web analytics
August 30, 2014 / 4 Elul, 5774
At a Glance
Judaism
Sponsored Post
Jerusalem Mayor Nir Barkat (L) visits the JewishPress.com booth at The Event. And the Winners of the JewishPress.com Raffle Are…

Congratulations to all the winners of the JewishPress.com raffle at The Event



Q & A: Internet Filters For The Orthodox Jew


QuestionsandAnswers-logo

Editor’s Note: In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications. Without a doubt, the Internet offers many wonderful opportunities, but it also presents substantial dangers for young and old alike. We believe Rabbi Student’s constructive advice and assistance will serve our readership well. The fact is that we can’t hide our heads in the sand; the Internet is often vital to our lives, especially in the work place, which is often Internet-related and dependent.

Internet Filters For The Orthodox Jew

I. Introduction

Filters are an important tool in responsibly using the Internet. Without a filter, someone browsing the web may accidentally stumble onto, or in a moment of weakness intentionally go to, objectionable websites which may contain any of the following: pornography, gambling, gaming, profanity, lashon hara, counter-religious ideas or pictures/videos objectionable to Orthodox Jews. A filter will prevent that access or at least make it more difficult. However, filters are totally useless without attendant computer security, which we will also briefly discuss. What follows are explanations and recommendations I put together and had reviewed by a techie.

II. Filtering Methods

There are three methods of filtering: time control, content filtering, and content control. Time control sets limits on the time Internet access is available. For example, you can allow it only between the hours of 8 and 9 p.m. or on Sundays from 3 to 5 p.m. This can help prevent overuse of the Internet and also ensure that people only access the Internet when others are likely to be awake and may walk into the room.

Content filtering blocks websites that are deemed objectionable. Black lists contain addresses for offensive websites that are blocked. These are generally compiled by a combination of algorithm and human evaluation. Often, filters allow you to add your own list of blocked sites (for example, you can decide to block SportsIllustrated.com). They also allow you to choose entire categories to block or allow, such as social networking.

In contrast, white lists contain addresses of permissible sites that a user adds to it. The rest of the Internet is blocked. Each website must be approved before passing through the filter.

Content control actively changes objectionable content on a website. It may block pictures or change profane words to a string of punctuation marks. Ad blocking software is an important example of content control.

Filters have to be smarter than just blocking URLs and must use a combination of methods to ensure that content that is supposed to be blocked actually is. To my knowledge, there is no way you can fully accomplish this, but you can get pretty close to airtight.

III. Filter Types

There are four types of filter structures for consumers: browser-side, client-side, router-side, and ISP-side. A browser-side filter is either a web browser or a browser add-on that limits your access to the web in any of the three methods discussed above. In order for these to be effective, users must have limited ability to install and uninstall add-ons and new programs. Otherwise, they can easily disable the filtering capabilities or install an unfiltered browser or other program that accesses the web.

A client-side filter is installed on a computer (or device) and limits all access to the web from that computer. These sometimes slow the computer down, but they are harder to deactivate than browser-side filters and regulate all programs on the computer.

An ISP-side filter limits the Internet access provided to a customer. If the ISP successfully blocks content, the customer cannot access it through any program, on any device. These filters require a special Internet provider that usually lacks the same scale of operation (and therefore cannot offer cheap prices) as the large, unfiltered Internet services.

A router-side filter also limits the Internet access received by a customer, including wireless connections at home. Unlike an ISP-side filter, the customer installs this. It is generally somewhat complex to install but more powerful than a browser-side or client-side filter.

IV. Activity Monitoring

Another function many filters provide is the ability to monitor online activity. There are three types of activities often monitored: website visits, search terms, and social network activity. The results can either be saved and available for an administrator to access (pull) or sent via e-mail to the administrator (push). The latter includes “buddy” monitoring, in which a user selects someone to receive a detailed list of online activity. Social network monitoring is particularly important for parents who wish to ensure that their children are not sharing information that should be kept private.

V. Choosing a Filter

Consumers who choose a filter need to balance simplicity and effectiveness. Most people are not technologically savvy and prefer easy installations and minimal options. There are a number of robust filters available for a small charge. You can find a comparison of their features at http://Internet-filter-review.toptenreviews.com. Additionally, some filters with fewer features are available for free. One popular filter is K9 Web Protection. For computers, K9 provides a client-side filter with time control and content control, category blocking, ad blocking, black list, white list, and website activity monitoring.

All browser-based and client-side filters allow an administrator to override the blocking by entering a password. If you find a site that you believe is unobjectionable to be blocked, you enter your password to access it by overriding the filter’s control. This means that you must guard your password and change it regularly. Do not let your children see you type it in or give them any clue by which they can discover it. If you do, you have compromised your entire filtering system.

VI. Mobile Devices

Filtering mobile devices is more complicated than a computer because you cannot install a filter. Corporations that filter their mobile devices do so at the server level (similar to ISP-based filters), which average consumers cannot do. However, many mobile devices incorporate parental settings (“Restrictions” on iPods, iPhones and iPads) that serve as client-side filters. Learn how to use them. For example, you can set your iPhone restrictions (protected with a 4-digit password) to disable or limit music, movies and apps. However, be aware that a motivated child can easily bypass all these restrictions.

For browser-side filtering, you must disable the built-in browser Safari and download a filtered browser like K9, SafeEyes or McGruff. In order for this to work, you must also disable the downloading of apps. Otherwise, your child can easily download an unfiltered browser. Again, a child can easily bypass this restriction and re-enable Safari. OpenDNS is one free router-side filter that works on your home wifi network.

VII. Computer Security

None of these filters will accomplish anything if a user can easily deactivate them. At a bare minimum, you have to make sure that no users have “admin” control and therefore have only limited ability to install and uninstall programs. Create a separate administrator account for which only you have the password and make sure that all other users have limited rights.

Guard your passwords. Pick one that your children cannot easily guess, do not let your children watch you enter it, and change it regularly.

For iPods and similar devices, it is best to share an iTunes account with your children so you know what apps they are downloading. However, you have to occasionally check in order to monitor.

VIII. Filters Are Not The Answer

To my knowledge, no commercially available filters reach the standards of Orthodox Judaism. In particular, they do not block lashon hara and counter-religious websites. However, other than that, you can use the Internet without having to see ads or being able to reach inappropriate websites.

Be aware, though, that filters can be bypassed by motivated, clever people. You need to use filters along with security measures and other precautions, such as placing computers in public areas like the kitchen and educating toward healthy and proper use, not least of which is maintenance of privacy. Net Nanny lists the following top ten Internet safety tips (see there for more elaboration):

1) First educate yourself, then your child 2) Teach children the obvious identity rules 3) Install an Internet filter or family safety software 4) Know the dangers associated with sites your children frequent 5) Teach children what to do if they encounter pornography on a home or public computer, such as at a school or a library 6) Manage your children’s time on the Internet 7) Set specific Internet guidelines for your children to live by and consistently enforce consequences, if they are not being followed 8) Keep computers out of children’s bedrooms and in open areas 9) Create a relationship with your children that is conducive to open communication 10) Understand Internet Privacy Policies as they apply to your child

There are many websites and books about “family friendly” Internet use that are worth exploring. Google “family friendly Internet” for a wealth of resources.

About the Author: Rabbi Gil Student writes frequently on Jewish issues and serves as editor-in-chief of TorahMusings.com. Rabbi Student previously served as managing editor of OU Press and still maintains a connection to the publisher but did not work on this book in any way.


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

7 Responses to “Q & A: Internet Filters For The Orthodox Jew”

  1. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  2. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  3. Charles Harding says:

    I pray for.

  4. Charles Harding says:

    I pray for.

  5. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  6. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  7. Deepak Mehra says:

    IM Lock is a security application which acts as a parental lock for certain web services or applications. The motive behind developing this application was to block adult content websites and applications that can be dangerous for our children, such as instant messaging programs or email clients, porn and downloading content.
    ry this site, it may help you. Goodluck! http://www.comvigo.com/

Comments are closed.

SocialTwist Tell-a-Friend

Current Top Story
ISIS in Quneitra
Updates from Kuneitra, Syria [video]
Latest Judaism Stories
Taste-of-Lomdus-logo

First, how could a beis din of 23 judges present a guilty verdict in a capital punishment case? After all, only a majority of the 23 judges ruled in favor of his verdict.

Of paramount importance is that both the king and his people realize that while he is the leader, he is still a subject of God.

Daf-Yomi-logo

Untimely News
‘A Mourner Is Forbidden To Wear Shoes…’
(Mo’ed Katan 20b)

Questions-Answers-logo

Question: The Gemara in Berachot states that the sages authored our prayers. Does that mean we didn’t pray beforehand?

Menachem
Via Email

When a person feels he can control the destiny of other people, he runs the risk of feeling self-important, significant, and mighty.

Needless to say, it was done and they formed a great relationship as his friend and mentor. He started attending services and volunteered his time all along putting on tefillin.

He took me to a room filled with computer equipment and said, “You pray here for as long as you want.” I couldn’t believe my ears.

On Friday afternoon, Dov called Kalman. “Please make sure to return the keys for the car on Motzaei Shabbos,” he said. “We have a bris on Sunday morning and we’re all going. We also need the roof luggage bag.”

On Chol HaMoed some work is prohibited and some is permitted. According to some opinions, the work prohibition is biblical; according to others, it’s rabbinical.

If there is a mitzvas minuy dayanim in the Diaspora, then why is there a difference between Israel and the Diaspora in the number of judges and their distribution?

Judaism is a religion of love but also a religion of justice, for without justice, love corrupts.

The time immediately preceding Mashiach’s arrival is likened to the birth pangs of a woman in labor.

Eisenhower understood that motivated men will fight much harder and longer than unmotivated men.

Who does not want to get close to Hashem? Yet, how do we do that?

More Articles from Rabbi Gil Student
We are always in His presence

If we can learn to fear the surveillance of the Internet, we can learn to fear God’s constant watching.

Rabbi Gil Student

Traditional Jewish texts clearly discuss men and women as categories – as distinct groups – even though individual men and women vary.

There must be an Orthodox presence and an Orthodox refusal to attend Limmud NY.

I am from the generation that never saw or heard the Rav but lived in his shadow, feeling his recently departed presence in his students’ lectures. My poverty in this sense pales in comparison to that of the next generation, who have only a distant notion of who this great man was and his sprawling impact.

The Internet is a medium that has made its way in its short existence all the way to the center of contemporary life. Many of our daily tasks are now tied to it, and will be more so in the future.

In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications.

Israel is a Jewish country – but can it continue to be so when Judaism threatens to destroy the state?

The unfair longstanding attacks on Israel’s legitimacy are a permanent stain on the international community. For over 60 years, Israel has valiantly grown under hostile conditions while fighting lies and half-truths in the international arena. Israel suffers doubly, however, when its very essence, its Jewish character, supports its opponents’ narrative.

There are two types of people in the world – those who are inspired by Mussar and those who are turned off by it.

Mussar is a school of study that teaches religious self-improvement. Traditional Mussar, as practiced in many yeshivas to this day, has a rabbi exhorting his listeners, often yelling at them, to be more careful in their actions and attitudes. This is frequently accompanied with a Torah insight and maybe even a good parable. But it can be scary: fire, brimstone, judgment day – all the horrible implications of religious failure, in graphic detail.

Printed from: http://www.jewishpress.com/judaism/ask-the-rabbi/q-a-internet-filters-for-the-orthodox-jew/2012/06/01/

Scan this QR code to visit this page online: