Ethical discussions aside, I'd agree that you should also use the built in Parental Controls in OSX. You can specifically list what programs your child can use, and what websites they can visit.
She was barred from using the computer for a year, but I found that it only made her use others in friends houses or around school. I'd rather she do whatever she's going to do on our own computer so we can at least keep an eye.
you should set up your kid's account to have limited privileges. Go in under your "administrator" login and turn change their account to "managed." You can control which websites they can get to, which applications they can open, etc./QUOTE]
Parental Controls are probably the most under-utilized features of Tiger & Leopard. You can't follow your kids around all day, but you at least you can supervise -- and control -- their use of your home computer. BTW I hope your computer is located in a "public" area of your home.
Melinda said:She was barred from using the computer for a year, but I found that it only made her use others in friends houses or around school. I'd rather she do whatever she's going to do on our own computer so we can at least keep an eye.
Spectersoft Internet Monitoring Spy Software.
It does exactly what you need, it's available @ Apple Retail Stores I think.
All I'm doing is answering the question
-r
You can also use a keylogger for mac software. Google for " mac key logger" and you'll find it.
This is such the wrong way to go about checking what your children are doing on the internet.
Firstly, you do realize that in this day and age, 99% of child computer users know how to wipe the trail (history / cookies etc) of what they've been up to, hiding it from their generally computer illiterate parents?
Even if you get his / her password all it will do is log you onto their account, you'll most likely not find anything.
Instead, properly applying restrictions on their account and seeking a session logging program that you can view exactly what they've been up to would be a much wiser move.
If you know enough about what a keylogger it and how to use it, you should be in enough of a position to apply proper regulations on a child's account.
A successful child <-> parent relationship (yes, it is two way) is one built on trust & respect. He / she respects you enough to understand why such restrictions are put in place and you have trust in them and your child's use of what they are given access too.
Keylogging your own child is pretty grim.![]()
Are you really going to spy on your kid? just let him/her...
It's not "spying". It's called "parenting" and more parents should take such precautions, with so many predators out there! You're making assumptions that you know the child's age or behavior.... you don't! I applaud ANY parent who takes steps to protect their child from the dangers of the internet.
You have what proof exactly that an anonymous person who signs up to an internet forum asking where they can get software which enables them to surreptitiously view what a child is doing online is their parent?!
You accuse people of making assumptions of said child's age when you're equally making the assumption that this person is who they say they are. Rather hypocritical, don't you think? This could be a part time cleaner at a school with an unhealthy interest in the under 10s for all we know.
If a parent is that concerned about what their child is doing on the internet on the home computer (which as you say they have every right to be) then they should put the computer in a communal area where it is obvious what they are doing on it and/or restrict its use by other means. Keep it in a study with a lock on the door. Only have 1 login and keep the password for that login secret so you have to log the child in.
There are countless ways to restrict access for minors. THAT is parenting.
Asking how you can spy (yes, spy) on a child without them (or for that matter, any parent or person in loco parentis) knowing is more than a little dodgy, imho.
You wouldn't be so willing to part with information if someone came up to you out of the blue and asked you which children walk home from school on their own, now, would you?
If you actually take the time to read my post
...Parenting is leading by example. If you snoop around behind your child's back what do you think they're going to learn from you?![]()
... it's well known that in a large number of child abduction cases the kidnapper is known to the child and their family.
Also, as I previously pointed out, there is no proof in this instance to suggest the computer in question is actually a home computer. It could a school computer, a library computer, a youth club computer, an internet cafe... Anywhere a child could access the internet.
I'll admit my last sentence was badly worded and for that I apologise. It was a rhetorical question asked to highlight the similarities between the two scenarios of someone unknown asking how they can get clandestine access to a child and not an accusation based on your previous posting.
As for assuming that the OP is legit, I see it all the time in these forums. Someone claims they "forgot their password" or "just bought a Mac but don't have the install disks" or "want to wipe an old Mac so they can give it to their parents, but want to use install disks from another Mac". It's amazing how many will rush to offer details of how to do such things, when it's quite possible the OP is a thief who just stole someone's Mac and wants to hack into it.
Guys... you do realize you are arguing about a post that is 6 months old don't you...
Guys... you do realize you are arguing about a post that is 6 months old don't you... the OP posted 3 times and has been long gone
Woof, Woof - Dawg![]()