Parental controls

This article is about computer options. For the TV series, see Parental Control. For the software included with Windows Vista and Windows 7, see Windows Parental Controls.

Parental controls are features which may be included in digital television services, computer and video games, mobile devices and software. Parental controls fall into roughly four categories: content filters, which limit access to age inappropriate content; usage controls, which constrain the usage of these devices such as placing time-limits on usage or forbidding certain types of usage; computer usage management tools, which enforces the use of certain software; and, monitoring, which can track location and activity when using the devices.[1] Another feature of parental controls is the ability to blocking rating, such as Parental Advisory, TV-MA for TV, R and NC-17 for MPAA, and M and AO for ESRB.

Content Filters were the first popular type of parental controls to limit access to Internet content. television stations also began to introduce V-Chip technology to limit access to television content. Modern usage controls are able to restrict a range of explicit content such as explicit songs and movies. They are also able to turn devices off during specific times of the day, limiting the volume output of devices, and with GPS technology becoming affordable, it is now possible to easily locate devices such as mobile phones.

Overview

Several techniques exist aimed at creating parental controls for blocking websites. Add-on parental control software may monitor API in order to observe applications such as a web browser or Internet chat application and to intervene according to certain criteria, such as a match in a database of banned words. Virtually all parental control software includes a password or other form of authentication to prevent unauthorized users from disabling it

Techniques involving a proxy server are also used.[2] A web browser is set to send requests for web content to the proxy server rather than directly to the web server intended. The proxy server then fetches the web page from the web server on the web browser's behalf and passes on the content to the browser. Proxy servers can inspect the data being sent and received and intervene depending on various criteria relating to content of the page or the URL being requested, for example, using a database of banned words or banned URLs. The proxy method's major disadvantage is that it requires that the client application to be configured to utilize the proxy, and if it is possible for the user to reconfigure applications to access the Internet directly rather than going through the proxy then this control is easily bypassed. Proxy servers themselves may be used to circumvent parental controls. There are other techniques used to bypass parental controls.

Computer usage management method, unlike content filters, is focused on empowering the parents to balance the computing environment for children by regulating gaming. The main idea of these applications is to allow parents to enforce learning component into the computing time of children, where children must earn gaming time while working through educational contents.

Lately network based parental control devices have emerged. These devices working as a firewall router use packet filtering, DNS Response Policy Zone (RPZ) and Deep Packet Inspection (DPI) methods to block inappropriate web content. These methods have been used in commercial and governmental communication networks.

Parental controls on mobile devices

The increased use of mobile devices that include full featured internet browsers and downloadable applications has created a demand for parental controls on these mobile, smart devices. In November 2007, Verizon was the first carrier to offer age-appropriate content filters as well as the first to offer content-generic content filters recognizing that mobile devices were used to access all manner of content from movies and music to short-code programs and websites. In June 2009, in iPhone OS 3.0, Apple was the first company to provide a built in mechanism on mobile devices to create age brackets for users that would block unwanted applications from being downloaded to the device.

Mobile device software enables parents to restrict which applications their child can access while also allowing parents to monitor text messages, phone logs, MMS pictures, and other transactions occurring on their child's mobile device, to enable parents to set time limit on the usage of mobile devices, and to track the exact location of their children as well as monitor calls in and out and the content of texts in and out.

Methods to bypass parental controls

Several methods of bypassing parental controls can be used.

Filtering that occurs outside of the individuals computer (such as at the router) cannot be bypassed using the above methods (except for 'Incognito/InPrivate' modes). However,

Video game systems that have used parental controls

Operating systems with parental controls

Below is a list of popular operating systems which currently have built-in parental control features:


See also

References

  1. "Effects of authoritative parental control on child behavior" (PDF). University of California. |first1= missing |last1= in Authors list (help)
  2. Seltzer, Larry. "Turn Your Windows Home Server Into A Proxy Server". Retrieved Sep 26, 2008.
  3. "How to Bypass the Parental Control Time Limits in Windows 7/Vista/XP". Retrieved September 6, 2012.
  4. Szczys, Mike (2014-07-06). "Brute force attack Xbox 360 parental controls". Hack A Day. Hackaday. Retrieved 2014-08-09.
  5. Brewis, Marie. "Get better control of what your kids can see on their tablet or smartphone". PC Advisor. Retrieved 2016-07-11.
  6. "Use Restrictions on your iPhone, iPad, and iPod touch". Apple Support. Retrieved 2016-07-11.
  7. "Set up Parental Controls". Windows.microsoft.com. Retrieved 2013-09-17.
This article is issued from Wikipedia - version of the 10/20/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.