Driver would not survive a rollback to an earlier Ghost or True Image of the C partition
If you can't keep someone from doing that, you have more problems. I think at that point, my son would no longer have a PC.
by Scully 34 Replies latest social family
Driver would not survive a rollback to an earlier Ghost or True Image of the C partition
If you can't keep someone from doing that, you have more problems. I think at that point, my son would no longer have a PC.
Depending on the version of windows you're using, you can create a separate, non administrative account for each kid. You can set a time when each person's account will automatically be logged off. You can use group policies to prevent msn messenger from launching. You can install a keylogger to monitor everything they do. You can install a high end firewall.
The key is, how technical do you want to get to address a symptom?
W
First off, I would suggest creating different login profiles for your children, then install a program such as CyberPatrol. That's an easy step.
It's like locking your front door. It is easily defeated, but serves as a deterrent to temptation.
If you really want to lock it down like fort knox, enable the guest account and only let him use that.
Keep a password on any account with administrator access.
Disable the floppy drive and cd/dvd drives in the bios
password protect the bios
There's still ways around it, but at this point you need to start appreciating your child's knack for computers and start directing them to a career in IT. They make good money. :)
If you can't keep someone from doing that, you have more problems. I think at that point, my son would no longer have a PC.
LOL. I didn't mean to sound like I was dissing your idea.
Like I said, a lot depends on the level of computer expertise you're trying to control. If you're the proud parent of a teen in the 15 - 17 range who is planning on pursuing a career in computers, you would be hard put to prevent it what I described, short of never leaving the child alone with the computer. (Assuming the child was determined to defy you.) A rollback only takes minutes, and no passwords are required (Depending on the version of Ghost or ATI you're using)
But that's really killing a fly with a shotgun. (And 99.9% of people don't keep Ghosts of the family computer anyhow...) There are more elegant solutions that leave less of a footprint. The circumvention method du jour today is booting an alternate OS off of a large flash drive. Again, short of never leaving the child alone with the computer, there's nothing you can do to stop it if the computer is capable of booting from a USB device. Linux distributions are free and your child can borrow a drive from a friend if you confiscate theirs. You can password protect the BIOS to force the boot order, or to disable the USB boot option (Assuming your BIOS gives you that choice) but again, that's easily defeated.
I'm not saying any of this to imply that we should throw up our hands and quit. I'm just pointing out that most of the parental controls out there are little more than "feel good" gimmicks.
cut their little hands off...
Ok, really get netnanny or some other parental control software.
If you can't keep someone from doing that, you have more problems. I think at that point, my son would no longer have a PC.LOL. I didn't mean to sound like I was dissing your idea.
LOL. And I didn't mean "you" singular, but plural... damned intarweb chat thingies...
I'm not saying any of this to imply that we should throw up our hands and quit. I'm just pointing out that most of the parental controls out there are little more than "feel good" gimmicks.
I think that is true in many cases. True, absolute security is impossible. The best one can do is try to reduce the probability of a security breach to a manageable risk.
A multi-tiered setup is the best if you've got a really savvy kid on your hands. Even then...
Two words you need to know Kim Komando.
Two words you need to know Kim Komando.
Yes, God bless Kim (Barry Young and Ian too.....)
Take the typical home network topology for example:
Cable/DSL Modem ----> Router ----> Desktop(s) and Laptop(s)
The gateway here is the router itself and the computers are all peers. While some home type routers do allow you to create blocklists and shut down ports used by IM software, most don't.
Just want to let you know that the Linksys routers (among others, but I mention them because a lot of people, including me have them), come with a decent OS that can do quite a bit. The cool thing about them is that you can flash the router with a new, free, OS (not from Linksys) and turn that $50 router into a $1000 low end commercial equivalant capable of filtering, blocking, restricting times, etc. My router is a beast right now. I don't need it to do all that stuff, but I can.
This just happened today: my oldest boy sneaking into our office getting on his dad's mac googles something and gets freaked out. Comes downstairs looking like a ghost tells me he just saw something scary. I ask him what? Takes him a few minutes and by the time he gets it out he's in tears. Tells me he's just seen a breast with multipule holes around the nipple area. I had to send the boy outside, told him to do something to take his mind off of it. He comes back inside still in tears he can't stop thinking about it but by that time I had already found the picture on a site that showed it was a fake, a hoax that has been seen out on the net of a breast with a lotus pod superimposed on top. So I told him it was a fake it's not real, explained what it really was, told him to stay out of the office (it was locked but he knows where the key is) and off the net unless he asks me. *sigh* The kid is still getting goosebumps just thinking about it.
Here's the link if you want to take a peek, it's not so bad when you know it's a fake: http://urbanlegends.about.com/library/bl_breast_larvae.htm
Josie