web analytics
November 26, 2014 / 4 Kislev, 5775
At a Glance
Judaism
Sponsored Post
IDC Herzliya Campus A Day on Campus

To mark IDC Herzliya’s 20th anniversary, we spent a day following Prof. Uriel Reichman, IDC’s founder and president, and Jonathan Davis, VP for External Relations, around its delightful campus.



Q & A: Internet Filters For The Orthodox Jew


QuestionsandAnswers-logo

Editor’s Note: In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications. Without a doubt, the Internet offers many wonderful opportunities, but it also presents substantial dangers for young and old alike. We believe Rabbi Student’s constructive advice and assistance will serve our readership well. The fact is that we can’t hide our heads in the sand; the Internet is often vital to our lives, especially in the work place, which is often Internet-related and dependent.

Internet Filters For The Orthodox Jew

I. Introduction

Filters are an important tool in responsibly using the Internet. Without a filter, someone browsing the web may accidentally stumble onto, or in a moment of weakness intentionally go to, objectionable websites which may contain any of the following: pornography, gambling, gaming, profanity, lashon hara, counter-religious ideas or pictures/videos objectionable to Orthodox Jews. A filter will prevent that access or at least make it more difficult. However, filters are totally useless without attendant computer security, which we will also briefly discuss. What follows are explanations and recommendations I put together and had reviewed by a techie.

II. Filtering Methods

There are three methods of filtering: time control, content filtering, and content control. Time control sets limits on the time Internet access is available. For example, you can allow it only between the hours of 8 and 9 p.m. or on Sundays from 3 to 5 p.m. This can help prevent overuse of the Internet and also ensure that people only access the Internet when others are likely to be awake and may walk into the room.

Content filtering blocks websites that are deemed objectionable. Black lists contain addresses for offensive websites that are blocked. These are generally compiled by a combination of algorithm and human evaluation. Often, filters allow you to add your own list of blocked sites (for example, you can decide to block SportsIllustrated.com). They also allow you to choose entire categories to block or allow, such as social networking.

In contrast, white lists contain addresses of permissible sites that a user adds to it. The rest of the Internet is blocked. Each website must be approved before passing through the filter.

Content control actively changes objectionable content on a website. It may block pictures or change profane words to a string of punctuation marks. Ad blocking software is an important example of content control.

Filters have to be smarter than just blocking URLs and must use a combination of methods to ensure that content that is supposed to be blocked actually is. To my knowledge, there is no way you can fully accomplish this, but you can get pretty close to airtight.

III. Filter Types

There are four types of filter structures for consumers: browser-side, client-side, router-side, and ISP-side. A browser-side filter is either a web browser or a browser add-on that limits your access to the web in any of the three methods discussed above. In order for these to be effective, users must have limited ability to install and uninstall add-ons and new programs. Otherwise, they can easily disable the filtering capabilities or install an unfiltered browser or other program that accesses the web.

A client-side filter is installed on a computer (or device) and limits all access to the web from that computer. These sometimes slow the computer down, but they are harder to deactivate than browser-side filters and regulate all programs on the computer.

An ISP-side filter limits the Internet access provided to a customer. If the ISP successfully blocks content, the customer cannot access it through any program, on any device. These filters require a special Internet provider that usually lacks the same scale of operation (and therefore cannot offer cheap prices) as the large, unfiltered Internet services.

A router-side filter also limits the Internet access received by a customer, including wireless connections at home. Unlike an ISP-side filter, the customer installs this. It is generally somewhat complex to install but more powerful than a browser-side or client-side filter.

IV. Activity Monitoring

Another function many filters provide is the ability to monitor online activity. There are three types of activities often monitored: website visits, search terms, and social network activity. The results can either be saved and available for an administrator to access (pull) or sent via e-mail to the administrator (push). The latter includes “buddy” monitoring, in which a user selects someone to receive a detailed list of online activity. Social network monitoring is particularly important for parents who wish to ensure that their children are not sharing information that should be kept private.

About the Author: Rabbi Gil Student writes frequently on Jewish issues and serves as editor-in-chief of TorahMusings.com. Rabbi Student previously served as managing editor of OU Press and still maintains a connection to the publisher but did not work on this book in any way.


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

7 Responses to “Q & A: Internet Filters For The Orthodox Jew”

  1. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  2. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  3. Charles Harding says:

    I pray for.

  4. Charles Harding says:

    I pray for.

  5. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  6. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  7. Deepak Mehra says:

    IM Lock is a security application which acts as a parental lock for certain web services or applications. The motive behind developing this application was to block adult content websites and applications that can be dangerous for our children, such as instant messaging programs or email clients, porn and downloading content.
    ry this site, it may help you. Goodluck! http://www.comvigo.com/

Comments are closed.

SocialTwist Tell-a-Friend

Current Top Story
President Obama overlaid against photo of Jonathan Pollard.
The Hidden Reason the United States Won’t Release Pollard.
Latest Judaism Stories
Dante's Vision of Rachel and Leah

Yitzhak called you Esav and you answered him, then he called you Yaakov and you also answered him!”

Rabbi Avi Weiss

Yitzchak thought the Jewish people needed dual leadership: Eisav the physical; Yaakov the spiritual

Weiss-112114-Sufganiot

According to the Sefer Yetzirah, the nature of the month of Kislev is sleep.

Teller-Rabbi-Hanoch-NEW

Though braggarts come across as conceited, their boasting often reflects a low sense of self-regard

Not every child can live up to our hopes or expectations, but every child is loved by Hashem.

Leaders must always pay attention to the importance of timing.

While our leaders have been shepherds, the vast majority of the Children of Israel were farmers.

Maimonides himself walked and prayed in the permissible areas when he visited Eretz Yisrael in 1165

If a man dies childless, the Torah commands the deceased’s brother to marry his brother’s widow in a ceremony known as yibum, or to perform a special form of divorce ceremony with her known as chalitzah.

Dovid turned to the other people sitting at his table. “I’m revoking my hefker of the Chumash,” he announced. “I want to keep it.”

Ever Vigilant
‘When Unworthy, One’s Number Of Years Is Reduced’
(Yevamos 50a)

Question: My young daughter was recently diagnosed with autism. She does not function well socially and is extremely introverted, but we have noticed that she reacts very well to small animals. We reported this to her therapist who suggested that we get a dog or cat as a pet. We know that most religious people frown upon having pets, but we hate to see our daughter suffer and want to do anything that would make her happy. Would it be okay to own a pet in the circumstances we described?

Her Loving Parents
(Via E-Mail)

Ramban interprets Korban as self-sacrifice, each Jew should attempt to recreate Akeidas Yitzchak.

Dr. Schwartz had no other alternatives up his sleeve. He suggested my mother go home and think about what she wanted to do.

Why does Lavan’s speaking before his father show that he was wicked? Disrespectful, yes. Rude, certainly. But a rasha?

More Articles from Rabbi Gil Student
We are always in His presence

If we can learn to fear the surveillance of the Internet, we can learn to fear God’s constant watching.

Rabbi Gil Student

Traditional Jewish texts clearly discuss men and women as categories – as distinct groups – even though individual men and women vary.

There must be an Orthodox presence and an Orthodox refusal to attend Limmud NY.

I am from the generation that never saw or heard the Rav but lived in his shadow, feeling his recently departed presence in his students’ lectures. My poverty in this sense pales in comparison to that of the next generation, who have only a distant notion of who this great man was and his sprawling impact.

The Internet is a medium that has made its way in its short existence all the way to the center of contemporary life. Many of our daily tasks are now tied to it, and will be more so in the future.

In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications.

Israel is a Jewish country – but can it continue to be so when Judaism threatens to destroy the state?

The unfair longstanding attacks on Israel’s legitimacy are a permanent stain on the international community. For over 60 years, Israel has valiantly grown under hostile conditions while fighting lies and half-truths in the international arena. Israel suffers doubly, however, when its very essence, its Jewish character, supports its opponents’ narrative.

There are two types of people in the world – those who are inspired by Mussar and those who are turned off by it.

Mussar is a school of study that teaches religious self-improvement. Traditional Mussar, as practiced in many yeshivas to this day, has a rabbi exhorting his listeners, often yelling at them, to be more careful in their actions and attitudes. This is frequently accompanied with a Torah insight and maybe even a good parable. But it can be scary: fire, brimstone, judgment day – all the horrible implications of religious failure, in graphic detail.

Printed from: http://www.jewishpress.com/judaism/ask-the-rabbi/q-a-internet-filters-for-the-orthodox-jew/2012/06/01/

Scan this QR code to visit this page online: