Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Rolling my own parental controls in Linux

ZekeSMZ (874386) writes | about 7 years ago

Enlightenment 0

ZekeSMZ (874386) writes "It's been a year since I made the switch from windows to Ubuntu, and I can safely say I'm never going back. One of the best things I've done is to set up an Edubuntu system for my kids — ages 4 and 2. With applications such as Supertux, TuxPaint, G Compris, Stellarium and even Kolf, they amuse themselves for hours with the machine and can't damage it like they can a Windows box.

Now that my 4 year old is learning to read and type, I'd like to set up some form of parental controls on my network. I consider myself a moderately competant Linux user, but I do not have anything approaching the skills of the talented sysadmins I've worked with over the years. So, I'd like to reach out to the Slashdot community for advice on how to lock down my network so that they won't accidentally bump into the seedier side of the web.

What are the best firewall apps to use for internal filtering? Do (or could) any of them support pro-active whitelisting, where I could get an email with a blocked URL that my kids tried to visit, and in response — I set up a rule to allow or deny access to the URL. This is a fairly mainstream feature of various parental control software out there, how could a similar solution be set up in Linux?

I'm going to assume that my kids are smarter than me and will one day figure out how to own the network. You get bonus points if you can give pointers on setting up a dual system, one that they can hack, and one that is running in the background in silent or stealth mode to monitor activity. My intent here is not to be big brother, but rather a responsible parent."

cancel ×

0 comments

Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...