Monday, June 9, 2008

Cyber Sentinel

Pros: Installation was easy, fast and did not require a reboot. Cyber Sentinel integrates with your Windows user accounts. Unique Screen Capture feature, allows administrators to view exactly what the user was viewing during the violation.

Cons:
No password recovery (warning: don't forget it.) Easily bypassed and removed. Email notifications require SMTP server (doesn't work for basic yahoo and hotmail accounts). Interface is not intuitive and can be confusing. Limited user profile customization. Extremely easy to bypass.

Summary
Cyber Sentinel’s Internet filter had several great features including: screen captures, time restrictions, application blocking and windows user integration. It was not the most intutive and somewhat confusing to use.
Cyber Sentinel blocked only 20% of the objectionable websites tested and Over-blocked on 40% of the “safe” websites tested.
The reporting/monitoring tools are very basic and need a lot of work. Although the product has no password recovery Cyber Sentinel is extremely easy to bypass and remove.

Installation/Setup
Cyber Patrol Installation ScreenshotCyber Sentinel 3.4 was very easy to download and install. With a footprint of 18.9MB it took several minutes to download on a Broadband connection (May take 20-30 minutes on dial-up).

Cyber Patrol Setup Screenshot
You are prompted to create an Administrator's password (don't forget this, there is no password recovery) and to enter your license key. Cyber Sentinel comes preconfigured to filter with its default settings and will automatically detect the windows user accounts.


Management
Cyber Patrol Management ScreenshotCyber Sentinel automaticaly creates a default group adding all of your windows user accounts with default settings. You can access the main console from your Start menu or by clicking the Cyber Sentinel icon in your system tray (beside your computer clock). The main console is not very user friendly or intuitive.

cyber patrol Reporting screen shots
From the Main Console Administrators can view screen captures, see a list of blocked websites, view chat conversation details, configure your filter mode, manage time restrictions, create a custom list of objectionalbe words and websites, set-up email notifications and manage user profiles.


Accuracy
cyber patrol user profilesCyber Sentinel filters based on two lists of words and phrases: One is a built-in Library of objectionable words and the other a Child Predator Library. You have the choice to me "More" or "Less restrictive", create your own library of words, warn users of potentialy objectionable websites, close the browser, create a screen caputure and/or to secretly monitor online activity (stealth mode).

We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc…

iShield

Pros: iShield was very easy to install and requires no configuration. Easy to manage and configure. Ability to create a personal list of allowed or objectionable websites. Can be used to block objectionable websites/images, warn or to monitor internet activity.

Cons:
Limited features, functionality and customization. No multiple user customization. Very limited feature set: No p2p, chat, newsgroup blocking. Reporting is very limited. Images and websites will sometimes load before iShield can detect and block them. Can slow computer performance.

Summary

iShield was the only product we tested that could block specific images, although it would usualy display the image before it would accuratly block it. iShield's more notable features include giving administrators the ability to create a list of allowable and objectionable websites, create a custom image and/or monitor internet activity.

iShield however was lacking in other areas including: No custom user profiles, very limited reporting abilities, no application blocking or filtering, and many more.

Overall iShield was simple to use and easy to manage. It correctly blocked only 35% of the pornographic websites/images visited but only overblocked on 25%.

Installation/Setup
Cyber Patrol Installation ScreenshotiShield was very easy to download and install. With a footprint of 4.05MB it took about a minute to download with a Broadband connection (May take 2-3 minutes on dial-up). Installation is simple and requires no configuration or restart, you will be required to close your Internet browser before iShield can take effect.

Cyber Patrol Setup Screenshot
Once installation has completed you are asked to enter your registration number, email address, and to create a password. iShield will begin filtering websites with its default settings and no further configuration is required.


Management
Cyber Patrol Management ScreenshotiShield gives administrators the ability to change your password, adjust filter sensetivity, change detection mode (block, warn, monitor), create a list of allowed and/or objectionable websites and view internet activity reports. All settings are applied to the computer and are not user specific.

iShield Reporting screen shotsiShield's reporting tool will show website blocked and the Date/Time the website was visited. From here you can open the blocked website, delete the record, and add it to the "Black" or "White" list. In addition to the above mentioned iShile also allows you to replace iShield's default blocked image with any image saved on your hard-drive (jpeg, gif, png, bmp).


Accuracy
iShield user profilesAdministrators are given the choice to Block objectionable websites (redirect), Warn users of objectionable websites, or to monitor website activity. iShield's sensitivity can be adujsted to be Safe, Safer or Safest.

With iShield we test 2 different lists of websits including: adult image searches, MySpace.com accounts, lingere, swimsuits, toys, cars, etc…

Web Watcher

Pros: WebWatcher was easy to install and makes it even easier by scanning your computer for known incompatibilities. Remote administration (manage WebWatcher from any internet connection), Screen captures, keystroke logging, and email monitoring.

Cons:
Filtering is not enabled by default and requires some setup. Can slow computer performance, easily removed, no multiple user customization, and poor Internet filtering capabilities (black list only).

Summary
WebWatcher was one of the most robust monitoring tools we reviewed. It allows administrators to monitor email, chat, keystrokes, and websites. All settings and reports are viewed via WebWatcher’s remote website allowing administrators to manage from virtually any Internet connection.

Although you cannot create multiple user profiles and its Internet filtering capabilities are not the most robust, you can create a list of websites or keywords to block on. WebWatcher can be uninstalled easily as it is not password protected. In fact some anti-spyware products will detect it and easily remove it from your computer.

Installation/Setup
Cyber Patrol Installation ScreenshotWebWatcher was very easy to download and install. With a footprint of 2.53MB it took less than a minute to download with a Broadband connection (May take 2-3 minutes on dial-up). Also, WebWatcher will automatically scan your computer for known compatibility issues.

Cyber Patrol Setup Screenshot
You are then prompted to enter your username and password. Once entered installation will smoothly complete. It is not necessary but recommended that you restart your computer. You are then notified with a message that you can manage your settings by logging-in at www.webwatcherdata.com.

Management
Cyber Patrol Management ScreenshotWebWatcher is set to monitor email, chat, keystrokes, websites, and capture screenshots by default. It is not however, set to block objectionable websites by default. WebWatcher is ideal as a monitoring tool but not as an Internet filter. Its filtering settings permit customization for only a single user but do allow you to block on keywords and/or websites.

Web Watcher Reporting screen shotsIn addition to monitoring email (web-based and outlook), chat conversations, keystrokes, and websites visited WebWatcher also has a unique alert feature that will take a picture of the screen when specific words are typed or viewed (user specified). It remains hidden while monitoring but can easily be detected and removed with most anti-spyware utilities.

Accuracy
Web Watcher user profilesWebWatcher comes with a small list of websites and keywords composed of such categories as: Adult, Cheating, Employment, Gambling, Profanity, Sexual, Violence, Drugs, Dating, and Children. Administrators can add and remove websites and keywords as they see fit.

We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc…

Wednesday, May 7, 2008

CyberSitter Review

Price
$39.95 (subscription)

Trials & Specials
  • Free 10-day Trial

  • Pros: CyberSitter was easy to install and leaves very little trace of itself. After installation you can scan your computer for objectionable files. Easy to manage. If you purchase the SnoopStick you can monitor your account from any Internet connection. Custom word, phrase, and website blocking. Includes Email filtering and the ability to block file sharing.

    Cons:
    Computer scan is inaccurate (lots of false positives). Uninstall is not the most user friendly. Additional costs for the SnoopStick (some Internet filters provide the same service for free). Can slow computer performance, no multiple user customization, daily email of reports are difficult to configure (good luck with msn or yahoo).

    Summary
    CyberSitter is noted for its simplicity in design, unique feature set and ease of use. Some of CyberSitter's unique features include: Scanning your hard disk for objectionable material and a SnoopStick to monitor your computer from any Internet connection (for an additional cost).

    CyberSitter however was lacking in other areas including: No custom user profiles, limited reports, no immediately override of blocked websites, and poor customer support. Be advised that you will be charged an addition $10 to reset your password.

    Overall CyberSitter's Internet filter was simple to use and easy to manage. Overblocking was not a problem, but it did underblock a little more than it should have.

    Installation/Setup
    Cyber Patrol Installation ScreenshotCyberSitter was very easy to download and install. With a footprint of 2.37MB it took less than a minute to download with a Broadband connection (May take 2-3 minutes on dial-up). In order to "insure you receive maximum blocking efficiency" you are asked to clear your browsers cache and/or temporary Internet files (can be difficult for inexperienced users)..

    Cyber Patrol Setup Screenshot
    Once installation has completed you are asked if you would like to configure your Internet settings, which will open the CyberSitter administrative console. You are also asked if you would like to scan your hard disk for objectionable material. This will scan to find files on your computer that may contain objectionable keywords.


    Management
    Cyber Patrol Management ScreenshotSome of CyberSitter's most notable features include: block file sharing, block ftp sites, block newsgroups, block instant messengers, filter email, and restrict access to the Internet (based on time-of-day). Settings are applied to the computer and are not user specific, but do allow customization to block on words, phrases and/or websites.

    cyber patrol Reporting screen shots
    In addition to the above mentioned CyberSitter can also send a daily email report. This includes violations (when users are blocked), a list of websites visited, and instant message conversations. Unfortunately if you do not know your smtp mail server or want to use a basic yahoo/msn account your out of luck.


    Accuracy
    cyber patrol user profilesAdministrators are given the choice to filter on 33 different categories. CyberSitter comes with 7 categories filtered by default including: Adult/Sexually Oriented, Illegal Activities/Drugs, Hate/Intolerance, Illegal Guns/Violence, Image Searches, and Social Networking sites.

    We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc

    Webroot Child Safe

    Price
    $39.95 (subscription)

    Pros: Not just Internet but computer and program restrictions (i.e. restrict the amount of time your children play games). Can prevent access to computer system tools (improves tamper resistance). Provides remote administration, only across your home network. Integrates with your Windows User accounts and allows for individual user customization.

    Cons:
    Overwhelming user interface. Difficult password recovery. Email notifications require SMTP server (doesn't work for basic yahoo and hotmail accounts). Reporting is text-based making it difficult to gather useful information.

    Summary
    From computer time restrictions to temporary override passwords, Child Safe provides several features that offer another level of customization. With these new features it also made Child Safe difficult to manage and a little overwhelming. The user interface can be confusing at times and is cluttered with descriptions and tool tips.

    Child Safe blocked only 65% of the objectionable websites tested and Over-blocked on only 15% of the “safe” websites tested.
    The reporting/monitoring tools are all text-based which make it difficult to gather useful information about your families’ Internet activity.


    Installation/Setup
    Child Safe Installation ScreenshotWebroot’s Child Safe was very easy to download and install. With a footprint of 8.28MB it took only a few minutes to download on a Broadband connection (May take 10-20 minutes on dial-up). You are given two choices: Install Child Safe Remote Access Client – Used to remotely manage Child Safe on any networked computers; and Install Child Safe – recommended for all other computers in the house.


    Child Safe Setup ScreenshotYou are then prompted to create a password for this account with the default username of ‘cscontrol’. Remember to write down the username and password, as recovery can be very difficult. You will be asked to add Child Safe to you firewall settings. This allows Child Safe to communicate to the web filter servers. This can be cumbersome and it is recommended that you contact your firewall vendor for details. You are finally prompted to restart your computer to complete installation.


    Management
    Child Safe Management ScreenshotChild Safe provides administrators with a management consol, which can be accessed from your Start Menu. Child Safe automatically creates users based on your Microsoft Windows user names. Each user can be categorized as a Child, Teenager, Young Adult, Adult, Administrator or Custom.

    Child Safe Reporting screen shots
    From here administrators can set restrictions based on: Category, Computer, Internet, Programs, Passwords, Web Filtering, Reporting and other Advanced options. Time Restrictions can be based on Computer time allowances or Internet time allowances. They can also be set to restrict by time-of-day.



    Accuracy
    Child Safe user profilesAdministrators are given the choice to filter on two types of categories: Mature and General. Mature contains 4 main categories including: Adult, Illegal/Criminal, Vice, and Non-mainstream. General contains 7 main categories from computers and Internet to Shopping. There are a total of 59 sub-categories between the Mature and General categories.
    .

    We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc…

    Safe Eyes Review

    Price
    $49.95 (subscription)

    Trials & Specials
  • Free 15-day Trial

  • Pros: SafeEyes was easy to install and the download was very “lightweight”. Did not require setup/customization, just install and go. Remote administration (manage SafeEyes from any internet connection), customizable profiles, works on the Mac (Macintosh), easy and intuitive, and has all the right features.

    Cons:
    Disabling your firewall can be difficult for inexperienced users. Occasional browser freezing and/or slowness. Closing and reopening the browser seemed to fix it. No Windows user integration, all users must have unique usernames, Reporting/monitoring tools are sub par.

    Summary
    SafeEyes’s Internet filter was one of the easiest and most user-friendly products we reviewed. With the cross platform capabilities (works on PC and Mac), remote management, time management, and many more, SafeEyes deserves our third place award.

    SafeEyes did have a few “hiccups” including compatibility issues, slowness and the occasional browser lockups. It blocked 70% of the objectionable websites tested and Over-blocked on 20% of the “safe” websites tested.

    The reporting/monitoring tools are simple but not very robust and need a lot of work. Although it is missing a few critical features it is highly recommended and very intuitive.

    Installation/Setup
    Cyber Patrol Installation ScreenshotSafeEyes was very easy to download and install. With a footprint of 2.71MB it took less than a minute to download with a Broadband connection (May take 2-3 minutes on dial-up). Before installation it is recommended that you disable your firewall to avoid compatibility issues.

    Cyber Patrol Setup Screenshot
    You are then prompted to enter your username and registration number, or if you need to create one you can easily do so here. Once entered installation will smoothly complete and prompt you to restart your computer.


    Management
    Cyber Patrol Management ScreenshotUpon restarting your computer SafeEyes will prompt you to sign in for Internet access. After signing in you should be filtered with the SafeEyes default settings. You can customize your settings by clicking the SafeEyes icon on your desktop, in the system tray (beside the clock) or in your Start menu.

    Safe Eyes Reporting screen shots
    If you right click on the system tray icon you can: Open Admin tools, Log off, Switch Users, View reports, Access Help, etc… SafeEyes also comes installed with an Internet Explorer toolbar. This unique feature permits you to allow websites, block websites, log-off, do a “Safe Search” and easily access the administrative tools.


    Accuracy
    Safe Eyes user profilesAdministrators are given the choice to filter on 35 different categories. Each category can be selected to be banned, logged, and/or activate an alert. SafeEyes is set to log all categories by default and to ban: Nudity, Pornography, sex, and tasteless/gross websites.

    We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc…

    Cyber Patrol Review

    Price
    $39.95 (subscription)

    Trials & Specials
  • Free 14-day Trial

  • Pros: Installation was easy, fast and did not require a reboot. (You will need to close all browsers however). Synchronize settings between computers, windows user integration for automatic login, very granular customization (great for technical administrators).

    Cons:
    Can be confusing if you’ve never used Internet filtering software (User setup is confusing and tedious). Logging out is not intuitive, Confusing Interface, Awkward navigation, Limited reporting, and very granular customization (makes it overwhelming and confusing).

    Summary
    CyberPatrol’s Internet filter was one of the most feature heavy products we reviewed. From application blocking, stealth mode, time allowance and many more, CyberPatrol had the most features of all products. Although the product had all of the right features it was not the most intuitive to use.
    CyberPatrol blocked only 65% of the objectionable websites tested and Over-blocked on only 15% of the “safe” websites tested.
    The reporting/monitoring tools are simple but not very robust and need a lot of work. For a somewhat technically inclined user CyberPatrol is a great product and allows for full customization..

    Installation/Setup
    Cyber Patrol Installation ScreenshotCyberPatrol 7.6 was very easy to download and install. With a footprint of 12MB it took only a few minutes to download on a Broadband connection (May take 10-20 minutes on dial-up). You are given two choices: Typical – recommended for most users and Advanced – used to change install directory, if you’re on a domain or if you need to configure a proxy.

    Cyber Patrol Setup Screenshot
    You are then prompted to create a Headquarters password and password hint. This will be used to manage, uninstall, disable and override the product. Finally you are asked to choose your environment (Home, Library, School, Business…) and the User Type (Child, Teen, Adult, Monitor Only…)


    Management
    Cyber Patrol Management ScreenshotCyberPatrol 7.6 provides you with a “Headquarters Toolbar”. This will give administrators easy access to manage the product and allow users to see if they are logged-in. This toolbar can be accessed from your start menu or by clicking on the CyberPatrol icon in the task bar.

    cyber patrol Reporting screen shots
    From the toolbar, Administrators can Manage User Profiles, Customize Filter Settings, View Reports, access Online Administration and view extended features. There is no easy way to logoff, users are required to switch to the “default” user (potential security issue).



    Accuracy
    cyber patrol user profilesAdministrators are given the choice to filter on 13 different categories. Each category’s sensitivity can be adjusted to fit your needs. CyberPatrol comes with 7 preconfigured category settings including: Adult (Security), Adult (productivity & Security), Mature Teen, Young Teen, Child, Custom and Yes List.

    We tested 2 lists of websites including: adult image searches, MySpace.com accounts, Hate oriented websites, websites that promote hacking, drug use, gambling, adult humor, etc…

    Net Nanny Review

    Price
    $39.99 (subscription)

    Trials & Specials
  • Free 14-day Trial
  • Buy One - Get One Free
  • Get 3 Months Free

  • Pros: Synchronize settings between computers, manage settings from any Internet connection (remote management), windows user integration for automatic login, time restrictions, spectacular reporting, simple to use, but can provide very granular customization. Installation was easy, settings can be imported and synchronize across all computers, and no configuration required.

    Cons:
    Poor Internet Game management. Privacy protection services are only available in the Net Nanny 5.5 suite. Download is fairly large (recommend purchasing backup CD if you are a dial-up customer). May require you to disable your firewall. Requires computer restart before settings can take effect.

    Summary
    With a robust feature set including: remote administration, email notifications, image-safe-search, chat monitoring/blocking, Internet game blocking, time-restrictions and plenty more, Net Nanny 5.5 receives our #1 rating.
    Net Nanny 5.5's Internet filter offers simplicity of local or online management, giving us the ability to use it out of the box or quickly create multiple users for each family member. We did notice that the online-games listed were not among the most popular in the U.S. and needs a lot of work. Their enhanced reporting (remotely or locally) allowed us to drill-down to see all web and chat activity with a beautiful interface.
    Net Nanny 5.5 uses dynamic filtering in conjunction to list-based technologies, making it far more accurate than any other solution. Net Nanny 5.5 blocked 90% of the objectionable web sites tested and Over-blocked on only 15% of the “safe” web sites tested.

    Installation/Setup
    Net Nanny Installation ScreenshotNet Nanny 5.5 was very easy to download and install. With a footprint of 15MB it took a few minutes to download on a Broadband connection (May take 10-20 minutes on dial-up). If you have never installed Net Nanny 5.5 you are asked to create an email address, an administrator's password, and a password hint. If you have installed Net Nanny 5.5 on another computer it will import your settings automatically.

    Net Nanny Setup ScreenshotBefore Installation can complete you are prompted to restart your computer. Upon rebooting your computer Net Nanny 5.5 requires no configuration and is reconfigured to begin filtering automatically in default mode. Also, if you purchase Net Nanny 5.5 Suite you can scan your computer for objectionable material including: images, videos, web sites visited, text files, etc. Or you can purchase ContentCleanup separately if you just want to scan your computer for objectionable material.

    Management
    Net Nanny Management ScreenshotNet Nanny 5.5 can be managed locally (from your computer) or remotely (from anywhere with an Internet connection). You can manage your settings by clicking the Net Nanny 5.5 icon on your desktop, from your start menu or by clicking on the Net Nanny 5.5 icon in the task bar (beside the clock in the bottom right corner). To manage your settings remotely you can do so by visiting http://manage.netnanny.com

    cyber patrol Reporting screen shotsNet Nanny 5.5 gives administrators the ability to create/customize multiple user profiles or if you choose to use default mode you can use the same settings for everyone that uses the computer (One size fits all). Net Nanny 5.5 also gives administrators the ability to: Edit User profiles, Adjust filter settings, manage time controls, disable Internet games, create email notifications, view reports, and much more.

    Accuracy
    cyber patrol user profilesAdministrators are given the choice to filter on 29 different categories. Each category can be set to Block, Warn, or Allow for each user. Net Nanny 5.5 comes with 7 preconfigured blocked categories including: Pornography, Gambling, Intimate Apparel, Adult/Mature, Drugs/Alcohol, Illegal Activities, and Hate/Violence.

    What are Parental Controls?

    Today I wanted to talk a little about Internet Filtering and Parental Controls. I wanted to answer some of the questions I've been asked by friends and family. Who uses Parental Controls? Who needs an Internet filter? What are the best filters available and what's the difference between them? How much should I spend?

    Before I jump into these questions I wanted to start with What is an Internet filter (aka Parental Control, Net Nanny, web filter...)?
    An Internet filter is simply something that sits between the Internet and the end-user, which filters "objectionable" content. Most filters allow parents to determine what is objectionable including: Pornography, Violence, Adult Language, Gambling, Lingerie, Drugs, Alcohol, Weapons and so forth. Net Nanny, for example, blocks these categories by default and allows parents to customize settings if necessary.

    Who uses parental controls?
    Everyone and anyone. The real question is why they use Internet filtering. Most people I've talked to use it because something bad happened on the computer. Like what? Little Johnny's friend came over one night and searched for boobies on Google and mom walked in. Mom doesn't want Johnny looking at that stuff and decided to put a Net Nanny on the computer.

    What's that, you need another example? I understand, here's one more. Dad enjoys looking at random funny stuff. Mom and Dad are religious and believe that pornography is not something they want in their home. Dad does a quick Google search on celebrity jokes and clicks the third link found on the page. To his dismay he is attacked with 100 pop-ups of nude celebrity pictures. Mom walks in again (she must have some sixth sense) and now you have 10 years of marriage counseling and a second mortgage. So to reiterate, who uses parental controls, it's important that everyone, whom doesn't desire objectionable content in their home, have some sort of Net Nanny.

    Who Needs an Internet Filter?
    Need is the keyword here. The perceived need usually outlines or fulfills another need. For example, a school that needs government money may be required to have Internet filtering on all of their computers. Or a home that needs a father figure may be required to have a filter because Mom won't stay with dad while he stays up late surfing porn. We all need filtering companies to exist to protect our freedom of speech, give the family control of what's allowed in the household. Otherwise the government will take that role (China).

    What are the best Internet Filtering options available?
    Now it's time to get to the guts of this discussion. A large portion of this is dependent upon your objective. For me, I prefer to have everything allowed except pornography. For someone else they may want to spy on their kids or spouse. Another may want to block everything except one or two sites, for the kids. You can visit www.child-internet-safety.com and view each Internet filter side-by-side for feature comparison, but I recommend Net Nanny. Net Nanny has been around the longest, it has all the right features, and at $40 per year is very affordable. You can get to Net Nanny here: www.netnanny.com

    How much should I spend?
    We have 3 computers in our house and would spend about $80 per year on Internet filtering. I wouldn't recommend buying a filter without trying it out first and most filters offer some sort of trial. Net Nanny has one here: http://www.netnanny.com/account/trialware?product=160 Make sure it meets your expectations first. What about the free filters? Try them too. Be cautious though, make sure you can trust the brand and product first, a lot of them will gather personal information or leave spyware on your computer.

    This was just a simple overview for those of you searching for Internet filters, parental controls, internet nannys or whatever you call it. I hope this helps someone. Leave a comment or tell your story.