Bakalá Bakalářská Práce

Total Page:16

File Type:pdf, Size:1020Kb

Bakalá Bakalářská Práce MASARYKOVA UNIVERZITA FAKULTA INFORMATIKY Analýza a testování softwarových produkt ů na úrovni prohlíže če pro řešení problematiky ochrany d ětí před nevhodným obsahem na Internetu BAKALÁ ŘSKÁ PRÁCE Radek Janá ček Brno, 2011 Prohlášení: Prohlašuji, že tato práce je mým p ůvodním autorským dílem, které jsem vypracoval samostatn ě. Všechny zdroje, prameny a literaturu, které jsem p ři vypracování používal nebo z nich čerpal, v práci řádn ě cituji s uvedením úplného odkazu na p říslušný zdroj. ......................................................... Pod ěkování: Děkuji panu prof. RNDr. Václavu Matyášovi, M.Sc., Ph.D. za cenné rady, ochotu a vedení práce. Shrnutí Cílem této bakalá řské práce je zmapování sou časné situace v oblasti ochrany d ětí p řed nevhodným obsahem na Internetu s d ůrazem na prohlíže če pro d ěti a addony do b ěžn ě používaných prohlíže čů . V teoretické části práce jsou vymezeny hranice problematiky a ilustrován sou časný stav situace. Následn ě jsou popsána teoretická východiska obecného i technického charakteru, jednotlivé filtra ční úrovn ě a metody filtra čních technik. V praktické části je z kategorie prohlíže čů pro d ěti i kategorie addon ů do b ěžn ě používaných prohlíže čů vybráno n ěkolik typických zástupc ů, kte ří jsou podrobeni d ůkladné analýze a test ům funk čnosti s d ůrazem na bezpe čnostní a filtra ční vlastnosti. Klí čová slova Bezpe čnost d ětí na Internetu, filtra ční software, prohlíže če pro d ěti, addony do b ěžn ě používaných prohlíže čů , strojové u čení, dolování znalostí z dat, metody rozpoznání obrazu. Obsah ÚVOD 1. VYMEZENÍ PROBLEMATIKY 1.1. Koho je pot řeba ochránit? .......................................................................................................... 1 1.2. Definice nevhodného obsahu ..................................................................................................... 1 1.3. Jak vážná je sou časná situace? ................................................................................................... 3 2. TEORETICKÁ ŘEŠENÍ 2.1. Ochrana v širším kontextu ......................................................................................................... 5 2.2. Obecná charakteristika řešení problematiky technickými prost ředky ....................................... 5 2.3. Úrovn ě filtrování ........................................................................................................................ 6 2.4. Metody filtrování ....................................................................................................................... 7 2.5. Příliš tenká hranice mezi vhodným a nevhodným obsahem .................................................... 12 3. ÚVOD K PRAKTICKÉ ČÁSTI 3.1. Sou časná situace na poli ochran .............................................................................................. 13 3.2. Úvod k analýze a testování ...................................................................................................... 14 3.3. Popis analytických prací .......................................................................................................... 14 3.4. Popis metod testování .............................................................................................................. 15 3.5. Záv ěre čné zhodnocení ............................................................................................................. 21 4. ADDONY DO BĚŽNÝCH PROHLÍŽE ČŮ 4.1. AOL Safety Toolbar (Analýza) ............................................................................................... 22 4.2. AOL Safety Toolbar (Testování) ............................................................................................. 24 4.3. FoxFilter (Analýza) .................................................................................................................. 28 4.4. FoxFilter (Testování) ............................................................................................................... 30 4.5. PC Chaperone (Analýza) ......................................................................................................... 34 4.6. PC Chaperone (Testování) ....................................................................................................... 36 4.7. Web of Trust (Analýza) ........................................................................................................... 40 4.8. Web of Trust (Testování) ......................................................................................................... 42 5. PROHLÍŽE ČE PRO DĚTI 5.1. Cerberus Browser (Analýza).................................................................................................... 45 5.2. Cerberus Browser (Testování) ................................................................................................. 46 5.3. Internet Explorer Content Advisor (Analýza) .......................................................................... 47 5.4. Internet Explorer Content Advisor (Testování) ....................................................................... 49 5.5. MyKids Browser (Analýza) ..................................................................................................... 50 5.6. MyKids Browser (Testování) .................................................................................................. 52 5.7. Noah’s Web Browser (Analýza) .............................................................................................. 56 5.8. Noah’s Web Browser (Testování) ........................................................................................... 58 ZÁV ĚR ........................................................................................................................................... 61 LITERATURA ............................................................................................................................... 62 PŘÍLOHY P1. Seznam typických zástupc ů klí čových slov použitých p ři testování................................... 64 P2. Co je na Internetu v České republice nelegální ................................................................... 66 P3. Seznam nalezených prohlíže čů pro d ěti .............................................................................. 67 P4. Seznam nalezených addon ů do b ěžn ě používaných prohlíže čů .......................................... 69 Úvod První filtry Internetu za čaly být ve v ětší mí ře instalovány do domácích po číta čových stanic ve druhé polovin ě devadesátých let dvacátého století. Tedy nedlouho poté, kdy bylo 30. dubna roku 1993 organizací CERN oznámeno, že bude WWW technologie zdarma otev řena široké ve řejnosti. [20] Hlavním impulsem pro vznik prvních softwarových ochran byl tehdejší rozmach voln ě p řístupných webových stránek s pornografickou tématikou, které za čaly být d ětem a mladistvým jednoduše dostupné z domova, ze škol či knihoven. S rapidním nárůstem uživatel ů Internetu a s nimi i WWW stránek se však brzy p řišlo na to, že pornografie není zdaleka jediný obsah, který lze nalézt na Internetu a který je pro děti a mládež nevhodný či dokonce nebezpe čný. Postupem času se obsah webu rozrostl natolik, že jej lze s trochou nadsázky ozna čit za zrcadlo spole čnosti a to v kladném, ale bohužel p řevážn ě záporném významu. Pro ilustraci uve ďme pojmy jako d ětská pornografie, video záb ěry mu čení či vražd nebo návody k výrob ě drog. Tato otev řenost a p řístupnost m ůže být p řínosem pro duševn ě vysp ělého a racionáln ě uvažujícího člov ěka, který si chce ud ělat vlastní médii nezkreslený obraz o sociáln ě patologických jevech ve spole čnosti, p řípadn ě pro organizace potírající nelegální činnost, nikoli však pro dít ě, které není schopno zobrazený obsah adekvátn ě vyhodnotit. Ten by pak mohl výrazn ě narušit jeho správný duševní vývoj či v n ěm dokonce vyvolat pocit, že je toto chování normální a správné. [1] Úplný zákaz p řístupu dít ěte k Internetu však bezpochyby řešení nep ředstavuje. Mimoto, že může být Internet pro d ěti v mnoha sm ěrech užite čný a při získávání informací pro studijní účely často mnohem efektivn ější než ostatní média, je ze sou časného vývoje Internetu patrné, že jeho používání bude pro následující generace již nezbytné, a proto by byl úplný zákaz práce na Internetu pro správný vývoj dít ěte nikoli jen kontraproduktivní, ale s nejv ětší pravd ěpodobností také neuskute čnitelný. Tuto tezi potvrzuje i fakt, že mnoho škol se již dnes snaží p řejít na pln ě elektronický styl výuky. Po řad ě výzkum ů potvrzujících závažnost situace si ší ři problematiky za čali uv ědomovat krom ě nevládních a vládních organizací také výrobci softwaru a hardwaru. Také proto lze v sou časné dob ě na trhu nalézt celou řadu nástroj ů, které mají za úkol nevhodný obsah detekovat a filtrovat d říve, nežli se objeví v prohlíže či před zraky dít ěte. Od druhé poloviny devadesátých let dvacátého století se po čet filtra čních metod a hlavn ě samotných produkt ů rozrostl natolik, že by pro komplexní pohled a adekvátní otestování typických zástupc ů z každé kategorie nebyl na stránkách bakalá řské práce dostate čný prostor. Pro praktickou část práce tedy byli vybráni pouze zástupci kategorie prohlíže čů pro d ěti a addon ů do b ěžn ě používaných prohlíže čů . Výb ěr kategorií byl ovlivn ěn faktem, že jsou tyto typy ochran u uživatel ů vysoce oblíbené, což lze p řisuzovat jejich jednoduché instalaci a nízké cen ě. Samotná práce je rozd ělena do pěti větších kapitol. První tři jsou založeny ryze teoreticky, druhé dv ě prakticky. První kapitola se v ěnuje
Recommended publications
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux
    Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux To cite this version: Thomas Gerbet, Amrit Kumar, Cédric Lauradoux. Safe Browsing Services: to Track, Censor and Protect. [Research Report] RR-8686, INRIA. 2015. hal-01120186v1 HAL Id: hal-01120186 https://hal.inria.fr/hal-01120186v1 Submitted on 4 Mar 2015 (v1), last revised 8 Sep 2015 (v4) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux RESEARCH REPORT N° 8686 February 2015 Project-Teams PRIVATICS ISSN 0249-6399 ISRN INRIA/RR--8686--FR+ENG Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux Project-Teams PRIVATICS Research Report n° 8686 — February 2015 — 25 pages Abstract: Users often inadvertently click malicious phishing or malware website links, and in doing so they sacrifice secret information and sometimes even fully compromise their devices. The purveyors of these sites are highly motivated and hence construct intelligently scripted URLs to remain inconspicuous over the Internet. In light of the ever increasing number of such URLs, new ingenious strategies have been invented to detect them and inform the end user when he is tempted to access such a link.
    [Show full text]
  • Security and Privacy for Outsourced Computations. Amrit Kumar
    Security and privacy for outsourced computations. Amrit Kumar To cite this version: Amrit Kumar. Security and privacy for outsourced computations.. Cryptography and Security [cs.CR]. Université Grenoble Alpes, 2016. English. NNT : 2016GREAM093. tel-01687732 HAL Id: tel-01687732 https://tel.archives-ouvertes.fr/tel-01687732 Submitted on 18 Jan 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE` Pour obtenir le grade de DOCTEUR DE L’UNIVERSITE´ DE GRENOBLE Specialit´ e´ : Informatique Arretˆ e´ ministerial´ : 7 aoutˆ 2006 Present´ ee´ par Amrit Kumar These` dirigee´ par Pascal Lafourcade et codirigee´ par Cedric´ Lauradoux prepar´ ee´ au sein d’Equipe´ Privatics, Inria, Grenoble-Rhoneˆ Alpes et de l’Ecole´ Doctorale MSTII Security and Privacy of Hash-Based Software Applications These` soutenue publiquement le 20 octobre, 2016, devant le jury compose´ de : Mr. Refik Molva Professeur, Eurecom, President´ Mr. Gildas Avoine Professeur, INSA Rennes, Rapporteur Mr. Sebastien´ Gambs Professeur, Universite´ du Quebec´ a` Montreal,´ Rapporteur Mr. Kasper B. Rasmussen Professeur associe,´ University of Oxford, Examinateur Ms. Reihaneh Safavi-Naini Professeur, University of Calgary, Examinatrice Mr. Pascal Lafourcade Maˆıtre de Conference,´ Universite´ d’Auvergne, Directeur de these` Mr.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • 2008 New Media M&A Round-Up
    2008 New Media M&A Round‐Up The Year in Digital Media Mergers, Acquisitions & Capital Raises PEACHTREE MEDIA ADVISORS, INC. N EW M EDIA I NVESTMENT B ANKING EACHTREE EDIA DVISORS NC P M A , I . Better Service ▪ Lower Fees New Media Mergers & Acquisitions TABLE OF CONTENTS I. Internet/New Media M&A Transactions by Sector 1 II. M&A Transactions & Capital Raised in 2008 12 III. 2008 Interactive Media Valuations/Comps 31 IV. Conclusion/2009 Outlook 37 V. Out‐of‐Home/Alternative M&A Transactions 38 VI. Conclusion/2009 Outlook 38 VII. 2008 OOH Valuations/Comps 41 Peachtree Media Advisors, Inc. Peachtree Media Advisors, Inc. is a New York based investment bank serving the out‐of‐ home and interactive marketing sectors of media. The company provides mergers, acquisitions and capital raise advisory services to lower middle‐market companies in the two fastest growing sectors of media. John Doyle, Managing Director & Founder, has been a media investment banker for more than 12 years; closed and structured more than 22 deals; and has a strong knowledge‐base of financial and strategic buyers in these sectors. If you are interested in learning more about valuation, positioning, preparation or the merger and acquisition process, please go to www.PeachtreeMediaAdvisors.com or contact John Doyle at (212) 570‐1009. John H. Doyle II Managing Director & Founder Peachtree Media Advisors, Inc. 50 Vanderbilt Ave., #30 New York, NY 10017 PH. 212.570.1009 ▪ FAX 646.607.1786 www.peachtreemediaadvisors.com Table of Contents Better Service ▪ Lower Fees New Media Mergers & Acquisitions Online Media M&A Activity in 2008 Although the Enabling, Analytics and Ad Serving category had the fourth highest In 2008, there were 707 merger, acquisition level of reported transaction value in 2008, and capital raise transactions in the online this category had the largest percentage sector of media (92 more transactions than increase in capital flowing to it than any the 615 in 2007).
    [Show full text]
  • Kennedy Says Underground Nuclear Tests to Continue
    1 *•». temperate* «& fat* Distffbifttofl *>**. F«lr teafe*, tonenw Today- •ad today. High today, raw sad Sunday In the Ms, low 21,150 tonlgfct IM5. See Weather, Page DIAL 741-0010 VOL. 86, NO. 26 Iua*4 auiy' xo^v through rndir. gioma ciui P«UH __ **" ** Jl"1 B<at ••* •» Ad«U«ul Miillni Otticei. RED BANK, N. J., FRIDAY, AUGUST 2, 1963 7c PER COPY PAGE ONE Kennedy Says Underground Nuclear Tests to Continue WASHINGTON (AP) - Presi- our professional experts would Senate Republican Leader Ev Kennedy said he doesn't see you wait long enough and you see Mansfield said he hopes the dent Kennedy's announcement the help materially in reaching a de- erett M. Dirksen of Illinois, who anything wrong in senators' long enough you have to do some- treaty to be signed Monday in United States will continue un- cision on the treaty," he said. remains uncommitted on the adopting a wait and see attitude thing and you have to vote 'yes' Mosoow can be brought before the derground weapons testing may 1 Senate Democratic Leader Mike or "no. Senate before Labor Day. He aid his drive for Senate ratifica- treaty, said among the man; toward the treaty, as many Re- Mansfield of Montana said in a said he thinks various commit- tion of the limited nuclear treaty. things senators will want to learn publicans and some Democrats 'My judgment is when the tes- separate interview he believes tees ought to complete their hear- Kennedy told his news confer- underground tests will provide from military leaders is "whether have.
    [Show full text]
  • Resources for Parents, Grandparents and Caregivers
    Resources for parents, grandparents, and caregivers Many sites include resources suitable for multiple age groups, parents, and educators. http://www.deletepredators.com/ - A Tennessee Police Project. This is a project of the Tennessee Association of Chiefs of Police. It has materials for children, parents, schools, and law enforcement. It has links to some materials from the NetSmartz organization. http://connectsafely.org/ -Forum is for parents, teens, educators, advocates - everyone engaged in and interested in the impact of the social Web. The site has tips for teens and parents, as well as other resources for safe blogging and social networking. http://www.ikeepsafe.org/ -The Internet Keep Safe Coalition is a broad partnership of governors and/or first spouses, attorneys general, public health and educational professionals, law enforcement, and industry leaders working together for the health and safety of youth online. iKeepSafe uses these unique partnerships to disseminate safety resources to families worldwide. Website has links to materials for educators, parents, and children. http://safekids.com/ - Guidelines for Parents of Pre-Teens http://www.kidzui.com/joinus/safety?term=1885916 -The KidZui browser was designed to offer kids the same expansive experience adults have on the web. KidZui brought together a team of over 200 teachers and/or parents to scour the web in search of the best content for kids. http://www.commonsense.com/internet-safety-guide/index.php - Keeping your kids Internet safe and smart http://www.staysafeonline.info/basics/family.html - Internet Safety for families and children by the National Cyber Security Alliance http://www.getnetwise.org/ - Safety Tips for Families by the Internet Education Foundation œ includes video tutorials http://www.fbi.gov/publications/pguide/pguidee.htm - A Parent‘s Guide to Internet Safety http://www.netbullies.com/pages/7/index.htm - Resources about Net Bullies http://www.stopcyberbullying.org/parents/index.html - Stop CyberBullying.
    [Show full text]
  • Hulsart Figures In; Gram
    10SSOUTH CO. BISTWICW FBSEUOW* H»J» • This Week COVERING TUWNHUIP8 O f HOLMDEL. JJAUIKON One Section MARLBORO MATAWAN . " ; '■ AND :■--■ ' 16 PAGES MATAWAN. DOAOUOB Member - M«mbor • • ei»t YEAR — 51st W EEK National Editorial Association M ATAW AN, N .J; THURSDAY, JUNE 16rt96Q New Jersey Praia AnocUUon Single Copy Ten Cent* ■ Ree Program Opens Phillips Mills Matawan High School Seniors In National Houpr. Society The summer recreation pro­ Hulsart Figures In; gram . l o r Matawan Township . will (tart on Monday at I «-m. Recreation Park at the CUfhvood Park Recreation 25 Acres Sold For : Acre Sector Voted Field. - The program Is open lo Murlboio Township Planning residents of Matawan Township it In Holmdel Twp, ' Hoard was unanimous .In'one thing ' von!yanA anychlidiromt-to-13- Association To Meet Tursduy, Ihnl the township needs yea»4f4ge who has not regis­ - Hoimdel TownfhJp s6on7may gain a 25-acre recreation cenUjr Tlie Mutawnn Township Taxpny- u Master Plan nnd voted to'rec* tered, and wishes to do so, is eiumelid Hits to Ihe township. Un­ asked to report at 8 a, in. Mob* clubhouse In tho Palmer Aye.-Mid- era Association will meet Tuesday dle . Rd. area. Mayor James H._ der the ruling of Monmouth Count/ day,— r-^—■ ....... •night at a p.m. ot .the Oak Shades Judge J .‘Edward Ascher In tha Daniel J . ■■ Stanklewicz, rec- Ackerson could only inrorm spec­ Fjro Hwsw, A speaker will '.be tators at the tov^nshfp meeting Holmdel tnil-ncro lot'size cttsi', .tha ' reatlon dlrector. annoUnced lhe picscnt from the Ntny Jersey Tak- governing body could keep duvol-.
    [Show full text]
  • PC-Sztrájk? 2011 Legjobb Szoftverei 7 Így Találja
    DVD DVD Letöltés: legális vagy illegális? 2 Friss 9 GB 2011 A LEGÚJABB DRIVEREK, HASZNOS PROGRAMOK, 32 A HÓNAP JÁTÉKAI, EXKLUZÍV CSOMAgok… Szoftverek, filmek, zenék: a legjobb legális forrásokból, a legtitkosabb helyekről R A böngészője egy spion? Amit az Internet Explorer GO DIGITAL! és a Firefox elárul Önről R 46 2011/2 _ CHIPONLINE.HU PC-sztrájk? 2011 legjobb szoftverei 7 Így találja 45 friss teljes verzió mind magyar nyelven! meg a hibákat! Értékelés, elemzés, javítás: így oldja meg saját maga a PC-problémákat – lépésről lépésre R 24 Lassú DSL? Tíz tipp, CHIP 2010 A teljes évfolyam ami azonnal segít PDF-ben a DVD-n Exkluzív: tippjeink most gyűjthető formában R 56 EFI: az új szupergyors BIOS Az EFI-vel a PC-je: gyorsabb, biztonságosabb, hatékonyabb – részletesen bemutatjuk R 30 MICROSOFT, GOOGLE, APPLE 98 Újra firss registry R A profik kedvence most a CHIP DVD-jén. Hatékony és megbízható takarítás Ki gyártja a legjobb okostelefont? 1995 Ft, előfizetéssel 1395 Ft Teszt: Windows Phone 7, iPhone és tsai. XXIII. évfolyam, 2. szám, 2011. február >> PC >> sztrájk Az >> App-biznisz Az >> új szuper BIOS Letöltések: >> legális vagy illegális? Szörf >> a kanapéról Minden >> fáj megnyitható Kémkedik >> a böngészője? A legújabb>> LCD-tévék Gyermekek >> biztonságban Kiadja a Motor-Presse Budapest Lapkiadó Kft. Frankreich, Spanien, Portugal, Italien: EUR 6,80 Benelux: EUR 5,80 Griechenland: EUR 7,20 Dänemark: DKK 50,- Slowenien: EUR 6,70 Vezércikk HA ÖN EGY ANDROIDOS MOBILTELEFON VAGY EGY IPHONE TULAJDO- NOSA, bizonyára szembesült már azzal a ténnyel, hogy ha nem figyel, Szerkesztői ajánlat ezek az apró programok egész egyszerűen befurakodnak az életébe.
    [Show full text]
  • Download but Allow In-App Purchases
    FINDING CAMELITTLE: CHILDRENS TELEVISION IN A DIGITAL AGE ____________________________________________________ A Thesis Presented to The Honors Tutorial College Ohio University ____________________________________________________ In Partial Fulfillment Of the Requirements for Graduation From the Honors Tutorial College With the degree of Bachelor of Science in Media Arts and Studies ____________________________________________________ By Ryan H. Etter June 2011 FINDING CAMELITTE 2 This thesis is dedicated to all those who have worked in children’s entertainment before me. From the Saturday morning cartoons, to feature length movies, I would like to thank the people who not only gave me a childhood, but also gave me passion and direction as an adult. FINDING CAMELITTE 3 Table of Contents INTRODUCTION……………………………………………………………………4 CHAPTER 1: THE INDUSTRY………….………………………………………….8 CHAPTER 2: MAKING AN ANIMATED PROGRAM………………….………...16 CHAPTER 3: DEVELOPING CONTENT IN A DIGITAL AG…………………….24 CHAPTER 4: THE AUDIENCE………………..……………………………………43 CHAPTER 5: CAMELITTLE…………..……………………………………………51 REFERENCES………………….……………………………………………………73 CAMELITTLE PILOT DVD…………………………………………………Appendix FINDING CAMELITTE 4 Finding Camelittle: Children’s Television in a Digital Age Long ago and far away there was a land called Camelot. It was a kingdom ruled by the great king Arthur who was a virtuous and wise monarch. His reign was presented as idyllic and he was considered the model ruler. Many have used the imagery of Arthur’s Camelot to describe prosperous times in history, from the JFK presidency to the “Golden Age of Television.” For young children, the world is shaped by much smaller things than presidents or politics and, for myself; the world existed not only in my home or at school, but in the wonderfully imaginary places created in cartoons.
    [Show full text]
  • You Can Childproof Your Computer 27 February 2009, by Anne Krishnan
    You can childproof your computer 27 February 2009, By Anne Krishnan Every few months, I receive a question from a problems by restricting certain user accounts' reader whose computer was never the same after access to the control panel and designating safe a grandchild came to visit. Web sites for surfing. One computer's default language switched from Finally, the beauty of separate user accounts in English to German. Another could no longer Windows is that you can limit one or more people's launch Firefox. A third mysteriously lost its sound. access to the system resources, with no additional software required. For instance, by creating a user While it's difficult to figure out what buttons a child account for the kids, you can prevent your might have pressed or clicked to cause these grandchildren from being able to download problems, there are a number of ways that you can software to the system and protect your personal protect your computer while still allowing the kids files so the kids can't destroy them. to play on it. To open a new account in Windows XP, first log in Many computer problems can be attributed to kids' as "Administrator." Open the "Start" menu, click on indiscriminate Web surfing. Adults (hopefully) know "Control Panel" and double-click on "User to be careful in cyberspace, but children are more Accounts." Click on "Create New Account" and likely to invite any old malware home for dinner. enter a name for the account. KidZui is a Web interface that limits children's Now select the "Limited" radio button (the little surfing to a pre-approved set of Web sites, circle) at the top of the screen.
    [Show full text]