify most sexual solicitors as being other adolescents (48 percent in 2000; 43 percent in 2006) or young adults between the ages of 18 and 21 (20 percent; 30 percent), with few (4 percent; 9 percent) coming from older adults, and the remaining being of unknown age.&#8221;</p>
<p>What the task force did find is that &#8220;bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.&#8221; Partially because researchers can&#8217;t agree on a definition of <a title="A rallying cry against cyberbullying -- Saturday, Jun 7, 2008" href="http://news.cnet.com/8301-10784_3-9962375-7.html">bullying and harassment</a>, the actual risk is hard to quantify, but it is clearly much higher than the risk of being harmed by a predator. Some studies suggest that as many as 49 percent of youth have experienced some type of bullying or harassment. In many cases no serious emotional or physical harm occurred. However, a study by Michelle Ybarra and Janice Wolak found that &#8220;39 percent of victims reported emotional distress over being harassed online.&#8221;</p>
<p>There is also a widespread belief that deception is often involved where adults pose as teens to engage with young people, but research shows that that&#8217;s rarely the case. The report found that &#8220;although identity deception may occur online, it does not appear to play a large role in criminal cases in which adult sex offenders have been arrested for sex crimes in which they met victims online.&#8221; Interviews with police show that &#8220;most victims are underage adolescents who know they are going to meet adults for sexual encounters.&#8221; This does not imply that such relationships are healthy or safe, nor that we should blame the victims or tolerate the actions of adults who engage in sex with minors. But it does suggest that child safety advocates need to take a more proactive role in helping teens understand the risk of seeking engaging in relationships with adults.</p>
<p>Importantly, the task force found that online risks &#8220;are not radically different in nature or scope than the risks minors have long faced offline, and minors who are most at risk in the offline world continue to be most at risk online.&#8221; For example, &#8220;a poor home environment full of conflict and poor parent-child relationships is correlated with a host of online risks.&#8221;</p>
<p>The attorneys general who called for the task force were anxious for us to study the efficacy of using age verification to help limit inappropriate contact between adults and children online. To help in that job, the task force formed a technical advisory board (TAB) composed of technology experts from Harvard, MIT, Dartmouth, University of Massachusetts, University of Utah, Rochester Institute of Technology, and Bank of America. This board looked at a wide range of technologies including age verification and identity authentication, filtering and auditing, text analysis, and biometrics.</p>
<p>What the TAB found was that age verification technology can be used to identify adults and therefore help prevent minors from engaging in adult-only activities such as accessing adult content or purchasing alcohol or tobacco. There were several technologies submitted by companies that could identify adults based on accessible records such as credit reports, criminal history, and real estate transactions, but these relatively automated systems cannot reliably identify or verify the age of minors because, as the TAB concluded, &#8220;public records of minors range from quite limited to nonexistent.&#8221; Documentation about young people such as birth certificates, passports, and school records are restricted by federal law for some very good privacy and security reasons.</p>
<p>Age verification options presented by some companies would allow parents to request that their child&#8217;s school verify his or her identity and age, but these proposals have their own critics including those who worry about the cost, the possibility of privacy or security leaks, and the financial model presented in some cases that includes providing marketers with information about kids.</p>
<p>The TAB also looked at &#8220;peer-based&#8221; verification schemes that &#8220;allow peers in a community to vote, recommend, or rate whether a person is in an appropriate age group based on relationships and personal knowledge established offline&#8221; but worried that with these methods &#8220;users can vote as many times as they wish to artificially raise or lower a peer rating.&#8221; There were concerns that &#8220;minors might organize against another minor in their ratings or recommendations in an online form of bullying.&#8221;</p>
<p>At one task force meeting, a company presented technology that tries to distinguish between an adult and a child by analyzing the bone density of the person&#8217;s hand. Another tool attempts to identify an individual through facial recognition to match that person against a database of registered sex offenders.</p>
<p>Although the TAB expressed &#8220;cautious optimism&#8221; about the possibility of using technology to protect kids, it concluded that &#8220;every technology has its problems&#8221; and that &#8220;no single technology reviewed could solve every aspect of online safety for minors, or even one aspect of it one hundred percent of the time.&#8221; The bottom line was that &#8220;technology can play a role but cannot be the sole input to improved safety for minors online&#8221; and that &#8220;the most effective technology solution is likely to be a combination of technologies.&#8221;</p>
<p>But even if these technologies can be employed effectively, there remains the question of whether they are necessary or helpful. Using technology to separate kids from grown-ups doesn&#8217;t address the fact that kids are far more at risk from other kids than from adult predators.</p>
<p>Another danger is that age verification or new rules could be used to keep kids off of social networks or require parental consent. But before issuing rules about this, authorities should explore possible unintended consequences such as isolating kids, causing them to go underground, failing to serve kids from dysfunctional families, and preventing kids from accessing vital services such as the Suicide Prevention Hotline or one of the many online self-help groups.</p>
<p>The task force report will have its critics, including possibly some attorneys general and others who feel that it underestimates the risk of online predators. Indeed, sting operations from law enforcement (as well as the TV show <em>To Catch a Predator</em>) demonstrate that there are plenty of adults who, if given the chance, would engage in sex with youth they meet online. But, based on the research presented to the task force, it appears that the vast majority of young people are savvy enough to avoid such encounters.</p>
<p>Still, there remains a minority of youth who&#8211;for a variety of psychological and social reasons&#8211;are vulnerable both online and offline. More research needs to be done to identify these young people and provide them with resources and protective services. The fact that most kids are safe is reassuring but it&#8217;s not sufficient. If even one child is in danger, then there is work to be done, and that is one thing everyone who cares about this issue can agree on.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2009/01/13/net-safety-task-force-says-predation-risk-exagerated/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Guest commentary: Don&#8217;t stop the dialogue!</title>
		<link>http://www.safekids.com/2008/12/31/guest-commentary-dont-stop-the-dialogue/</link>
		<comments>http://www.safekids.com/2008/12/31/guest-commentary-dont-stop-the-dialogue/#comments</comments>
		<pubDate>Wed, 31 Dec 2008 16:25:32 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[child]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[hemanshu nigam]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[myspace]]></category>
		<category><![CDATA[parent]]></category>
		<category><![CDATA[teen]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=168</guid>
		<description><![CDATA[By Hemanshu Nigam It&#8217;s New Year&#8217;s Eve, and your teen is all decked out and ready for a big party. She&#8217;s got her iPhone, BlackBerry, or some other cell phone with a camera in her pocketbook. And she&#8217;s ready to &#8230; <a href="http://www.safekids.com/2008/12/31/guest-commentary-dont-stop-the-dialogue/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>By Hemanshu Nigam</p>
<p>It&#8217;s New Year&#8217;s Eve, and your teen is all decked out and ready for a big party. She&#8217;s got her iPhone, BlackBerry, or some other cell phone with a camera in her pocketbook. And she&#8217;s ready to roll. You&#8217;re glad she&#8217;s got these gadgets so you can get in touch with her. You tell her to call to check in, to let you know she got there safely, to ask for permission to stay later. She agrees. You give her a quick hug and run upstairs to get ready for your own party to celebrate the arrival of a new beginning. You even remember to put the new digital camera you got for Christmas by your purse so you don&#8217;t forget it.<span id="more-168"></span></p>
<p>Of course, you talked to your teen about not drinking, not driving too fast, and not staying out past curfew.</p>
<p>Did you chat with her about all the photos that she and her friends will take with those gadgets? Photos that might have her kissing another girl on a dare, doing a shot with her best (boy)friend, flashing for the camera as the new year rings in.</p>
<p>Did you chat with her about all the photos that she or her friends might want to put up on their MySpace or Facebook page?</p>
<p>Myspace, Facebook? That&#8217;s all that techie stuff the kids do … what will you say, what can you say?</p>
<p>Too often it seems too complicated to talk to your teens about online safety. After all, it&#8217;s the online world and they know it better than you do. But is it? Did you know how a car engine works, what the transmission does, or how an airbag gets deployed when the car bumps something at 30 mph? Yet, you got right in there and taught your teen how to drive. Correction, you taught your teen how to drive safely.</p>
<p>And that is exactly what we&#8217;re talking about – teaching your teen how to drive online safely. You&#8217;ve done it all your life – these lessons on safety. &#8220;Look before you cross, don&#8217;t talk to strangers, respect your friends and neighbors, don&#8217;t go anywhere alone&#8221;.</p>
<p>The world may have changed, but the lessons are still the same. Don&#8217;t stop the dialogue.</p>
<p>Here&#8217;s a way to start an online safety dialogue:</p>
<p>1. Start a Conversation</p>
<p>Talk to your kids about why they use MySpace, how they communicate with others, and how they represent themselves online. Recognize the importance of social networking in their daily lives, similar to that of cell phones, email, or instant messenger, and express an interest in understanding the role it plays.</p>
<p>2. Talk About MySpace and the Internet</p>
<p>* MySpace, like the rest of the online world, is a public space. Members shouldn&#8217;t post anything they wouldn&#8217;t want the world to know (e.g., phone number, address, IM screen name, or specific whereabouts).<br />
* Remind them not to post any photos that could embarrass them in the future or expose them to danger. Although MySpace is public, teens sometimes forget that the information and photos they post are accessible to others. A good way to explain it &#8212; tell your teens they should avoid posting anything they wouldn’t be willing to share in front of a school assembly.</p>
<p>3. Remind Teens to Be Cautious</p>
<p>* Just as in the offline world, people aren&#8217;t always who they say they are. Remind your teens to be careful about adding strangers to their friends list. It&#8217;s fun to connect with new MySpace friends from all over the world, but members should be cautious when communicating with people they don&#8217;t know.<br />
* Encourage teens to be themselves, but to exercise the same basic safety principles they do in the physical world. They wouldn&#8217;t chat with a stranger at the mall or give someone they don&#8217;t know their cell phone number. Remind them that reckless online behavior can be just as dangerous.<br />
* They should talk to you if they want to meet an online friend in person, and if you think its safe, any meeting should take place in public, with friends or a trusted adult present.</p>
<p>Remember, you’re the parent in the offline and online worlds. You can do it.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/12/31/guest-commentary-dont-stop-the-dialogue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Prosecution in teen suicide misguided</title>
		<link>http://www.safekids.com/2008/12/26/prosecution-in-teen-suicide-misguided/</link>
		<comments>http://www.safekids.com/2008/12/26/prosecution-in-teen-suicide-misguided/#comments</comments>
		<pubDate>Fri, 26 Dec 2008 08:46:48 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberbullying]]></category>
		<category><![CDATA[lori drew]]></category>
		<category><![CDATA[megan meier]]></category>
		<category><![CDATA[prosecution]]></category>
		<category><![CDATA[teen]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=166</guid>
		<description><![CDATA[Reposted from San Jose Mercury News December 8, 2008 by Larry Magid What Lori Drew allegedly did to Megan Meier was despicable, but it doesn’t justify her conviction late last month for violating federal laws designed to keep hackers from &#8230; <a href="http://www.safekids.com/2008/12/26/prosecution-in-teen-suicide-misguided/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Reposted from San Jose Mercury News<br />
December 8, 2008</p>
<p>by Larry Magid</p>
<p>What Lori Drew allegedly did to Megan Meier was despicable, but it doesn’t justify her conviction late last month for violating federal laws designed to keep hackers from invading computer networks.<br />
Two years ago, Megan, a 13-year-old Missouri girl, hanged herself after her online friend “Josh Evans,” who had befriended her on MySpace, reportedly told her that he didn’t want to be friends with her and that the world would be better off without her. But Josh was in fact Drew, a 49-year-old mother of one of Megan’s former friends.</p>
<p>According to published reports, Megan had been mean to Drew’s daughter and Josh’s fake online relationship with Megan was a way for Drew to retaliate.<span id="more-166"></span></p>
<p>During the trial in Los Angeles, it was revealed that some entries made by Josh were typed by Ashley Grills, a then-18-year-old employee of Drew who was a witness for the prosecution and was not prosecuted.</p>
<p>The case has widely been characterized as a legal assault on cyberbullying, though it is extremely unusual for an adult to bully a teen. There is no reason to believe that Drew intended for Megan to kill herself, but the case against Drew is frequently cited as a warning to would-be bullies that their actions could bring severe consequences to both their victims and themselves.</p>
<p>From what I can gather, this is a case of a squabble between two 13-year-old girls and a mother who intervened in a terribly immature and inappropriate way. Adults are supposed to help young people peacefully resolve problems, not exacerbate them. This is not so much a case of cyberbullying as a case of bad parental intervention that had tragic consequences.</p>
<p>We need to fight against rude, deceitful and cruel behavior on and off the Internet. But that doesn’t justify a reinterpretation of anti-hacking laws to jail people who misuse Internet services.<br />
The legal theory behind the prosecutor’s case is that Drew violated MySpace’s terms of service that prohibit misrepresenting your identity and harassing others. MySpace rules, which Drew says she hadn’t read, require that “all information you submit is truthful and accurate.” Clearly Drew lied. But so have a lot of other people.</p>
<p>She was prosecuted under Section 1030 of the U.S. Code, which was crafted to protect against unauthorized access to computer networks to cause damage, steal information or money or jeopardize national security. As far as I can tell, the law was not designed to prevent people from lying about their identity or otherwise violating rules on a publicly available online service. But that didn’t stop the jury from convicting Drew of misdemeanor violations. The jury refused to go along with the prosecution’s felony charges.</p>
<p>Based on this case, I’m one of millions of people who might also be guilty of a federal crime. I didn’t harass anyone, but I did violate MySpace’s terms of service by creating several fake identities with a variety of ages to test privacy features for teenagers while I was researching a book about MySpace in 2006.</p>
<p>And what about police officers who pose as teenagers to lure would-be predators? Should they have to request immunity from federal prosecution each time they engage in such a sting operation? I’ve even heard cases of law enforcement people advising kids to lie on their profiles to protect their privacy. Should they be indicted for conspiracy?</p>
<p>There are plenty of adults who lie online about their age. I have a friend who set up a profile on an online dating service using a false age, an old photograph and the exaggerated claim that he was “athletic.” A date might have cause to be disappointed or angry at him, but should she have the right to demand a federal prosecution?</p>
<p>Even Megan, with her mom’s knowledge, lied about her age. She was 13 and, at the time, MySpace required users to be at least 14. MySpace recently started allowing 13-year-olds to sign up.<br />
The usual penalty for violating terms of service is to be kicked off the service. Had MySpace decided to go after Drew in court, it could have done so as a civil matter. But it’s not up to federal prosecutors to take it upon themselves to enforce a company’s online agreement with its members, especially if that company never asked for federal intervention.</p>
<p>I can understand why a jury wanted to punish Drew for what happened to Megan. But it’s not clear to me that putting Drew in prison on a hacking charge will help prevent cyberbullying or future tragedies.</p>
<p>What is needed is an educational campaign that makes bullying or harassing just as unacceptable as racial epithets or subjecting others to secondhand smoke. Cyberbullying is a real problem but it requires serious long-term solutions, not quick fixes and prosecutorial hijinks.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/12/26/prosecution-in-teen-suicide-misguided/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Parents &#8211; keep family PCs secure</title>
		<link>http://www.safekids.com/2008/12/17/parents-keep-family-pcs-secure/</link>
		<comments>http://www.safekids.com/2008/12/17/parents-keep-family-pcs-secure/#comments</comments>
		<pubDate>Thu, 18 Dec 2008 03:13:37 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=160</guid>
		<description><![CDATA[News that Microsoft had to issue an emergency patch to fix a flaw in all versions of Internet Explorer reminds me how important it is for parents to make sure that all the computers in your household have up-to-date anti-malware &#8230; <a href="http://www.safekids.com/2008/12/17/parents-keep-family-pcs-secure/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<div class="entry">
<p>News that Microsoft had to issue <a href="http://news.yahoo.com/s/ap/20081216/ap_on_hi_te/tec_internet_explorer_security;_ylt=AicfrlGEDE_40R4IwKn7f39j24cA" target="_blank">an emergency patch</a> to fix a flaw in all versions of Internet Explorer reminds me how important it is for parents to make sure that all the computers in your household have up-to-date anti-malware software and the latest updates to the operating system.</p>
<p>While Windows PCs seems to attract a lot more attacks than Macs, the Apple Macintosh is not invulnerable to malicious software.  That’s why Apple regularly updates its operating system as does Microsoft — and why some leading security software companies including Symantec and TrendMicro offer Macintosh security software.</p>
<p>The latest threat is a flaw in all versions of Internet Explorer that makes it possible for an attacker to take remote control of your PC, capture user names and passwords and log keystrokes.  All you have to  do to be exposed is to visit an infected ‘Web site, whether it is a site set up by a hacker or even a legitimate site that been injected with the malicious code.  The <a href="http://biz.yahoo.com/ap/081216/tec_internet_explorer_security.html?.v=2" target="_blank">Associated Press reports</a> that “thousands of Web sites already have been compromised by criminals looking to exploit the flaw.” That’s because the flaw was disclosed about a week before Microsoft issued a fix.</p>
<p>Microsoft was expected to release a fix on Wednesday, December 16, which would be automatically applied to any machine that has automated updates turned on.  To be sure, you can manually scan your computer to see if its security fixes are up-to-date by visiting <a href="http://windowsupdate.microsoft.com/" target="_blank">WindowsUpdate.microsoft.com</a>.  For this particular site, you must use Internet Explorer (other browsers such as Google’s Chrome and Mozilla Firefox works with the vast majority of sites but not this one).Speaking of other browsers, only Internet Explorer is affected by this particular flaw but that doesn’t mean that Firefox and Chrome are exempt from other vulnerabilities.</p>
<p>PC security is a cat-and-mouse game. The good guys are always trying to catch up, but, with billions of dollars of ill-gotten gain at stake, the bad guys are always thinking up something new.</p>
<p>And parents, be sure your kids know not to download anything without your permission  — and don’t <em>you</em> download anything unless you know it’s from a reputable site. Even then, make sure you have a good Internet security suite installed and that it’s up-to-date.</div>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/12/17/parents-keep-family-pcs-secure/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Obama raises hopes for online civility</title>
		<link>http://www.safekids.com/2008/11/10/obama-raises-hopes-for-online-civility/</link>
		<comments>http://www.safekids.com/2008/11/10/obama-raises-hopes-for-online-civility/#comments</comments>
		<pubDate>Mon, 10 Nov 2008 17:29:40 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[obama internet safety online cyberbullying palin mccain]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=156</guid>
		<description><![CDATA[As a columnist and radio commentator, I avoided endorsing a candidate in the recent presidential election. But as an Internet safety advocate and co-director of ConnectSafely.org, I have to say how happy I am to see a setback for the &#8230; <a href="http://www.safekids.com/2008/11/10/obama-raises-hopes-for-online-civility/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>As a columnist and radio commentator, I avoided endorsing a candidate in the recent presidential election. But as an Internet safety advocate and co-director of ConnectSafely.org, I have to say how happy I am to see a setback for the politics of fear and rumor mongering.</p>
<p>I say this because over the past year or so, many of us in the Internet safety field have been retooling our messages to focus more on digital citizenship and civility as we realize that the fear of predators has been grossly exaggerated. In terms of numbers, the larger danger to both kids and adults is &#8220;cyberbullying,&#8221; harassment and defamation — often between people who know each other in the real world.</p>
<p>And that&#8217;s exactly what we saw during the campaign: fear mongering and defamation. It was especially sad to see this coming from Sarah Palin, the mother of five children, including three teenagers. Children learn from their parents and other adults including our leaders.<span id="more-156"></span></p>
<p>Palin&#8217;s &#8220;leadership&#8221; during this campaign served as a negative role model, implying that it&#8217;s OK to spread rumors and call people names. While she never said that Obama was a terrorist, she did say he pals around with them. She also called him a &#8220;socialist,&#8221; which gave ammunition to some on talk radio and in the blogosphere to imply that he&#8217;s a &#8220;Marxist&#8221; and &#8220;communist&#8221; and therefore a likely dictator.</p>
<p>It wasn&#8217;t just the presidential campaign that nauseated me. There was the comment by Rep. Michele Bachmann, R-Minn., to MSNBC&#8217;s Chris Matthews implying that some members of Congress are un-American. And who can forget defeated North Carolina Sen. Elizabeth Dole&#8217;s implication that her opponent (a Sunday school teacher) was &#8220;Godless.&#8221;</p>
<p>What happened during the campaign parallels what happens online. Too often, online discourse is not civil. Going back to the late 1980s and early 1990s, we have seen too many &#8220;flame wars,&#8221; in e-mail, on forums and now on social networking sites. People seem to forget that the other people online have the right to be treated respectfully even if they strongly disagree with you.</p>
<p>Several surveys of teenage Web users have found that cyberbullying is a significant problem. Cyberbullying, says Nancy Willard, director of the Center for Safe and Responsible Internet Use, is &#8220;the use of electronic technologies to engage in repeated and/or extensively disseminated acts of cruelty towards others.&#8221;</p>
<p>Willard added that &#8220;it&#8217;s really hard to talk to young people about avoiding harmful and cruel behavior when they are bombarded with political ads with nasty rumors, innuendoes and attacks.&#8221;</p>
<p>The connection between politics and Internet behavior doesn&#8217;t stop at bullying. For the past seven years, the politics of fear has dominated the political landscape. A certain amount of fear is productive if it keeps us from taking unnecessary risks. But when fear becomes pervasive or is based on false information, it can lead us in the wrong direction.</p>
<p>A recent study commissioned by McAfee, an Internet security company, and conducted by Harris Interactive, found that &#8220;about two-thirds of mothers of teens in the United States are just as, or more, concerned about their teenagers&#8217; online safety, such as from threatening e-mails or solicitation by online sexual predators, as they are about drunken driving (62 percent) and experimenting with drugs (65 percent).&#8221; Perhaps these moms aren&#8217;t aware that 6,552 people last year were killed in auto accidents involving young drivers, while there were only a few known cases of teens who were physically harmed by adults they met online.</p>
<p>What the Internet — and indeed, our entire society — needs is greater civility. I&#8217;m hopeful that the Obama administration will encourage a culture of respect in which people engage one another in dialogue rather than name calling. There has been a lot of talk about Obama — as first African-American president — showing young people around the world that artificial barriers can be shattered. But that&#8217;s only one measure of progress. Another measure is a society where everyone — regardless of your appearance, or your sexual, religious or political orientation — can be treated with dignity and respect.</p>
<p>If we can accomplish that, we can easily solve the problems of cyberbullying and Internet harassment.</p>
<p>It&#8217;s a new day.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/11/10/obama-raises-hopes-for-online-civility/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Copying DVDs while protecting kids access</title>
		<link>http://www.safekids.com/2008/09/21/copying-dvds-while-protecting-kids-access/</link>
		<comments>http://www.safekids.com/2008/09/21/copying-dvds-while-protecting-kids-access/#comments</comments>
		<pubDate>Sun, 21 Sep 2008 19:38:17 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[DVD copy protection parents kids]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=154</guid>
		<description><![CDATA[Real Networks, the company behind the popular RealPlayer® and the Rhapsody music service, has just announced RealDVD, a program that lets you &#8220;legally&#8221; save the contents of protected DVDs to a PC hard drive. Once movies have been copied to &#8230; <a href="http://www.safekids.com/2008/09/21/copying-dvds-while-protecting-kids-access/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.realnetworks.com/" target="_blank">Real Networks</a>, the company behind the popular <a href="http://www.real.com/" target="_blank">RealPlayer®</a> and the <a href="http://www.rhapsody.com/home.html" target="_blank">Rhapsody</a> music service, has just announced <a href="http://www.realdvd.com/" target="_blank">RealDVD</a>, a program that lets you &#8220;legally&#8221; save the contents of protected DVDs to a PC hard drive.<br />
Once movies have been copied to your PC, you can restrict access based on the MPAA rating such as PG-13, PG or G.  With the ratings turned on, kids can only watch movies at or below their rating (kids allowed to watch PG-13 could also watch a G movie) but parents can watch whatever they want by entering a password.<br />
This is the first DVD ripping program from a well known U.S. company that can handle protected commercial DVDs.  Hollywood studies put encryption codes on almost all commercial movies to prevent copying and, until now, respected software companies avoided letting people get around those codes.</p>
<p>There have long been workarounds.  For example, DVD X Copy from 321 Studios allowed PC users to make backup copies of DVDs. 321 was sued by the <a href="http://mpaa.org/" target="_blank">Motion Picture Association of America (MPAA)</a> and ultimately closed up shop after its product was found to be in violation of the <a href="http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act" target="_blank">Digital Millennium Copyright Act (DCMA)</a>. Similar programs are still floating aroudnd the Internet. <a href="http://www.pcmag.com/" target="_blank">PC Magazine</a> recently did a <a href="http://www.pcmag.com/article2/0,2704,2330176,00.asp" target="_blank">round-up</a> of DVD ripping programs.<br />
I&#8217;ve been testing a pre-release of RealDVD and it pretty much works as advertised. I copied several movies from my DVD collection to my PC&#8217;s hard drive and, after putting the original DVDs back on my shelf, was able to play the movies on my PC.  By recording to an external drive, I was able to watch the movies on both my desktop and laptop.<br />
For families, having movies on a PC hard drive could be very convenient, especially if you have children who love to watch movies over and over.  By putting them on the drive, your kids don&#8217;t have to fiddle with DVDs and you don&#8217;t have to worry about the discs being damaged. And the ability to restrict kids to certain ratings means that the adults in the family can still have age-appropriate movies in their collection while preventing kids from watching them.</p>
<div class="blogpost-releated-tags"><strong><br />
</strong><a href="http://kids.yahoo.com/parents/blog/tag/intellectual+property"></a></div>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/09/21/copying-dvds-while-protecting-kids-access/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Group wants to ban Google Street View to thwart predators</title>
		<link>http://www.safekids.com/2008/09/11/group-wants-to-ban-google-street-view-to-thwart-predators/</link>
		<comments>http://www.safekids.com/2008/09/11/group-wants-to-ban-google-street-view-to-thwart-predators/#comments</comments>
		<pubDate>Thu, 11 Sep 2008 20:32:43 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=148</guid>
		<description><![CDATA[by Larry Magid Street view of home with bedroom window As if the TV series &#8220;To Catch a Predator&#8221; wasn&#8217;t enough paranoia, now there&#8217;s a campaign to protect our children against predators who use Google Street View. I admit, there &#8230; <a href="http://www.safekids.com/2008/09/11/group-wants-to-ban-google-street-view-to-thwart-predators/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p class="MsoNormal">by Larry Magid</p>
<p><span><span style="font-weight: normal;"><a href="http://pcanswer.com/wp-content/uploads/2008/09/gmaps.jpg"><img class="alignnone size-medium wp-image-328" title="Google street view image of home with bedroom window" src="http://pcanswer.com/wp-content/uploads/2008/09/gmaps-300x198.jpg" alt="" width="300" height="198" /><br />
</a>Street view of home with bedroom window</span></span></p>
<p><span><span style="font-weight: normal;">As if the TV series &#8220;To Catch a Predator&#8221; wasn&#8217;t enough paranoia, now there&#8217;s a campaign to protect our children against predators who use Google Street View.</span></span></p>
<p><span><span style="font-weight: normal;">I admit, there may be some privacy concerns as a result of Google taking pictures of homes and businesses around the country but StopInternetPredators.org’s “campaign to highlight child safety concerns over Google’s ‘Street View’ strikes me as absurd.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">The organization, which is headed by Stacie D. Rumenap, former Deputy Director for the American Conservative Union, argues that Google Street View “can be misused by child predators to target children.”</span><span><span style="font-weight: normal;"> </span></span></span></p>
<p><span><span style="font-weight: normal;">In a video that appears on the site, Rumenap says that it’s “frighteningly simple” for anyone “to find out detailed photographic information about you and your family.”</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">The video and accompanying text make it seems as if Google Street View is a predator’s best friend for targeting children for abuse. </span><span></span><span style="font-weight: normal;">Rumenap calls it “an entirely new threat to our families and children” that “makes it simple to map the most likely route your child walks to school… view entrances to community parks and even find the location of your family’s bedroom windows.”</span><span><span style="font-weight: normal;"> She </span></span><span style="font-weight: normal;">wants people to “urge local leaders to ban Street View in your neighborhood until the technology is safeguarded.”</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">She does, however, admit that “banning Street View </span><em><span style="font-weight: normal;">might</span></em><span style="font-weight: normal;"> not safeguard our children 100% from child predators.”<span id="more-148"></span></span></span></p>
<p><span><span style="font-weight: normal;">I don’t know where to start with this.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">To begin with, Google Street View would be a very inefficient way for a predator to find a child victim.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">It would be much more effective to simply walk or drive around the neighborhood. It’s not as if you need the Internet to find parks, schools and homes where children live and play.</span><span><span style="font-weight: normal;"> There are schools, parks and homes with bedroom windows in just about every neighborhood.  And, statistically, the vast majority of predators know their targets anyway &#8212; in real life, not online.</span></span></span></p>
<p><span><span style="font-weight: normal;">Instead of banning Google Street View, maybe we should put up walls between streets and sidewalks so that predators can’t see children walking home from school. And while we’re at it, let’s ban public outdoor parks and recreation areas or at least find ways to hide the children playing there. Or just keep children away from churches, schools, scouting and other places where pedaphiles have been known to operate.</span></span></p>
<p><span><span style="font-weight: normal;">Second, it completely distorts the way predators operate – at least those who are “successful” in finding actual victims.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">There is plenty of research to show that trolling online for victims is not the way that predators typically find young people to exploit.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">In about 80% of child sexual abuse cases, the victims and the perpetrator know each other in the real world either through family ties, friendships, schools, youth groups and situations that bring kids and adults together.</span><span><span style="font-weight: normal;"> </span></span></span></p>
<p><span><span style="font-weight: normal;">Based on what we know from arrest records, survey research and other data, the actual danger of Internet predators, strangers harming victims that they find online has been greatly exaggerated and this campaign simply adds fuel to that fire.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">If a child is to be harmed online, it is much more likely because of bullying or harassment from a fellow young person, something inappropriate the child posts online or by taking extraordinary risks in a chat room or other public forum. </span></span></p>
<p>If anything, campaigns like this actually increase danger to children by alarming people unnecessarily and distracting us from dealing with real risks.</p>
<p><span><span style="font-weight: normal;">I’m not suggesting that Google Street View doesn’t bring up some privacy concerns. It’s probably a good idea for people to look up their own address just to make sure there’s nothing posted that could be embarrassing or a possible security threat. But finding a serious security risk is pretty unlikely.</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">A Google spokesperson said that “if you are not comfortable with the imagery available on Street View, we have easily accessible tools for flagging sensitive imagery for review and removal.”</span></span></p>
<p><span><span style="font-weight: normal;">And, of course, it’s essential for parents to talk with their children about safety. Adults should study the child safety <a href="http://tinyurl.com/2f4g5x">tips</a> from the National Center for Missing &amp; Exploited Children and remind kids to follow some basic guidelines like “Always check first with a parent, guardian, or trusted adult before going anywhere, accepting anything, or getting into a car with anyone,” “Do not go out alone. Always take a friend with when going places or playing outside” and “Say no if someone tries to touch you, or treats you in a way that makes you feel scared, uncomfortable, or confused. “</span><span><span style="font-weight: normal;"> </span></span><span style="font-weight: normal;">That, along with age appropriate parental supervision, is what will protect our kids – not going ballistic about the </span><em><span style="font-weight: normal;">possible </span></em><span style="font-weight: normal;">safety implications of every new piece of technology that comes our way.</span></span></p>
<p><em><span><span></span><span style="font-weight: normal;">(Disclosure: I serve as co-director of ConnectSafely.org, a non-profit Internet safety organization that receives financial support from several Internet companies, including Google.)</span></span></em></p>
<p><span><span style="font-weight: normal;">© 2008 – Larry Magid</span></span></p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/09/11/group-wants-to-ban-google-street-view-to-thwart-predators/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Twitter and Plurk: What parents should know</title>
		<link>http://www.safekids.com/2008/08/20/twitter-and-plurk-what-parents-should-know/</link>
		<comments>http://www.safekids.com/2008/08/20/twitter-and-plurk-what-parents-should-know/#comments</comments>
		<pubDate>Wed, 20 Aug 2008 23:34:47 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=147</guid>
		<description><![CDATA[by Larry Magid You probably know about social networking sites like MySpace and Facebook and blogging services like Blogger.com and WordPress but have you heard of microblogging? Services like Twitter and Plurk let people post very short messages (140 characters &#8230; <a href="http://www.safekids.com/2008/08/20/twitter-and-plurk-what-parents-should-know/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><span style="width: 350px;">by Larry Magid</p>
<div class="entry">
<p class="MsoNormal" style="margin-right: 3.75pt;">You probably know about social networking sites like <a href="http://www.myspace.com/" target="_blank">MySpace</a> and <a href="http://www.facebook.com/" target="_blank">Facebook</a> and blogging services like <a href="http://www.blogger.com/" target="_blank">Blogger.com</a> and <a href="http://wordpress.com/" target="_blank">WordPress</a> but have you heard of microblogging? <span> </span></p>
<p class="MsoNormal" style="margin-right: 3.75pt;">Services like <a href="http://twitter.com/" target="_blank">Twitter </a>and <a href="http://www.plurk.com/" target="_blank">Plurk</a> let people post very short messages (140 characters or less) to their friends and acquaintances.<span> </span>Founded in 2006, Twitter has attracted millions of users who keep people posted about what they’re doing and thinking. It can be as simple as “I’m standing in line at the grocery store” to as profound as a quick comment about a political candidate, a world event or a new book.<span> </span>There’s even a video spin-off of this concept called <a href="http://www.12seconds.tv/" target="_blank">12 Seconds</a> that allows people to post video clips no longer than 12 seconds.</p>
<p class="MsoNormal" style="margin-right: 3.75pt;"><span>T</span>hese sites aren’t nearly as popular with teens as MySpace and Facebook. Twitter says it’s only for people 18 and up — but it doesn’t ask your age when you set up an account.<span> </span>Plurk is aimed at people 13 and up.</p>
<p class="MsoNormal" style="margin-right: 3.75pt;">While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.</p>
<p class="MsoNormal" style="margin-right: 3.75pt;">By default, Twitter messages can be seen by anyone, so if you want privacy you need to go into Settings and click “Protect my updates” to make sure only people you approve can see what you type.<span> </span>Otherwise anyone can “follow” you and see what you enter. You can always see a list of your followers and block anyone you wish.<span> </span>Likewise, you can only see posts from people you follow and can search for these people by name or location.</p>
<p class="MsoNormal" style="margin-right: 3.75pt;">In some ways, microblogs are like chat rooms. What you type is posted instantaneously and it can be seen by anyone. But it also lingers so people can see it later, even when you’re offline — so always use common sense.</p>
<p class="MsoNormal" style="margin-right: 3.75pt;">I use Twitter but, as with any public forum, I only post information that I’m comfortable anyone knowing. Click here to <a href="http://twitter.com/larrymagid" target="_blank">follow me</a> (twitter.com/larrymagid) on Twitter.</p>
</div>
<p></span></p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/08/20/twitter-and-plurk-what-parents-should-know/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Could your home PC attack the Republic of Georgia?</title>
		<link>http://www.safekids.com/2008/08/19/could-your-home-pc-attack-the-republic-of-georgia/</link>
		<comments>http://www.safekids.com/2008/08/19/could-your-home-pc-attack-the-republic-of-georgia/#comments</comments>
		<pubDate>Tue, 19 Aug 2008 23:08:57 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=146</guid>
		<description><![CDATA[by Larry Magid I think I can say with a great deal of certainty that the overwhelming majority of parents don&#8217;t operate websites based in the Republic of Georgia. And I am also certain that you&#8217;re not malicious hackers. But &#8230; <a href="http://www.safekids.com/2008/08/19/could-your-home-pc-attack-the-republic-of-georgia/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><span style="width: 350px;">by Larry Magid</p>
<p>I think I can say with a great deal of certainty that the overwhelming majority of parents don&#8217;t operate websites based in the <a title="at Yahoo! Kids World Factbook" href="http://kids.yahoo.com/reference/world-factbook/country/gg--Georgia#main" target="_blank">Republic of Georgia</a>. And I am also certain that you&#8217;re not malicious hackers. But before you ignore my story, consider the possibility that the PC in your house could have played a role in taking down the website of the President of Georgia.</p>
<p>Attacks against Georgian government sites, <a href="http://www.nytimes.com/2008/08/13/technology/13cyber.html" target="_blank">according to the New York Times</a>, started &#8220;weeks before physical bombs started falling on Georgia,&#8221; and the Georgian president&#8217;s site was difficult or impossible to access on Tuesday afternoon, even though the site moved from the <em>country</em> of Georgia to an Internet service provider in the <em>state</em> of Georgia in the United States.</p>
<p>&#8220;This is a classic denial of service attack (DOS),&#8221; said Steve Gibson, president of <a href="http://www.grc.com/" target="_blank">Gibson Research</a> and a leading security expert.</p>
<p>In an interview, Gibson said it has all the marks of a &#8220;zombie&#8221; or &#8220;botnet&#8221; type of attack. &#8220;Botnet&#8221; is a hacker term for a network of robots &#8212; machines that are surreptitiously recruited to attack other machines.</p>
<p>&#8220;Essentially what happens,&#8221; explained Gibson, &#8220;is a large number of computers that are under the control of some entities &#8212; presumably someone with a grudge &#8212; can be recast for various purposes.</p>
<p>&#8220;Sometimes they&#8217;re used to generate spam, sometimes to generate fake clicks on advertisements and sometimes they are told to simply flood a site with traffic,&#8221; said Gibson.</p>
<p>These zombie machines can bombard a server with enough requests in a short period of time to simply overwhelm it. It would be like putting thousands of cars on the freeway, making it impossible for normal traffic or emergency vehicles to get through.</p>
<p>Such tactics are sometimes referred to as distributed denial-of-service attacks because the computers used in the attacks are distributed all over the Internet. It&#8217;s often difficult for the attacked machine to distinguish between legitimate requests for service and the bogus request from the zombie machines.</p>
<p>DOS attacks can also be carried out by disrupting configuration data such as routing information so that traffic to a server is re-routed, or simply sent nowhere instead of the server that users are trying to reach.</p>
<p>The machines that wind up carrying out the attack &#8220;are typically owned by regular computer users who have no idea that their machine is now serving two masters,&#8221; said Gibson. &#8220;It&#8217;s serving them, and some remotely located criminal that is able to take the resources of their machine and their Internet connection for some malicious purpose.&#8221;</p>
<p>Malicious software to carry out these attacks can come from websites, via email or as part of spyware people inadvertently download to their computers. Most Internet security programs can protect PCs against being infected by such software, though security is &#8212; and has always been &#8212; a cat and mouse game between the good guys and the bad guys. That means there is always the possibility of botnet software slipping past the defenses of even up-to-date security software.</p>
<p>Still, if you use up-to-date security software, the chances of your machine being infected go way down. Also, security software such as <a href="http://www.symantec.com/norton360/" target="_blank">Symantec&#8217;s Norton 360</a>, <a href="http://us.trendmicro.com/us/products/personal/internet-security-pro/index.html" target="_blank">TrendMicro&#8217;s Internet Security Pro</a>, <a href="http://www.zonealarm.com/store/content/catalog/products/zonealarm_internet_security_suite.jsp?dc=12bms&amp;ctry=US&amp;lang=en" target="_blank">Zone Labs ZoneAlarm Security Suite</a> and <a href="http://usa.kaspersky.com/products_services/internet-security.php" target="_blank">Kaspersky Lab&#8217;s Kaspersky Internet Security</a> all do a good job at repairing infected computers along with preventing infections in the first place.</p>
<p>It&#8217;s also important to be sure that your operating system is up-to-date. For example, <a href="http://www.microsoft.com/protect/computer/updates/bulletins/200808.mspx" target="_blank">Microsoft issued updates</a> Tuesday for various versions of Windows which fixed 26 flaws, including six what were considered critical. These flaws could put your computer at risk of being taken over by a hijacker who could use it for virtually any purpose &#8212; including attacking other computers or web servers.</p>
<p>You can learn more about how hackers can turn your computer into a malicious zombie in my <a href="http://audio.cbsnews.com/2008/08/13/audio4346519.mp3" target="_blank">CBS News podcast discussion</a> with Steve Gibson.</p>
<p></span></p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/08/19/could-your-home-pc-attack-the-republic-of-georgia/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Don&#8217;t let technology separate you in the car</title>
		<link>http://www.safekids.com/2008/07/10/dont-let-technology-separate-you-in-the-car/</link>
		<comments>http://www.safekids.com/2008/07/10/dont-let-technology-separate-you-in-the-car/#comments</comments>
		<pubDate>Thu, 10 Jul 2008 14:51:39 +0000</pubDate>
		<dc:creator>larrymagid</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://safekids.com/?p=142</guid>
		<description><![CDATA[For those who can afford it, it’s nearly time for families to gas up their cars and minivans for summer car trips. When I was a kid, that meant fighting over the car radio, but now there are lots of &#8230; <a href="http://www.safekids.com/2008/07/10/dont-let-technology-separate-you-in-the-car/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p class="MsoNormal">For those who can afford it, it’s nearly time for families to gas up their cars and minivans for summer car trips.<span> </span>When I was a kid, that meant fighting over the car radio, but now there are lots of electronic options available to entertain the family as the miles pass.</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">Many cars these days have DVD screens in the backseat – some have two. And for those who don’t have a DVD player built-in, there’s always the possibility of watching movies on a laptop perched on the backseat.<span> </span></p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">But is keeping kids entertained the whole time really such a good idea?</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">When my kids were young, my wife and I didn’t allow them to watch movies when we took car trips.<span> </span>Patti argued that kids should spend their time looking out the window or engaging in conversation and I agreed.</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">We did allow our kids to listen to music, on CDs or their iPods, but they weren’t allowed to use headphones in the car. Instead, we played the iPod through the car’s audio system so that everyone could share the same music and same experience.</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">For one particularly long trip I created different playlists with the favorite music of various family members.<span> </span>Again, plugging it into the car stereo, we took turns listening to each other’s music. The whole idea of the car trip was to be together as a family and not have anyone isolate themselves with their earbuds.</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">Sharing music had its advantages and difficult moments. I’ll never forget when our 15-year-old daughter brought home one of rap artist Eminem&#8217;s CDs with some pretty disturbing lyrics.<span> </span>We didn’t ban the music but played it through the audio system for all to “enjoy.” Actually, I did like his voice and beat, but Patti and I objected to the way he objectified women and to some of his more explicit language.<span> </span>But rather than turning it off, we turned it into a teachable moment, asking our daughter what she found appealing about the songs and pointing out what we considered objectionable.</p>
<p class="MsoNormal">
<p class="MsoNormal">
<p class="MsoNormal">I remember one particular discussion about the “B Word” – the one that likens a human female to a female dog.<span> </span>My daughter thought it was fine, but we disagreed.<span> </span>Years later, she came around to our way of thinking, which goes to show that sometimes you do have an impact, even when you don’t see it in the moment!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.safekids.com/2008/07/10/dont-let-technology-separate-you-in-the-car/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Dynamic page generated in 2.248 seconds. -->
<!-- Cached page generated by WP-Super-Cache on 2013-05-06 04:34:28 -->