Board logo

subject: Content Filtering Information And Facts [print this page]


Technologies in content filtering have become essential to combat and censor particular materials on the web. Content filtering is an additional efficient tool in your arsenal. It proactively hinders websites which are known to consist of malicious code, "fake" websites that capture sensitive information, and those which are not business-related or appropriate. Content filtering is an immediate and urgent require in society.

America passed the Children's Internet Protection Act (CIPA) in December 2000, requiring schools and libraries to install content filtering to safeguard children. Filtering rules are typically set by a central IT department and might be implemented via software on individual computers or at a central point on the network like the proxy server or internet router . Depending on the sophistication of the system used, it may be feasible for various pc users to have different levels of web access. Content filtering is the most commonly utilized group of methods to filter spam . Content filters act either on the content, the information contained within the mail body, or on the mail headers (like "Subject:") to either classify, accept or reject a message.

Some software programs are much more flexible than others. To some extent, customization options ought to match your technical comfort level. If you're fairly new to utilizing computers, you might not feel daring enough to do a lot experimenting with the controls. On the other hand, a program that's highly customizable allows you to grow into it, as well as to adapt it to your family's changing needs. Block Page Bypass works by empowering you to assign individuals permission that permits them to bypass blocks and access designated Web sites. This extremely effective and efficient method of granting access on a per-user basis is superior to appliance-based services as it only performs a proxy function for blocked sites - improving performance although growing security.

IP blocking. Access to a particular IP address is denied. If the target Web website is hosted in a shared hosting server , all websites on the same server will be blocked. This affects IP-based protocols such as HTTP , FTP and POP . A typical circumvention method would be to discover proxies that have access to the target websites, but proxies might be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some big web sites like Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new IPs.

by: Rickson Seoson




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0