Kids and the Internet

Do you know what your kids are doing online? Our kids are exposed to so much more than we were at the same age, it’s important to be aware of what they are doing and who they are talking to. As a single mom I’m always short on time, finding time to check up on Hailey online was hard, but it was necessary. On Facebook I see so many young girls posting pictures of themselves that would make their parents furious, if their parents were aware. You have to be aware. It is so easy for online predators to target … Continue reading

What Do Men and Women Look for in an Affair?

If you want to protect your marriage from outside affairs, it might be helpful to understand what men and women look for when it comes to an affair. Usually (although not always!) there is something lacking in a relationship that prompts an affair. Affairs can be complicated things, so I don’t want to suggest that things are black and white or that any of these reasons justify having an affair. But numerous studies have suggested that men and women generally are looking for different things, depending on gender, when they are ready to become involved in an affair. I don’t … Continue reading

Japan Warns Parents about Kids and Cell Phones

In Japan, concern about cell phones has nothing to do with cancer. Instead, the focus is on the dangers that cell phones pose to children. In fact, the Japanese government feels that the threat is so real, that it is starting a program to warn parents and schools that they must restrict cell phone use among children. In Japan, cell phones are packed with features, such as high speed Internet access, although Masaharu Kuba, a government official overseeing the new program told the Associate Press (AP) that �Japanese parents are giving cell phones to their children without giving it enough … Continue reading

Identity Theft Threat to iTunes Users

Users of the popular Apple iTunes online music store may find themselves the victim of stolen identity theft. That is because a new crop of thieves are out to target iTunes users, and so far have had some limited success. The identity theft threat to iTunes users comes in the form of “Phishing,” a technique that has long been seen connected to online banking, PayPal, Ebay and mainstream retail stores. Until now, no one seems to have dared to touch Apple, but recently, however, that has changed. Phishing is a term used to describe the strategy that crooks use to … Continue reading

Are Cookies Tracking You?

When surfing the Internet, are you worried about cookies tracking your every movement and reporting it back to the bad guys, or advertisers (also sometimes known as the bad guys)? How can something with such an innocuous name strike fear and annoyance into the heart of Internet users? Cookies first appeared on the web to help websites keep track of certain data or preferences to help increase the load time of websites or to serve up appropriate content. Since that time, users have been cautious about cookies, or just plain angry that they are there. But does the average cookie … Continue reading

Computing Week in Review: January 14th Through January 20th

Have you heard the news about the new ultra portable laptop? And don’t choose the wrong high definition format for your movies or you can find yourself lost and alone. All of that information is here in the review for last week’s computing articles. January 14th Computing Week in Review: January 7th Through January 13th This week we have focused on televisions and high definition electronics, along with a bit of news from Apple, including a possible new iPhone. Did you miss any of these articles? Check them out right here. Protect Your Kids! Cell Phones and Predators Cell phones … Continue reading

Protect Your Kids! Cell Phones and Predators

Cell phones provide an easy path to your child from sexual predators. You should know how to protect them. Most parents know all about children, sexual predators and the Internet. We protect our children by installing firewalls and monitoring software and blocking software. We keep the computer in a communal area of the house and watch our kids when they are online. We think that we have done everything we can to create a wall between predators and our kids. But one think we fail to do, by the thousands, is to protect them from predators getting in through their … Continue reading