web analytics
July 24, 2014 / 26 Tammuz, 5774
Israel at War: Operation Protective Edge
 
 
At a Glance
Judaism
Sponsored Post
IDC Advocacy Room IDC Fights War on Another Front

Student Union opens ‘hasbara’ room in effort to fill public diplomacy vacuum.



Q & A: Internet Filters For The Orthodox Jew


QuestionsandAnswers-logo

Editor’s Note: In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications. Without a doubt, the Internet offers many wonderful opportunities, but it also presents substantial dangers for young and old alike. We believe Rabbi Student’s constructive advice and assistance will serve our readership well. The fact is that we can’t hide our heads in the sand; the Internet is often vital to our lives, especially in the work place, which is often Internet-related and dependent.

Internet Filters For The Orthodox Jew

I. Introduction

Filters are an important tool in responsibly using the Internet. Without a filter, someone browsing the web may accidentally stumble onto, or in a moment of weakness intentionally go to, objectionable websites which may contain any of the following: pornography, gambling, gaming, profanity, lashon hara, counter-religious ideas or pictures/videos objectionable to Orthodox Jews. A filter will prevent that access or at least make it more difficult. However, filters are totally useless without attendant computer security, which we will also briefly discuss. What follows are explanations and recommendations I put together and had reviewed by a techie.

II. Filtering Methods

There are three methods of filtering: time control, content filtering, and content control. Time control sets limits on the time Internet access is available. For example, you can allow it only between the hours of 8 and 9 p.m. or on Sundays from 3 to 5 p.m. This can help prevent overuse of the Internet and also ensure that people only access the Internet when others are likely to be awake and may walk into the room.

Content filtering blocks websites that are deemed objectionable. Black lists contain addresses for offensive websites that are blocked. These are generally compiled by a combination of algorithm and human evaluation. Often, filters allow you to add your own list of blocked sites (for example, you can decide to block SportsIllustrated.com). They also allow you to choose entire categories to block or allow, such as social networking.

In contrast, white lists contain addresses of permissible sites that a user adds to it. The rest of the Internet is blocked. Each website must be approved before passing through the filter.

Content control actively changes objectionable content on a website. It may block pictures or change profane words to a string of punctuation marks. Ad blocking software is an important example of content control.

Filters have to be smarter than just blocking URLs and must use a combination of methods to ensure that content that is supposed to be blocked actually is. To my knowledge, there is no way you can fully accomplish this, but you can get pretty close to airtight.

III. Filter Types

There are four types of filter structures for consumers: browser-side, client-side, router-side, and ISP-side. A browser-side filter is either a web browser or a browser add-on that limits your access to the web in any of the three methods discussed above. In order for these to be effective, users must have limited ability to install and uninstall add-ons and new programs. Otherwise, they can easily disable the filtering capabilities or install an unfiltered browser or other program that accesses the web.

A client-side filter is installed on a computer (or device) and limits all access to the web from that computer. These sometimes slow the computer down, but they are harder to deactivate than browser-side filters and regulate all programs on the computer.

An ISP-side filter limits the Internet access provided to a customer. If the ISP successfully blocks content, the customer cannot access it through any program, on any device. These filters require a special Internet provider that usually lacks the same scale of operation (and therefore cannot offer cheap prices) as the large, unfiltered Internet services.

A router-side filter also limits the Internet access received by a customer, including wireless connections at home. Unlike an ISP-side filter, the customer installs this. It is generally somewhat complex to install but more powerful than a browser-side or client-side filter.

IV. Activity Monitoring

Another function many filters provide is the ability to monitor online activity. There are three types of activities often monitored: website visits, search terms, and social network activity. The results can either be saved and available for an administrator to access (pull) or sent via e-mail to the administrator (push). The latter includes “buddy” monitoring, in which a user selects someone to receive a detailed list of online activity. Social network monitoring is particularly important for parents who wish to ensure that their children are not sharing information that should be kept private.

V. Choosing a Filter

Consumers who choose a filter need to balance simplicity and effectiveness. Most people are not technologically savvy and prefer easy installations and minimal options. There are a number of robust filters available for a small charge. You can find a comparison of their features at http://Internet-filter-review.toptenreviews.com. Additionally, some filters with fewer features are available for free. One popular filter is K9 Web Protection. For computers, K9 provides a client-side filter with time control and content control, category blocking, ad blocking, black list, white list, and website activity monitoring.

All browser-based and client-side filters allow an administrator to override the blocking by entering a password. If you find a site that you believe is unobjectionable to be blocked, you enter your password to access it by overriding the filter’s control. This means that you must guard your password and change it regularly. Do not let your children see you type it in or give them any clue by which they can discover it. If you do, you have compromised your entire filtering system.

VI. Mobile Devices

Filtering mobile devices is more complicated than a computer because you cannot install a filter. Corporations that filter their mobile devices do so at the server level (similar to ISP-based filters), which average consumers cannot do. However, many mobile devices incorporate parental settings (“Restrictions” on iPods, iPhones and iPads) that serve as client-side filters. Learn how to use them. For example, you can set your iPhone restrictions (protected with a 4-digit password) to disable or limit music, movies and apps. However, be aware that a motivated child can easily bypass all these restrictions.

For browser-side filtering, you must disable the built-in browser Safari and download a filtered browser like K9, SafeEyes or McGruff. In order for this to work, you must also disable the downloading of apps. Otherwise, your child can easily download an unfiltered browser. Again, a child can easily bypass this restriction and re-enable Safari. OpenDNS is one free router-side filter that works on your home wifi network.

VII. Computer Security

None of these filters will accomplish anything if a user can easily deactivate them. At a bare minimum, you have to make sure that no users have “admin” control and therefore have only limited ability to install and uninstall programs. Create a separate administrator account for which only you have the password and make sure that all other users have limited rights.

Guard your passwords. Pick one that your children cannot easily guess, do not let your children watch you enter it, and change it regularly.

For iPods and similar devices, it is best to share an iTunes account with your children so you know what apps they are downloading. However, you have to occasionally check in order to monitor.

VIII. Filters Are Not The Answer

To my knowledge, no commercially available filters reach the standards of Orthodox Judaism. In particular, they do not block lashon hara and counter-religious websites. However, other than that, you can use the Internet without having to see ads or being able to reach inappropriate websites.

Be aware, though, that filters can be bypassed by motivated, clever people. You need to use filters along with security measures and other precautions, such as placing computers in public areas like the kitchen and educating toward healthy and proper use, not least of which is maintenance of privacy. Net Nanny lists the following top ten Internet safety tips (see there for more elaboration):

1) First educate yourself, then your child 2) Teach children the obvious identity rules 3) Install an Internet filter or family safety software 4) Know the dangers associated with sites your children frequent 5) Teach children what to do if they encounter pornography on a home or public computer, such as at a school or a library 6) Manage your children’s time on the Internet 7) Set specific Internet guidelines for your children to live by and consistently enforce consequences, if they are not being followed 8) Keep computers out of children’s bedrooms and in open areas 9) Create a relationship with your children that is conducive to open communication 10) Understand Internet Privacy Policies as they apply to your child

There are many websites and books about “family friendly” Internet use that are worth exploring. Google “family friendly Internet” for a wealth of resources.

About the Author: Rabbi Gil Student writes frequently on Jewish issues and serves as editor-in-chief of TorahMusings.com. Rabbi Student previously served as managing editor of OU Press and still maintains a connection to the publisher but did not work on this book in any way.


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

Please use the Facebook Tab below to leave your comment:

7 Responses to “Q & A: Internet Filters For The Orthodox Jew”

  1. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  2. Charles Harding says:

    The Oracles of HaShem /G-d came through The Jewish People. The Original branch.

  3. Charles Harding says:

    I pray for.

  4. Charles Harding says:

    I pray for.

  5. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  6. Charles Harding says:

    We All Must Pray for Israel and Shalom in Jerusalem.

  7. Deepak Mehra says:

    IM Lock is a security application which acts as a parental lock for certain web services or applications. The motive behind developing this application was to block adult content websites and applications that can be dangerous for our children, such as instant messaging programs or email clients, porn and downloading content.
    ry this site, it may help you. Goodluck! http://www.comvigo.com/

Comments are closed.

SocialTwist Tell-a-Friend

Loading Facebook Comments ...
Loading Disqus Comments ...
Current Top Story
Hamas terrorists often misfire their rockets that explode in Gaza civilians areas.
‘Hamas Fired from UN School Area and Prevented Evacuation’ Says IDF
Latest Judaism Stories
The-Shmuz

When Hashem first thought (if it could be) about creating the world, the middah of din was in operation.

Daf-Yomi-logo

Hallel On Purim?
“Its Reading Is Its Praise”
(Megillah 14a)

Grunfeld-Raphael-NEW

If the only person available to perform the milah on the eighth day is a person who is not an observant Jew, the milah should be postponed until a devout mohel is available.

It is apparent from the Maharsha that he does not see galus as atoning for killing accidentally; otherwise, this Gemara would not bother him.

It was found to be a giant deer tick living in her head – with its claws in her scalp.

While daydreaming about finding the perfect job, I never expected to be rewarded in spades for my aforementioned experience.

We are all entrusted with the mission of protecting our fellow Jews

Today, we remain Hashem’s nachal.

Will Your brothers go to war, while you sit (in peace) here? (Bamidbar 32:6)

Perhaps, just perhaps, we can relate to this: whenever we feel distant from Hashem, that is the Churban.

Over the next 2 weeks covering portion Matot and Maasei, Rabbi Fohrman will bring order to confusion.

Our home is in the center of the Holy Land, surrounded by (what else?) green hills and valleys.

“Sound fine,” said Mrs. Schwartz. “In the middle, paint their names, Shoshana and Yehonasan. He spells his name Yehonasan with a hei and is very particular about it!”

Question: I recently returned from a trip abroad and wanted to say HaGomel. When I mentioned this to the officers of my synagogue, however, they told me – as per the instructions of the synagogue’s rabbi – that I would have to wait until Shabbos to do so. I was not given any reason for this and did not wish to display my ignorance, so I quietly acquiesced. Can you please explain why I had to wait?

Name Withheld
(Via E-Mail)

More Articles from Rabbi Gil Student
We are always in His presence

If we can learn to fear the surveillance of the Internet, we can learn to fear God’s constant watching.

Rabbi Gil Student

Traditional Jewish texts clearly discuss men and women as categories – as distinct groups – even though individual men and women vary.

There must be an Orthodox presence and an Orthodox refusal to attend Limmud NY.

I am from the generation that never saw or heard the Rav but lived in his shadow, feeling his recently departed presence in his students’ lectures. My poverty in this sense pales in comparison to that of the next generation, who have only a distant notion of who this great man was and his sprawling impact.

The Internet is a medium that has made its way in its short existence all the way to the center of contemporary life. Many of our daily tasks are now tied to it, and will be more so in the future.

In light of all the attention that the recent Internet Asifa garnered, we thought it wise to offer this analysis on the subject by Rabbi Gil Student, founder of TorahMusings.com and former managing editor of OU Publications.

Israel is a Jewish country – but can it continue to be so when Judaism threatens to destroy the state?

The unfair longstanding attacks on Israel’s legitimacy are a permanent stain on the international community. For over 60 years, Israel has valiantly grown under hostile conditions while fighting lies and half-truths in the international arena. Israel suffers doubly, however, when its very essence, its Jewish character, supports its opponents’ narrative.

There are two types of people in the world – those who are inspired by Mussar and those who are turned off by it.

Mussar is a school of study that teaches religious self-improvement. Traditional Mussar, as practiced in many yeshivas to this day, has a rabbi exhorting his listeners, often yelling at them, to be more careful in their actions and attitudes. This is frequently accompanied with a Torah insight and maybe even a good parable. But it can be scary: fire, brimstone, judgment day – all the horrible implications of religious failure, in graphic detail.

    Latest Poll

    Do you think the FAA ban on US flights to Israel is political?






    View Results

    Loading ... Loading ...

Printed from: http://www.jewishpress.com/judaism/ask-the-rabbi/q-a-internet-filters-for-the-orthodox-jew/2012/06/01/

Scan this QR code to visit this page online: