Surf Your Values
button). While the in tention may be to go back later and fine-
lime the configuration to your needs, major changes are seldom
made after initial setup. My point: try to get it r igh t the first time
by reading through the instructions (which may b e on the product
website) before the installation. Most reputable companies also
have toll-free numbers that you can call for help.
The first important question in installation a n d configuration
is this: Who will be the systems administrator? Or, in other words,
who has the passwords to make changes, bypass filters, delete the
logs, even turn off or change which websites are blocked? In most
families, this usually becomes the parent who is the most technically
qualified. While this makes for a smoother installation, be careful.
This is an area where many families and offices first get into trouble.
While there is no easy answer here, talk about how you want things
to work before you assign roles. Temptations will certainly come for
the smartest technical person in the house or workplace, so honesty
and transparency is essential in this discussion. One possible solution
includes using accountability software that keeps track of all configura
tion changes and sends activity to trusted partners (in another family
or work area). Another solution is using filtered Internet provided
by your ISP or external provider. But no matter what choices you
make, someone will likely be able to make changes, just as with paren
tal controls on your TV. Talk through different situations to reduce
temptations for Internet, TV, and cell phone access.
One problem that many home PC users run into is preventing
anti-spyware software or other programs from overwriting or dis
abling your Web filtering software. While this is fairly easy to fix
(by configuring your anti-spyware software to allow and not remove
Web filtering or accountability software), watch out for members of
the family or “helpful colleagues” at the office who use this excuse
to disable Web filtering in the name of security. Once again, if all
else fails, call your security vendor to get help.
Step 4. Maintaining the Technology
Once your software is configured and everything is working, a
process is needed to keep the technology updated and working
-►149 « -