SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
Ethical Hacking d
E hi l H ki and
Countermeasures
Version
V i 6




Module XLIV
Internet Content Filtering
Techniques
      q
News




                                  Source: http://www.wkyc.com/

                                               Copyright © by EC-Council
EC-Council          All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective

         This module will familiarize you with:
                                      y


                      Internet Filter



                      Key Features of Internet Filters



                      Pros and Cons of Internet Filters



                      Internet Content Filtering Tools


                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow

                           Internet Filter




                  Key Features of Internet Filters




                  Pros and Cons of Internet Filters




                  Internet Content Filtering Tools
                                           g


                                                                         Copyright © by EC-Council
EC-Council                                    All Rights Reserved. Reproduction is Strictly Prohibited
Introduction to Internet Filter

   An Internet filter is a software that blocks unwanted content
   such as pornography and group sites



   Filters use a list of keywords and well-known URLs to restrict
   children from accessing inappropriate material



   More advanced filters can also block or filter chat rooms,
   instant messages, file downloads, and forums




   There are also filters that block out SPAM

                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Key Features of Internet Filters

                          • Allow you to create a profile for each member of your
        User profiles:      family
                            f il


                          • Provides detailed information on what your children
                                                                   y
             Reporting:     have been doing and saying online, including sites visited


                          • You can set limits on when and how long a user may be
        Time Limits:
        Ti   Li its         online



      Regular updates: • Choose software that allows you to download regular
      R   l     d        updates to keyword and URL lists


                          • Make sure the software will work with the browser you
       Compatibility:       use, as well as your operating system
                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
Pros and Cons of Internet Filters

        Pros:

        • Prevents children from deliberately or inadvertently
          accessing pornography
        •PPrevent predators f
                     d       from talking to your children
                                     lki           hild
          online
        • Allows kids to surf online without constant parental
          presence


        Cons:

        • Can sometimes filter out “safe” sites, words, and
          people
        • May create a false sense of security for parents
        • Tech-savvy kids may find a way around filters, or may
          access inappropriate content elsewhere
                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Internet Content Filtering
                                l
                       Tools


                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
iProtectYou

   iProtectYou is an Internet filtering and monitoring p g
                                      g              g program designed for p
                                                                    g        parents
   who are concerned about the possible detrimental effects of the Internet on the
   development of their children




   Features:


     • Block e-mails, chat sessions, instant messages, and P2P connections if they contain
       inappropriate words
     • Prevent your private information (credit card number for example) from being sent to the
       Internet
     • Set a schedule to specify days and times when on-line activity is allowed
     • Limit Internet Traffic to a specified amount of data that can be sent or received per user /
       per day
     • Control the list of programs that can have access to the Internet
     • Get notification e-mails with full description of blocked operations and an attached
       screen-shot of your kids' computer to control them remotely
                                                                                             Copyright © by EC-Council
EC-Council                                                        All Rights Reserved. Reproduction is Strictly Prohibited
iProtectYou: Screenshot




                                                           Copyright © by EC-Council
EC-Council                      All Rights Reserved. Reproduction is Strictly Prohibited
Block Porn

      Block Porn is an Internet filtering software that can block access to
      pornographic material and adult web sites as well as any other web site as
                hi        i l d d l         b i         ll         h      b i
      needed




      The program offers two modes:


       • One that allows access to all web sites, except pornography
       • Restricted mode that blocks all web browsing, except for the sites that you
         specifically allow
          p         y


      It include the options such as blocking access to selected folders, restricting
      program access, locking the IE home page, custom warning messages,
      network synch, and more
              k     h    d

                                                                                            Copyright © by EC-Council
EC-Council                                                       All Rights Reserved. Reproduction is Strictly Prohibited
Block Porn: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
FilterGate

      FilterGate is a powerful filtering product that offers four main Internet filters
      in one small downloadable application


      It is a 4 in 1 filtering package that allows to remove web advertising and popup
              4-in-1
      windows as well as protect your privacy and filter adult content


       Four I t
       F    Internet filt
                   t filters are:

                   PopupFilter setting

                   AdFilter setting

                   PrivacyFilter setting

                   AdultFilter setting
                                                                                        Copyright © by EC-Council
EC-Council                                                   All Rights Reserved. Reproduction is Strictly Prohibited
FilterGate: Screenshot




                                                           Copyright © by EC-Council
EC-Council                      All Rights Reserved. Reproduction is Strictly Prohibited
Adblock

       Adblock is a content filtering plug-in for the Mozilla and Firebird browsers



       It allows the user to specify filters, which remove unwanted content based on
       the source address
            source-address


       Every time a webpage loads, Adblock will intercept and disable the elements
           y            p g      ,                     p
       matching your filters



       Adblock supports two types of filters:

        • Simple Filter
        • Regular Expression

                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
Adblock: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
AdSubtract
       AdSubtract is a program that blocks every type of conceivable web
       ad e se e s
       advertisements

       It protects your privacy while you surf the web

             Features:
             • Pop-Ups and Pop-Unders are blocked
             • Banner ads of all sizes vanish
             • Stops multimedia ads
             • Stops windows messenger pop-up spam
             • Distracting animations can be frozen; Web sounds can be
               silenced
             • Privacy protection automatically deletes cookies, browser history,
               cache, and more
             • Ad Server/Profiling cookies can be blocked
             • Easy to toggle AdSubtract On/Off to Enable/Disable filtering
                                                                                       Copyright © by EC-Council
EC-Council                                                  All Rights Reserved. Reproduction is Strictly Prohibited
AdSubtract: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
GalaxySpy

             GalaxySpy is a program that lets you retake control of your
             Internet experience
             I t    t      i


             It allows you selectively block ads, adult-content sites, market
             research, profiling, and t ki
                     h     fili     d tracking


             It detects and blocks adware, cookies, hackers, scripts, spyware,
             viruses, and worms
              i          d


             This program features an optional password for parental control


             The Professional Edition lets you log Web sites visited, cookie
             contents and requested URLS

                                                                              Copyright © by EC-Council
EC-Council                                         All Rights Reserved. Reproduction is Strictly Prohibited
GalaxySpy: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
AdsGone Pop Up Killer

      AdsGone i a program th t runs while you are b
      Ad G    is          that       hil          browsing th Web
                                                       i the W b




             Features:

                                                                                          Ads
             • Blocks unwanted popup ads
             • Prevents messenger service and web page dialog ads
             • Blocks banner ads
             • Kills spyware and adware programs
             • Blocks ads and Pop-Ups when using Kazaa,
               Morpheus, Gator, or Chat programs like ICQ, MSN,
               AIM,
               AIM or Trillian
             • Blocks Macromedia "Flash" ads
                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
AdsGone Pop Up Killer:
             Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Anti-PopUp

      Anti-PopUp for IE is a small program that automatically stops a sponsor's
      pop-ups


      It does not require that you add each pop up window to a list
                                            pop-up



      Also AntiPopUp does not stop all new windows as th occur
      Al A tiP U d          t t     ll      i d       they


      It uses the smart identification engine which recognizes sponsor's pop up
                                       engine,                 sponsor s pop-up
      windows and closes them automatically


      It also has an Internet Eraser capabilities

                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Anti-PopUp: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Pop Up Police


        Pop Up Police is a popup blocker that will keep your
        Internet surfing experience entertaining




        It gives total control over Pop Ups and Banner Ads, with
        extra Security Control for protection against sneak attack




        Protects PC from fatal worms and virus sneak attacks




                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
Pop Up Police: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Super Ad Blocker

     Super Ad Blocker blocks all forms of advertising including Flash, Rich Media,
     fly-in, lid i
     fl i slide-in, pop-ups, pop-unders, spyware ads, and messenger ads
                                     d              d      d             d


     It blocks and removes thousands of major spyware/adware applications


     Includes advanced privacy cleaning and automatic updates, so the product is
     never out of d
                f date


     It provides detailed statistics for the number and type of ads blocked




                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
Super Ad Blocker: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Anti-AD Guard

       Anti AD
       Anti-AD Guard is a program that filters and blocks commercial banners from
       being loaded by browsers



       The multistage defense system guarantees practically complete filtration of
       advertisements



       This heuristic analyzer allows blocking the new formats of advertisements
       without updating the program



       It is compatible with all popular browsers such as Internet Explorer, FireFox,
       Mozilla, Opera, and N
       M ill O            d Netscape

                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Anti-AD Guard: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Net Nanny

       Net Nanny controls access to websites and other online content such as
       Internet based games
       Internet-based games, blocks file sharing of music images and videos and
                                                    music,           videos,
       monitors a user's Internet activity


       Net Nanny gives control over Internet connection



       Easily prevent personal information from being given out over the Internet



       Features:

         • Customize warning messages and violation actions
         • Control over the use of words and phrases
         • Monitor and l
                      d limit time spent online
                                            l
         • Log and record all online chat sessions

                                                                                         Copyright © by EC-Council
EC-Council                                                    All Rights Reserved. Reproduction is Strictly Prohibited
Net Nanny: Screenshot 1




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Net Nanny: Screenshot 2




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
CyberSieve

       CyberSieve is a Internet filtering and parental control software program

       It allows you to control and monitor your child’s use of the Internet


             Features:

             • Filter harmful websites and newsgroups
             • Restrict Internet time to a predetermined schedule
             • Decide which programs can have internet access
             • Limit the amount of data that can be sent or received to/from your computer
             • Block e-mails, online chats, instant messages and P2P connections containing
                              ,              ,              g                                  g
               inappropriate words
             • Set different levels of restrictions for every member of your family depending
               on their maturity, interests, habits, and parental control needs
             • Monitor your child’s use of the Internet, irrespective of where you are; in the
               neighboring room, at work, or even on vacation
                    hb                     k
             • Get detailed Internet activity logs
                                                                                                Copyright © by EC-Council
EC-Council                                                           All Rights Reserved. Reproduction is Strictly Prohibited
CyberSieve: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
BSafe Internet Filter

       BSafe is a Internet filtering software which allows you to monitor
       your child’s use of I t
             hild’       f Internett


             Features:

             •   Filters unwanted online adult content
             •   Customize your list of allowed Websites
             •   Monitors & logs chat room conversations
             •   Monitors & logs Instant Messaging
             •   McAfee Anti-Virus & Anti-Spyware available
                                             py
             •   Provides protection of personal & private data
             •   SPAM Filter & Popup Blocker




                                                                                             Copyright © by EC-Council
EC-Council                                                        All Rights Reserved. Reproduction is Strictly Prohibited
BSafe Internet Fileter:
             Screenshot




                                                            Copyright © by EC-Council
EC-Council                       All Rights Reserved. Reproduction is Strictly Prohibited
Stop-the-Pop-Up Lite

       Stop-the-Pop-Up Lite is a pop-up blocker that blocks all annoying pop-up
       windows from appearing as you surf the web


       It kills all pop ups from file sharing p g
                    p p p                   g programs and the spyware/adware that
                                                                py    /
       are bundled with these peer-to-peer programs


       It supports Kazaa, Kazaa Lite, Morpheus, Grokster, iMesh, Xolox, and Direct
       Connect


       It kill the new b d of pop-ups called '
          kills h      breed f          ll d 'Messenger Service spam‘
                                                            i       ‘


       It also recognizes and kills hostile activeX controls from companies known to
       develop spyware or adware
                                                                                    Copyright © by EC-Council
EC-Council                                               All Rights Reserved. Reproduction is Strictly Prohibited
Stop-the-Pop-Up Lite:
             Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
WebCleaner


        WebCleaner is a program that prevents annoying sponsors
        PopUp's when you visit some web sites




        With features such as the Smart Check Popup Engine,
        WebCleaner can kill all kinds of typical ads popups




        It can also block any Web content (advertising images or
        Flashes) you do not want



                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
WebCleaner: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
AdCleaner

       AdCleaner is a program that blocks floating ads and new form popups


       It cleans and auto blocks over 5600 Adwares,Spywares


       It is easy to use, default settings , and hotkeys supported

             Cleans all form of IE ads including:
             • General popup ads
             • Modeless dialog popup ads
             • Winhelp popup ads
             • Unfathered popup ads
             • Floating ads
             • Animated ads
             • Fl h ads
               Flash d
             • Uncached image ads

                                                                                       Copyright © by EC-Council
EC-Council                                                  All Rights Reserved. Reproduction is Strictly Prohibited
AdCleaner: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Adult Photo Blanker

       Adult Photo Blanker blanks objectionable adult
       images and movies
       i        d     i


             It monitors Internet activity and protects the
             user f
                  from h
                       harmful objectionable content
                             f l bj i       bl


                 It is compatible with all browsers and e-mail
                          p
                 programs


                      It intercepts attempts to open files and checks
                                p        p       p
                      them for objectionable content


                           It works with all widely used formats of images
                           and movie files

                                                                                         Copyright © by EC-Council
EC-Council                                                    All Rights Reserved. Reproduction is Strictly Prohibited
Adult Photo Blanker: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
LiveMark Family

       LiveMark Family enables you to block access to web sites that are
       inappropriate for children
       i        i    f    hild


       You can choose from two filtering levels (
                                         g         (under 12 or over 12 y
                                                                        years old) and
                                                                                 )
       also select the topics that should be filtered (pornography, violence etc.)


       There filtering i done automatically based on th criteria set b th software
       Th    filt i is d        t   ti ll b d        the it i      t by the ft


       It has the option to override certain sites and specifically allow or block them
       based on your personal preference


       It also includes an option to limit Internet access to certain times of the day

                                                                                       Copyright © by EC-Council
EC-Council                                                  All Rights Reserved. Reproduction is Strictly Prohibited
LiveMark Family: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
KDT Site Blocker

       KDT Site Blocker is an easy to use tool to block
                                  y
       access to certain websites



             It works with any browser (IE, Firefox, Opera
             etc.)



                  It automatically displays a generic ‘blocked’ page
                  whenever a blocked site is accessed



                       To block a site, you need to add the domain name
                       to the li
                           h list

                                                                                        Copyright © by EC-Council
EC-Council                                                   All Rights Reserved. Reproduction is Strictly Prohibited
KDT Site Blocker: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Internet Safety Guidelines for
                 Children
     Educate children about the Internet and their dangers
                                                      g


     Bookmark child-friendly web sites


     Teach children not to give personal information over the Internet


     Teach children never to open an email from unknown person

     Never allow children to meet with someone on online session and chat
     rooms

     Teach children never to respond to an unsubscribe on a pornographic
     email
                                                                               Copyright © by EC-Council
EC-Council                                          All Rights Reserved. Reproduction is Strictly Prohibited
Summary

      An Internet filter is a p ece o software that helps to b oc out
           te et te s piece of so t a e t at e ps block
      unwanted content such as pornography and hate group sites



      Filters use a list of keywords and well-known URLs to keep children
      from accessing inappropriate material


      Filters prevent children from deliberately or inadvertently access
      pornography



      Filters allow kids to surf online without constant parental presence

                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council   All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council   All Rights Reserved. Reproduction is Strictly Prohibited

Mais conteúdo relacionado

Mais procurados

20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringth3prodevelopper
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 

Mais procurados (19)

Security Wars
Security WarsSecurity Wars
Security Wars
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
File000154
File000154File000154
File000154
 
File000145
File000145File000145
File000145
 
Computer security
Computer securityComputer security
Computer security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineering
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 

Destaque

2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
The Hackers Dictionary
The Hackers DictionaryThe Hackers Dictionary
The Hackers Dictionaryalanocu
 
Waterhole Attack
Waterhole AttackWaterhole Attack
Waterhole AttackSymantec
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hackingth3prodevelopper
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Ceh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersCeh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersMina Fawzy
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 

Destaque (10)

2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
The Hackers Dictionary
The Hackers DictionaryThe Hackers Dictionary
The Hackers Dictionary
 
Waterhole Attack
Waterhole AttackWaterhole Attack
Waterhole Attack
 
prova
provaprova
prova
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hacking
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Ceh V5 Module 07 Sniffers
Ceh V5 Module 07 SniffersCeh V5 Module 07 Sniffers
Ceh V5 Module 07 Sniffers
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Semelhante a Ce Hv6 Module 44 Internet Content Filtering Techniques

Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetVi Tính Hoàng Nam
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingth3prodevelopper
 
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking TechniquesCe Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking TechniquesKislaychd
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securitySejahtera Affif
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techNFifa
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Do You know Your Firefox Well !?
Do You know Your Firefox Well !?Do You know Your Firefox Well !?
Do You know Your Firefox Well !?mohamed Hafez
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 

Semelhante a Ce Hv6 Module 44 Internet Content Filtering Techniques (20)

Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishing
 
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking TechniquesCe Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking Techniques
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Internet security
Internet securityInternet security
Internet security
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed tech
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Do You know Your Firefox Well !?
Do You know Your Firefox Well !?Do You know Your Firefox Well !?
Do You know Your Firefox Well !?
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 

Último

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Último (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Ce Hv6 Module 44 Internet Content Filtering Techniques

  • 1. Ethical Hacking d E hi l H ki and Countermeasures Version V i 6 Module XLIV Internet Content Filtering Techniques q
  • 2. News Source: http://www.wkyc.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 3. Module Objective This module will familiarize you with: y Internet Filter Key Features of Internet Filters Pros and Cons of Internet Filters Internet Content Filtering Tools Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Internet Filter Key Features of Internet Filters Pros and Cons of Internet Filters Internet Content Filtering Tools g Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Introduction to Internet Filter An Internet filter is a software that blocks unwanted content such as pornography and group sites Filters use a list of keywords and well-known URLs to restrict children from accessing inappropriate material More advanced filters can also block or filter chat rooms, instant messages, file downloads, and forums There are also filters that block out SPAM Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Key Features of Internet Filters • Allow you to create a profile for each member of your User profiles: family f il • Provides detailed information on what your children y Reporting: have been doing and saying online, including sites visited • You can set limits on when and how long a user may be Time Limits: Ti Li its online Regular updates: • Choose software that allows you to download regular R l d updates to keyword and URL lists • Make sure the software will work with the browser you Compatibility: use, as well as your operating system Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Pros and Cons of Internet Filters Pros: • Prevents children from deliberately or inadvertently accessing pornography •PPrevent predators f d from talking to your children lki hild online • Allows kids to surf online without constant parental presence Cons: • Can sometimes filter out “safe” sites, words, and people • May create a false sense of security for parents • Tech-savvy kids may find a way around filters, or may access inappropriate content elsewhere Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. Internet Content Filtering l Tools Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 9. iProtectYou iProtectYou is an Internet filtering and monitoring p g g g program designed for p g parents who are concerned about the possible detrimental effects of the Internet on the development of their children Features: • Block e-mails, chat sessions, instant messages, and P2P connections if they contain inappropriate words • Prevent your private information (credit card number for example) from being sent to the Internet • Set a schedule to specify days and times when on-line activity is allowed • Limit Internet Traffic to a specified amount of data that can be sent or received per user / per day • Control the list of programs that can have access to the Internet • Get notification e-mails with full description of blocked operations and an attached screen-shot of your kids' computer to control them remotely Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. iProtectYou: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Block Porn Block Porn is an Internet filtering software that can block access to pornographic material and adult web sites as well as any other web site as hi i l d d l b i ll h b i needed The program offers two modes: • One that allows access to all web sites, except pornography • Restricted mode that blocks all web browsing, except for the sites that you specifically allow p y It include the options such as blocking access to selected folders, restricting program access, locking the IE home page, custom warning messages, network synch, and more k h d Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. Block Porn: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. FilterGate FilterGate is a powerful filtering product that offers four main Internet filters in one small downloadable application It is a 4 in 1 filtering package that allows to remove web advertising and popup 4-in-1 windows as well as protect your privacy and filter adult content Four I t F Internet filt t filters are: PopupFilter setting AdFilter setting PrivacyFilter setting AdultFilter setting Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. FilterGate: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Adblock Adblock is a content filtering plug-in for the Mozilla and Firebird browsers It allows the user to specify filters, which remove unwanted content based on the source address source-address Every time a webpage loads, Adblock will intercept and disable the elements y p g , p matching your filters Adblock supports two types of filters: • Simple Filter • Regular Expression Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Adblock: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. AdSubtract AdSubtract is a program that blocks every type of conceivable web ad e se e s advertisements It protects your privacy while you surf the web Features: • Pop-Ups and Pop-Unders are blocked • Banner ads of all sizes vanish • Stops multimedia ads • Stops windows messenger pop-up spam • Distracting animations can be frozen; Web sounds can be silenced • Privacy protection automatically deletes cookies, browser history, cache, and more • Ad Server/Profiling cookies can be blocked • Easy to toggle AdSubtract On/Off to Enable/Disable filtering Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. AdSubtract: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. GalaxySpy GalaxySpy is a program that lets you retake control of your Internet experience I t t i It allows you selectively block ads, adult-content sites, market research, profiling, and t ki h fili d tracking It detects and blocks adware, cookies, hackers, scripts, spyware, viruses, and worms i d This program features an optional password for parental control The Professional Edition lets you log Web sites visited, cookie contents and requested URLS Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. GalaxySpy: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. AdsGone Pop Up Killer AdsGone i a program th t runs while you are b Ad G is that hil browsing th Web i the W b Features: Ads • Blocks unwanted popup ads • Prevents messenger service and web page dialog ads • Blocks banner ads • Kills spyware and adware programs • Blocks ads and Pop-Ups when using Kazaa, Morpheus, Gator, or Chat programs like ICQ, MSN, AIM, AIM or Trillian • Blocks Macromedia "Flash" ads Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. AdsGone Pop Up Killer: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Anti-PopUp Anti-PopUp for IE is a small program that automatically stops a sponsor's pop-ups It does not require that you add each pop up window to a list pop-up Also AntiPopUp does not stop all new windows as th occur Al A tiP U d t t ll i d they It uses the smart identification engine which recognizes sponsor's pop up engine, sponsor s pop-up windows and closes them automatically It also has an Internet Eraser capabilities Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Anti-PopUp: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Pop Up Police Pop Up Police is a popup blocker that will keep your Internet surfing experience entertaining It gives total control over Pop Ups and Banner Ads, with extra Security Control for protection against sneak attack Protects PC from fatal worms and virus sneak attacks Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Pop Up Police: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Super Ad Blocker Super Ad Blocker blocks all forms of advertising including Flash, Rich Media, fly-in, lid i fl i slide-in, pop-ups, pop-unders, spyware ads, and messenger ads d d d d It blocks and removes thousands of major spyware/adware applications Includes advanced privacy cleaning and automatic updates, so the product is never out of d f date It provides detailed statistics for the number and type of ads blocked Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Super Ad Blocker: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Anti-AD Guard Anti AD Anti-AD Guard is a program that filters and blocks commercial banners from being loaded by browsers The multistage defense system guarantees practically complete filtration of advertisements This heuristic analyzer allows blocking the new formats of advertisements without updating the program It is compatible with all popular browsers such as Internet Explorer, FireFox, Mozilla, Opera, and N M ill O d Netscape Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Anti-AD Guard: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Net Nanny Net Nanny controls access to websites and other online content such as Internet based games Internet-based games, blocks file sharing of music images and videos and music, videos, monitors a user's Internet activity Net Nanny gives control over Internet connection Easily prevent personal information from being given out over the Internet Features: • Customize warning messages and violation actions • Control over the use of words and phrases • Monitor and l d limit time spent online l • Log and record all online chat sessions Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Net Nanny: Screenshot 1 Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Net Nanny: Screenshot 2 Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. CyberSieve CyberSieve is a Internet filtering and parental control software program It allows you to control and monitor your child’s use of the Internet Features: • Filter harmful websites and newsgroups • Restrict Internet time to a predetermined schedule • Decide which programs can have internet access • Limit the amount of data that can be sent or received to/from your computer • Block e-mails, online chats, instant messages and P2P connections containing , , g g inappropriate words • Set different levels of restrictions for every member of your family depending on their maturity, interests, habits, and parental control needs • Monitor your child’s use of the Internet, irrespective of where you are; in the neighboring room, at work, or even on vacation hb k • Get detailed Internet activity logs Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. CyberSieve: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. BSafe Internet Filter BSafe is a Internet filtering software which allows you to monitor your child’s use of I t hild’ f Internett Features: • Filters unwanted online adult content • Customize your list of allowed Websites • Monitors & logs chat room conversations • Monitors & logs Instant Messaging • McAfee Anti-Virus & Anti-Spyware available py • Provides protection of personal & private data • SPAM Filter & Popup Blocker Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. BSafe Internet Fileter: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Stop-the-Pop-Up Lite Stop-the-Pop-Up Lite is a pop-up blocker that blocks all annoying pop-up windows from appearing as you surf the web It kills all pop ups from file sharing p g p p p g programs and the spyware/adware that py / are bundled with these peer-to-peer programs It supports Kazaa, Kazaa Lite, Morpheus, Grokster, iMesh, Xolox, and Direct Connect It kill the new b d of pop-ups called ' kills h breed f ll d 'Messenger Service spam‘ i ‘ It also recognizes and kills hostile activeX controls from companies known to develop spyware or adware Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Stop-the-Pop-Up Lite: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. WebCleaner WebCleaner is a program that prevents annoying sponsors PopUp's when you visit some web sites With features such as the Smart Check Popup Engine, WebCleaner can kill all kinds of typical ads popups It can also block any Web content (advertising images or Flashes) you do not want Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. WebCleaner: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. AdCleaner AdCleaner is a program that blocks floating ads and new form popups It cleans and auto blocks over 5600 Adwares,Spywares It is easy to use, default settings , and hotkeys supported Cleans all form of IE ads including: • General popup ads • Modeless dialog popup ads • Winhelp popup ads • Unfathered popup ads • Floating ads • Animated ads • Fl h ads Flash d • Uncached image ads Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. AdCleaner: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Adult Photo Blanker Adult Photo Blanker blanks objectionable adult images and movies i d i It monitors Internet activity and protects the user f from h harmful objectionable content f l bj i bl It is compatible with all browsers and e-mail p programs It intercepts attempts to open files and checks p p p them for objectionable content It works with all widely used formats of images and movie files Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. Adult Photo Blanker: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. LiveMark Family LiveMark Family enables you to block access to web sites that are inappropriate for children i i f hild You can choose from two filtering levels ( g (under 12 or over 12 y years old) and ) also select the topics that should be filtered (pornography, violence etc.) There filtering i done automatically based on th criteria set b th software Th filt i is d t ti ll b d the it i t by the ft It has the option to override certain sites and specifically allow or block them based on your personal preference It also includes an option to limit Internet access to certain times of the day Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. LiveMark Family: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. KDT Site Blocker KDT Site Blocker is an easy to use tool to block y access to certain websites It works with any browser (IE, Firefox, Opera etc.) It automatically displays a generic ‘blocked’ page whenever a blocked site is accessed To block a site, you need to add the domain name to the li h list Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. KDT Site Blocker: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Internet Safety Guidelines for Children Educate children about the Internet and their dangers g Bookmark child-friendly web sites Teach children not to give personal information over the Internet Teach children never to open an email from unknown person Never allow children to meet with someone on online session and chat rooms Teach children never to respond to an unsubscribe on a pornographic email Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 51. Summary An Internet filter is a p ece o software that helps to b oc out te et te s piece of so t a e t at e ps block unwanted content such as pornography and hate group sites Filters use a list of keywords and well-known URLs to keep children from accessing inappropriate material Filters prevent children from deliberately or inadvertently access pornography Filters allow kids to surf online without constant parental presence Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited