Flylib.com
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Look Both Ways: Help Protect Your Family on the Internet
Table of Contents
Copyright
Praise for Look Both Ways ...
Acknowledgments
Introduction
Quick Safety Checklist
Part One: Understanding the Risks
Chapter One. The Landscape of Risk
What s Going On Out There?
How Are You Putting Yourself at Risk?
What Can You Do?
What s Next?
Chapter Two. Misperceptions About Online Anonymity
Leaving a Trail of Clues
The Lure of Anonymity
How Predators Use Anonymity
What Can You Do?
Chapter Three. Thinking Like the Enemy: Predatory Behavior
Knowing the Enemy
Recognizing Sexual Predators, Offline and On
How Predators Choose Their Victims
The Victim Grooming Process
Who Is Not at Fault
Part Two: 13 Steps to Internet Security
Chapter Four. Step 1: Be Careful What You Show People
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Five. Step 2: Don t Tell People More Than You Should
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Six. Step 3: Be Alert to How Predators Prey on Emotions
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Seven. Step 4: Don t Let Them Know Where You Live
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eight. Step 5: Don t Expose Yourself Through Instant Messaging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Nine. Step 6: Reduce Your Vulnerability When Blogging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Ten. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eleven. Step 8: Date Safely Online
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Twelve. Step 9: Don t Browse Indiscriminately
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Thirteen. Step 10: Use Common Sense When Gaming with Others
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fourteen. Step 11: Get Savvy About Financial Scams and Fraud
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fifteen. Step 12: Don t Let Your Defenses Down When Using Mobile Devices
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Sixteen. Step 13: Act to Avoid Harassment and Bullying
What Just Happened?
Assessing the Risks
Protecting Yourself
Part Three: Get Going to Protect Yourself Today
Chapter Seventeen. Talking About Safety
Understanding the Safety Pacts You Make
Negotiating Safety
What You Should Know Before You Start the Discussion
Build the Framework for a Safer Environment
The Special Case for Social Networks
Chapter Eighteen. It Takes Everyone to Make a Safe Internet
What to Do If a Sexual Predator Is Victimizing Your Child
Report Abuse
What Your Online Service Can Do
How You Can Affect Laws Dealing with Online Abuse
Begin a New Internet Journey
Part Four: Resources
Helpful Terms
Technology Toolkit
Understanding the Types of Technology Available
Top Tips on Using Technology to Protect Yourself
Useful Web Sites for Finding Tools
Helpful Web Resources for Internet Safety
Safety Advice and Information
Recognizing Sexual Predators
Government Sites
Sites for Reporting Abuse
Kid-Oriented Sites
Common Messaging Shortcuts
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
XYZ
Selected References
About the Authors
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Page #156 (Index)
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 6.1 Port Forwarding
Conclusion
Appendix - Sample sshd_config File
MySQL Cookbook
Cloning a Table Exactly
Generating Unique Table Names
Using ORDER BY to Sort Query Results
Eliminating Duplicates from a Table
Appendix B. JSP and Tomcat Primer
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Training
Competency-Based Employee Development
The Transformation to Competency-Based HR Management
Appendix C Examples of Life-Career Assessment Exercises
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is a Message?
What Is a Class?
Creating and Using Packages
Interfaces
Appendix E. Reference
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Basic Commands to Get Started
Gaining Drawing Strategies: Part 2
Grouping Objects into Blocks
Generating Elevations
Controlling Text in a Drawing
Java All-In-One Desk Reference For Dummies
Java Programming Basics
Using Arrays
Creating Servlets
Using Java Server Pages
Database for $100, Please
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies