Table of Contents
 Daily Time Limits
 Traffic Limits
 Logs & Charts
 Users & Groups
 Main Settings
 Internet Filtering
 iProtectYou Client
 Silent Installation
 Deploy iProtectYou
 Command Line

<< Previous Page      Next Page >>  


 Screen Shot

Now advanced users can get the full power of iProtectYou by managing the list of Trusted and Blocked ports. This allows you to work around the problem of receiving inappropriate content through HTTPS proxy servers. HTTPS connections use encrypted data, making it impossible to check. Using an HTTPS proxy server used to allow the user to get inappropriate content even when blocking was turned on. Now you can prevent this bypass by adding HTTPS port (443) into the "Blocked Ports" list. Also, you can stop iProtectYou from checking outgoing e-mails by adding SMTP port (25) into the "Trusted Ports" list.

To prevent a communication through a particular port from being checked and possibly blocked by iProtectYou because of an inappropriate word, use the "Trusted Ports list.

If you would like to block access to a particular service (for example to HTTPS proxy server), add this port to the "Blocked Ports list".

If somebody sends SPAM e-mail or messages with inappropriate content to the address of your kid, then iProtectYou blocks all mail till you manually delete the questionable e-mail directly from the server.
E-mail checking is turned off by default because the restrictions are tight. Therefore, the following ports were added to the Trusted Ports List: 25 (SMTP), 110 (POP3), 143 (IMAP).
In order to have the filtering function on, you can delete these ports from Trusted Ports List or disable them and use the Replacing Inappropriate Words panel.

All rules for Trusted and Blocked ports affect only the group/user that was selected for adding or editing. In other words, these lists are group-dependent. To add a rule affecting all users, select "All Users" while adding or editing.

When you open any of these lists, you can see rules for the selected group of users only. Rules affecting all groups will be displayed at the end of the list. Mark the "Hide All Users" checkbox if you don't want to see rules affecting all groups.

Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

Every time a port is filtered, the iProtectYou icon of the system tray near the clock changes its color to red. You can see the whole list of blocked Ports in the "Warnings Log" of iProtectYou.

      We do not recommend you to mark the check box of the "Only these Ports are allowed" list unless you are absolutely sure what are you doing. Blocking particular ports can cause failure in functionality for some programs. Periodically review the Warnings log and add, if necessary, needed blocked ports into the "Trusted Ports" list. Avoid adding port 80 onto the "Trusted Ports" list, otherwise iProtectYou will not block web pages with inappropriate content.

      Remember that iProtectYou controls both outgoing and incoming traffic. For example, if you blocked port 1120, usually used by some Instant Messengers for incoming messages, then all requests to use this port will be blocked by iProtectYou and will add the records into the warnings log.

<< Previous Page      Next Page >>

About SoftForYou   Privacy   Legal   Contact Us

Copyright  20002011  SoftForYou