Register  Login login
username

password


remember me



Register | Lost password?

The following software definitions should help you decide what type of software will be the best tool.

FEATURE

DEFINITION

Types of Software

Blocking/Filtering Software

A computer program that prevents access to websites, web pages, or applications based on criteria such as keyword analysis or inclusion on a blacklist

Monitoring Software

A computer program that tracks and logs computer and Internet activity, usually including websites visited, applications launched, and email, chat, and Instant Message communications

Parental Controls

A term used to describe tools that allow parents to choose appropriate content for their children to view on their computer and the Internet

Web Filtering Methods

Dynamic Keyword Analysis

Defining objectionable content by identifying keywords within a web page

Dynamic URL Analysis

Defining objectionable content by identifying keywords within the web address (URL) of a web page

Managed URL List

A predefined and regularly updated list of objectionable websites created by the developer of the monitoring/filtering software

Filtering/ Recording Capabilities

Websites

Blocking websites or pages by web address (URL)

Selectable Filter Categories

Choosing to block specific types of content based on predefined categories, such as pornography, violence, gambling, hate, etc.

Blacklist

A user-created list of ‘bad’ websites or email addresses to be blocked

Whitelist

A user-created list of ‘good’ websites or email addresses to be allowed

Web Surfing Recording

The ability to capture and log websites visited, including site address, username, time on site and identification of the domain name.

Keystroke Recording

A feature that records all keystrokes typed in chat rooms, emails, passwords, etc.

Chat Messager Recording

The ability to monitor and record both sides of chat room conversations

Custom Keywords (Keyword Detection)

A user-created list of words used to define objectionable content

Management

Remote Install

A feature that has the ability to install software from a remote location

Remote Monitor

The ability to access (via a web interface or email) monitoring logs and other information from a computer other than the one being monitored.

Realtime Monitoring

The ability to access monitoring logs and other information as data is being collected

User Profiles

Customized settings to accommodate the varying protection needs of different users of the same computer

Password Logging

A feature that captures all passwords used to access websites or any application

Email Alerts

Automated email messages sent to a specified address when certain keywords, events, or actions are triggered

Spyware Detection Disable

A feature that will detect if spyware is on and provides an option to disable the software

Visuals

 

Screen Shot Recording

The ability determine frequency and type of screen shots recorded.

Screen Shot Slide Show

Feature option to capture screen shots like a slideshow and viewed as if you watched what occurred in real time

Additional Features

Time Limit Controls

Settings that prevent a user from accessing the Internet after a time allotment has been exceeded or during specified times.

Prevent Specific Programs from Running

The ability to prevent specific applications from being launched

Stealth Mode

A feature that allows the software to run undetected

Immediate Override

A feature that allows an authorized user to temporarily circumvent protection features to view a blocked website or launch a blocked application

Monitor Without Filtering

The ability to monitor web activity (browsing, searches) without blocking any sites

Peer-to-Peer (P2P) Recording

A feature that records P2P downloads, i.e. Kazaa, Limewire, and Gnutella.

File Transfer Protocol (FTP)

Records files transferred or uploaded using FTP over the network