Category Archives: User Help

How to protect your children from the Internet

In this article I will talk about steps you can take to prevent your children from falling foul of the many dangers of the Internet. If you are inexperienced with a computer it can be a challenge to understand the potential risks involved. the first step is understanding what can be done and this is what I will try to explain below. It does not go into great detail but will hopefully give you enough information to help you get started.

The Internet is an important part of modern life and can be a great source of knowledge for your childrens school work and hobbies.There are a unique set of dangers to the younger generation and as a parent with limited computer knowlege you may find your children are better than you at finding their way around a computer than you are. Children often use the Internet for school homework, chatting to their friends and of course games.

I’ll start by listing the common dangers that your children may be exposed to on the Internet:

Grooming- A term applied to somebody (usually adult) making friends with your child online in an effort to arrange a real life meeting or to encourage them into illegal acts for their own self gratification.

Bullying and Intimidation- In my days any bullying and intimidation ended when you got home from school. Today children have access to their social groups 24 hours a day via PCs or their smartphones. Don’t underestimate how badly threats and intimidation can affect a child.

Pornography- It’s been around as long as the internet has. There is quite a bit you can do to prevent your child from finding this sort of material on the Internet, however it’s not a 100% fix. The best strategy is to monitor your childs computer or computer account and use some software to restrict where your child goes on the Internet. If you let them know you are doing this it will discourage them from any curiosity based activity.

Malware- In my experience children have a habit of trusting all software on the Internet and they are prone to downloading games or programs that are infected with Malware. Your anti-virus software may miss this sort of infection but you’ll soon know about it as the PC will start having problems such as slowing down or pop-up messages appearing.

Inapproriate content in games – It’s worth keeping an eye on the games your children are playing, especially if they are younger. With the modern graphics capabilities of most PCs animated scenes that include violence and sexual content can look very realistic. You child may be loaned an inappropriate game from a friend, or download one from the Internet. Most games that include violence and sexual content will have an age restriction much like you get for films, however a lot of them have free ‘try before you buy’ downloads that include a small portion of the game to encourage a purchase.

I’ve provided few tips to help you protect you children on the Internet below- If you are an inexperienced user you may need help in setting these up

Set the house rules – Set ground rules about use of the internet, email and texts. They should learn to take responsibility for their own actions and develop their own judgement.

  • Make children aware that online contacts may not be who they say they are. They should only be chatting to friends in chat programs. If they have a facebook page there are settings that can be changed to limit who sees their posts. For more information on Facebook settings look here.
  • Children must keep personal details private. Encourage them to avoid providing personal information such as home address, date of birth and school
  • Ensure that they use a family email address when filling in online forms. Providing their email address when signing up to things online can lead to it being added to mailing lists for inappropriate emails. the whole family can use the family email address to sign up to things enabling you to monitor and control what they are subscriling to and prevent their email address from getting unwanted emails (spam)
  • They must never meet unsupervised with anyone they have contacted via the internet. I don’t think I need to explain the dangers of this but if the online friend is genuine it would be a shame to prevent a genuine friendship from developing in the real world. Just make sure you organise, control and chaperone the first meeting somewhere in a public place. Don’t provide any personal information such as your home address until you are comfortable with the new friend
  • Encourage your children to report concerns about conversations, messages and behaviours to you or another known and trusted adult. Encourage them to share their internet experience with you and make it a shared family experience.
  • Ask your children to report bullying online, by text or phone immediately to you or another trusted adult.
  • Finally threatening you child with the confiscation of their phone/computer if they do something wrong could be counter productive. I am not here to tell you how to bring up your children but punative measures like these may encourage your child to try to conceal any problems they are having.

Set up another Login for them on your PC – Windows has the facility to have different ‘profiles’ for each person who uses the computer. The profile is selected by the person using it when Windows starts up. If you have more than one profile Windows will stop during start up and ask you which profile you want to use to login. You will be asked to enter the password and then the profile you selected will load. Each profile can has different desktop backgrounds and their own unique email, documents, internet favourites and pictures folders. You can also set the security level of each profile to restrict what it can do. For instance you could set your sons profile so it cannot install any software onto the PC. When he has some software he wants to install he would have to ask you to login using your profile and install it for him to use in his. this allows you check the software is appropriate for him. It’s important that you keep your (administrators) profile password secret.

Set up an appropriate Internet Search Engine on their web browser – You can set up their Internet browser (such as Internet Explorer) with child friendly Internet search engine on it’s start page. These search engines will not return any results that are not suitable for children. Google have an information page to help you set up their ‘Safe Search’ that will filter out any unwanted results. Click on this link for more information.

Set up the built in Windows parental controls – Windows has some useful features that can help protect your children while on their PC. The features available to you will depend on which version of Windows you have. For example Windows 7 can do the following:

  • Set specific time limits on your children’s computer use. You can set time limits to control when children are allowed to log on to the computer. Time limits prevent children from logging on during specified hours. You can set different logon hours for every day of the week. If they’re logged on when their allotted time ends, they’ll be automatically logged off. For more information, see read the section about controlling when children can use the computer.
    • Prevent your children from playing games you don’t want them to play. Control access to games, choose an age-rating level, choose the types of content you want to block, and decide whether you want to allow or block specific games. For more information, see Choose which games children can play.
    • Keep your children from running specific programs. Prevent children from running programs that you don’t want them to run. For more information, see Prevent children from using specific programs.

    For more information on how to set this up Microsoft have a training video click here
    Install some parental control software

    Although Windows has some pretty good parental control there are some software companies that provide a more complete product. These focus on stopping your child ending up at inappropriate websites. I would recommend K9 Web Protection which gives you excellent control of you childrens Internet activities and when combined with Windows Parental control features provides a comprehensive set of restrictions to control how your childrens computer activities.
    Participate in their Web Browsing

    Spend some time with your children while they are on the Internet and coach them on what to do if something inappropriate happens when they are online. Talk through each of the dangers described at the beginning of this article.

    Nickris Ltd. would be delighted to visit you in your home and set up parental controls for you, train you how to use and monitor them. Our security engineer has previously been CRB checked and has government security clearance and is happy to provide documentation to support this. You can find our contact details here.

  • Some advice to help you protect yourself on your PC

    Some advice to help you protect yourself on your PC

    In this article I will give you a few tips to help reduce the chances of you becoming a victim of the Internets dangers. I’ve been a victim of fraud once and if you follow these tips it should greatly reduce the chance of you joining me.

    Personal Security

    Identity theft is a big risk in this day an age. A simple definition of identity theft is somebody using your personal information to complete a transaction you have not authorised. For an indivivual to steal your identity they need very little information. You should make sure you are very careful with the following information:

    Full Name:  Don’t use your full name unless needed. Abbreviate your name for example Alex instead of Alexander.

    Date of Birth:  Don’t use your exact date of birth. Some websites will ask for this but it’s generally to verify your age so use the same year and change the month and day. It’s worth having a ficticious date of birth that you can remember as sometimes websites will ask for this information to allow you to log in when you have forgotten your password.

    Bank Details:  The only two people who you should trust with you bank account number and sort code is you and your bank. I would reccomend that you use Paypal or a credit card  for any online transaction. Both of these will refund any money lost due to fraud (eventually). It’s a good idea to read the small print on the credit card contract to see how they deal with Internet fraud. Remember every time you use a card online you are giving details to a third party, and if they are compromised or unscrupulous you could compromise your credit card details. Don’t use your current account details on unrecognised sites as reclaiming money from any fraud can take some time and if your current account is emptied (as mine was once) it can cause embarresment at the supermarket!

    Credit/debit card PIN Number: This is the number you have to type to withdraw money from a cashpoint. There’s only one person who should know it. YOU! If the bank proves you told a third party your PIN you will be liable for any fruadulent transactions on you card.

    Any other personal Information: The first tip is not to give any more information than is required. When you submit personal information online some of it will not be mandatory. Typically mandatory information will have a symbol next to it. Only fill these ones in and don’t fill them in if you are not confident about the website. If I am unsure of a website will NEVER give them any information about me.

    Passwords: This is an important one. Many people have their online accounts broken into because they use weak passwords. I will give you a few tips to help you make sure you don’t fall foul of this:

    Don’t use the same password for all of your online logins. We all have problems remembering passwords but the best trick is to have three you use. One password for secure sites you trust like your bank, your supermarket and your paypal account. Another for you Email, Facebook, and Skype accounts and the last password for untrusted accounts on the Internet such as message forums for your personal hobbies. These 3 catagories of passwords allow you to separate the most critical accounts form the least. If one of your personal hobby accounts (with weaker security) has a security breach and your password is compromised then it will not have devastating consequences for you.

    In each of these three passwords use UPPER and lower case, numbers and special characters such as !”£$%^&*(). The reason you should do this is that hackers will often use something called a ‘bot’. This is a program that will try to break into your account by rapidly bombarding your login trying random passwords. If you use characters outside the 27 letters of the alphabet you are decreasing the chance of one of these ‘bots’ from guessing your password on a massive level. I won’t go into the figures but a random selection of upper and lower case characters and special characters makes a password very difficult to discover even with a ‘bot’.

    While we are on the subject of the passwords avoid using something that is easy to guess- Your surname, name, or any other word in the dictionary are not a good idea. If you have to use a word in the dictionary the substititue letters with numbers- For example use a zero instead of an ‘o’, a one instead of an ‘i’ or a three instead of an e. The number looks similar to the letter so it’s easy to remember and will work in your favour.

    One last note on passwords: It’s worth being organised with them. If you are busy on the Internet you may sign up to a number of sites in the period of a month. Every time you do make a note of your login and password in a notebook . Resist the temptation to save the details on your copmuter unless you know how to encrypt file or you will be up shit creek without a paddle if somebody gets hold of it. You will need to record the website, username and password for each site you set up an account on and for gods sake don’t lose it! The benefit of this that if somebody manages to guess your password on any site (unlikely if you follow my guidelines above)  you will have a list to refer to that confirm all the other sites that use the same password and change them, making it much easier to prevent the damage from spreading. Look after this password book like you would your passport.

    Emails:

    Sender fraud: The best way for me to start this section is to say it’s shockingly easy to send an email and make it look like its from a freind of yours. Don’t assume an email from somebody you know is actually from them. Based on this be very cautious about opening  any attachment even if it is from a friend. Viruses can be sent in email attachments and this is the most common way of getting one. If your anti-virus software is capable of scanning emails then the chances are it will detect it, but if you are in doubt don’t open the attachment. If you read the email but leave the attachment alone it won’t infect your computer.

    Email attachments: I covered this in the last paragraph but it’s worth expanding on the information. A lot of files can carry a ‘Trojan’ virus.  A simple explanation is a file that looks perfectly benign such as a word document, a spreadsheet or even a website link but contains a program that will make you wonder what was wrong with posting letters instead. If you are not expecting an attachment from a friend then don’t trust it. Even if you are expecting something it could still be infected with a virus without your friend being aware. The only way to protect yourself from this is to make sure your Anti-Virus software checks emails as you recieve them.


    Phishing
    : I will go into more details of this in another article, but this is the term given to any email ‘fishing’ for an inexperienced or trusting indvidual with the motive of getting them to part with their hard earned money. The simple rule on the Internet is not to trust anything that sounds too good to be true. If it’s a Nigerian company owner who wants to pay you for receiving millions of pounds in your bank account the only thing they are after is your bank details and if you trust them enough some money to initiate the transaction. Needless to say you will fill foul of this. It’s worth realising what Phishers are looking for. These days it’s personal information. Don’t break the personal information rules I explained earlier. There is only one person that needs to know your bank account, sort code and pin number: YOU!

    Websites

    This subject is a bit tricky. There are good websites and there are bad ones. If you trust none of them then you may as well give up with the Internet. You should be pretty confident that a recognised company has a safe website such as Sainsburys, Tescos, Waitrose, Paypal, Barclays etc, etc, but when you are on a site that does not have a high street presence then you need to be aware of the dangers. The main dangers are phishing and viruses. As discussed in the previous section phishing is an attempt to steal enough of your personal information to use your identity to make a purchase or transaction in your name. Some websites set themselves up to look like a legitimate one, for example to look like your bank. In this case when you enter your online banking details on the fake website it will record them allowing somebody to use them to log into your bank account and empty it. Other websites will ask you to install a program to allow you to access part of the site or play a movie. Some of these programs will be viruses so if you are in any doubt then close the window asking you to install this program and close your Internet window.

    Purchasing online

    There are dishonest traders on the Internet. If you make purchases on the Internet then you may fall foul of this. First you need to understand what the cons are. The dishonest website will have one or more of these objectives:

    Steal your credit/debit card details- Instead of supplying goods they use the credit card information you typed in to make fraudulent purchases. The best way you can protect yourself is to make sure the credit card you use is protected against Internet Fraud. I’d even suggest having a credit card you use for Internet transactions and nothing else. Print all your Internet transactions and keep them in a file. If you start getting fraudulent transactions on your credit card and you’ve followed my advice you can provide the credit card company printed documentation of all transactions and more importantly if that credit card has only been used on the Internet then one of those transactions is very likely to be responsible for stealing your card details. I would advise you never use your current account debit card on the Internet. The chaos caused by a fraudster emptying you current account is just not worth the risk. Best of all set up a paypal account. PayPal is a global e-commerce business allowing payments and money transfers to be made through the Internet. Using Paypal prevents you having to give your credit card details to somebody you don’t trust and they will act as a middle-man in any transaction. If you don’t get the goods you purchased then Paypal will own the debt and repay your money.

    Gather other personal information/Identity theft- When you make the purchase they will ask for a uneccesary personal information such as your date of birth. If they are asking for uneccesary information to make the purchase you should’nt trust them. Refer to the section about personal security above.

    Have no intention of supplying the goods- You buy the goods, they take the money and run. Some Credit cards will cover you for this and so will Paypal. If they do this they will probably try to use your card details fraudulently. Inform your credit card immediately if this happens, and avoid purchasing anything from an untrusted seller that are suggesting delivery times of over two weeks. The longer you have to wait before reporting the fraud the more explaining you will have to do. Another point to consider is that it is common trick for frausters is give a long delivery time allowing them to remain in operation for longer before they are discovered and shut down.

    Nickris Ltd. can help you by providing one to one coaching sessions in the comfort of your own home. We can help you feel more confident on the Internet and help identify potential risks. We will tailor coaching to your requirements in easy to understand language. You can find our contact detailshere.

    Malware? Spyware? Rootkits? What does this all mean?

    Malware? Spyware? Rootkits? What does this all mean?

    For those of you who use your PC as a tool to read email, look at the Internet and write a few letters all the terminology that comes out of the computer industry can be confusing. I’ll try to explain what each of the common terms mean in understandable language.


    Malware

    A generic term given to any computer program with undesirable consequences. Viruses, Spyware and Rootkits are all Malware.


    Virus

    Most people know what these are. This term is given to a malicous program that infects a machine without the user being aware of it. It is capable of reproducing itself and infecting other computers. Viruses typically have a number of purposes:

    Hijack

    They may allow somebody to use your PC from another location for illegal activites by hijacking it. You will not realise they are doing it but may notice the Internet and PC are running slowly.

    Malicous attack

    These type of viruses are designed to make your PC unusable. They will do this by damaging important files needed for your computer to start up and operate. This type of virus is not so common as most are designed to give the virus author some financial benefit.

    Malware can infect your PC in a number of ways. Some of the most common are:

    Email attachments

    The virus can be hidden in an email attachment. It could be a Word document, a spreadsheet a link to a website or a program. It’s worth considering that
    some viruses use emails to infect other computers and can do this without the knowledge of the person who has the virus. Therefore you should treat all email attachments of these types with caution, even it is from a friend. Most anti-virus software has the capability of scanning emails when you use some of the common email programs such as Microsoft Outlook and Windows Mail.

    Websites

    Some websites can infect your PC with a virus. If a website asks you to install something on your PC be suspicious. Be careful what buttons you click on when you are on an unfamiliar website. Some anti-virus software and internet browsers will warn you if the site you attempting to go to is known to pass on viruses. Ignore any warnings your internet browser give you at your peril.

    Worms

    Viruses can infect your machine via your internet connection without you doing anything at all. They find your machine on the internet by scanning for machines
    then launching an attack. If your PC gets hijacked (explained above) it may be used to infect other unsuspecting Internet users using a worm program. A good firewall will prevent most worms from getting on to your PC. If you have a broadband router (the box of tricks that connects you to the Internet) it will have a built in firewall that will also help. It’s also worth making sure your are up to date with your Windows updates. These are usually downloaded automatically and you will know when you have outstanding ones as it will ask you to install them when you shut down your PC. These updates can be correct problems with Windows that worms can take advantage of to get onto your PC.

    Rootkits

    A Rootkit is probably the worst type of Malware you can have infect your PC. It uses your computers admistrator access to dig itself deep into your computers software and hides iteslf. It will work in such a way that makes it very difficult for a conventional anti-virus program to detect it and even more difficult to remove. In a lot of cases the easiest way to remove a rootkit from your PC is to take your hard disk out and attach it to another PC. The other PC will not be infected with the rootkit and as none of the rootkits trickery is running so it can be identified and removed. In some cases removing the Rootkit using this method can damage Windows on the disk it was infecting, which will need to be re-installed or repaired. For the average user a Rootkit is something that needs to be looked at by a professional, or you could of course back up your emails, photos, documents etc and re-install Windows with the discs you got with your PC when you purchased it. Rootkits can infect your PCs in the same way viruses do. Many of them open a ‘backdoor’ to your computer. A backdoor on your PC allows somebody
    with knowledge to gain access to your PC bypassing any security measures you have on your PC. This backdoor will be used to install more and more Malware onto your PC until it eventually becomes unuasable. Look at the next article Some simple advice to help you protect yourself on your PC and if you follow thes guidelines you will reduce the chances of getting one of these dramatically.

    Spyware

    Spyware is a type of malware installed on computers that collects information about users without their knowledge. Spyware is a type of malware  installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. While the term spyware suggests software that monitors a user’s computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in Internet browser settings, or changes to software settings.

    Ransomware

    Ransomware is a type of Malware that infects your PC and prevents you from using it. Often they will inform you that more hard disk is failing, you have viruses or there’s even one that tells you the police are on to you beacuse of pirated software or child pornography. In all of these cases they will prevent you from using your PC and ask you for money to remove allow you to continue. Needless to say you should not pay them. You will probably need to seek help to remove them as they use some of the same clever tricks that are used by Rootkits that make them difficult for Anti-virus software to remove them.

    Adware

    Adware is more of an annoyance than a problem. Adware is the term given to programs designed to advertise products and services to you on your PC using pop-up windows. Typically you’ll get Adware on your PC when you install free games or other software. The author of the software is getting their income from the Adware as each time somebody buys from one of these advertisments they will get commission. Many of these programs will tell you that they will include Adware
    when you install them. Some even give you the opportunity install without the Adware. If Adware is unacceptable to you then be careful where you download free
    software from. There are two software sharing websites I use that check all the products they offer are free of Adware and Viruses.www.download.com and www.tucows.com  .

    If you are having any Malware problems Nickris Ltd. can visit you in your own home and help you clean up your PC. In some cases it may require the computer to be taken back to our workshop as the scanning processes needed to remove infections can take a long time to run. You can find our contact details here.