Table of Contents
Overview
Timetable
Daily Time Limits
Traffic Limits
Logs & Charts
Users & Groups
Main Settings
Internet Filtering
iProtectYou Client
Silent Installation
Deploy iProtectYou
Command Line
Uninstall

|
<< Previous Page Next Page >>
|
Changing iProtectYou Settings
Screen Shot
|
Settings
Changing the Administrator's Password
To prevent unauthorized access to the control panel of the iProtectYou program and changing your settings by any
other person, you should set up an administrator's password.
To change the administrator's password, push the "Change Password" button and enter your new password.
Saving Internet Content on the Hard Drive
It is possible to save all Internet content (all data sent from and received by your computer) on
the hard drive. To select the location for that content, mark the "Save content in" checkbox
and enter a file name where the Internet content should be stored.
For heavy Internet traffic the content file can reach a huge size, so you should clean out the file from time to time.
Working in Surveillance Mode
It is possible to run iProtectYou in the surveillance mode and record all online activities of users on your computer.
To enable this feature, mark the "Surveillance Mode" checkbox and close the Control Panel. Unmarking this checkbox will disable the surveillance mode.
- Advantages of surveillance mode:
Does not block any Web Site, E-mail or Instant Message and does not show any warning message. Only logs user's online journey
and sends you notification e-mails with attached screen-shot so you can understand your family member's online behavior
and create the best protection plan for them.
After switching into the Surveillance Mode, the iProtectYou Control Panel icon will not be visible in the tray menu (near the clock).
To open the iProtectYou Control Panel, you should click Start, point to Programs, point to iProtectYou, and then click Control Panel.
Or you should click Start, point to Run..., type ipycp.exe and press Enter.
Working in Invisible Mode
It is possible to run iProtectYou in the Invisible mode.
Although there will be no external sign of iProtectYou functioning, the program will defend your kids, blocking inappropriate content.
To enable the invisible mode, mark the "Invisible Mode" checkbox and close the Control Panel. Unmarking this checkbox will disable the Invisible mode.
After switching into the Invisible Mode, the iProtectYou Control Panel icon will not be visible in the tray menu (near the clock). To open the iProtectYou Control Panel, you should click Start, point to Programs, point to iProtectYou, and then click Control Panel. Or you should click Start, point to Run..., type ipycp.exe and press Enter.
Prohibition of IP Address Use as URL
As you may know, any resource on the Internet can be reached either by the host name (for example, www.msn.com)
or directly by its IP address (for example, 207.68.172.246). Using the IP address to get access to some
resource decreases the possibilities to control it. Such a circumstance is independent of the iProtectYou's developers
and includes the following limitations in the case of using IP addresses:
- Ability to check the link by URL pattern is significantly limited.
- Possibility of checking a URL by template (like *.msn.com) is significantly limited.
- In this case the only sensible means is to check the IP address itself. This procedure is rather unreliable,
because many Web Servers with suspicious content change their hosting frequently,
and as a result, their IP address is changed as well.
That is why we recommend you to prohibit using IP addresses as URLs to increase your security level.
Disable Time Checking
The program can check if the user has changed the system time, with a periodicity of 2 min. There is also an option of no control at all. The time change monitoring feature will be effective if an administrative password was set up and Timetable and Time Limit features are on.
Exporting Settings
It is possible to save your settings including items that you added to lists while you customized
your iProtectYou Pro. To export your settings into a temporary XML
file, push the "Export Settings" button. You will be asked for the location of this file.
You will be asked about saving your settings during un-installation as well.
Importing Settings
To import your previously exported settings, push the "Import Settings" button.
You will be asked for the location of this file.
Customizing Proxy Server
If you connect to the Internet through a proxy server, you should instruct iProtectYou what proxy server name to use for the activation and database update procedures.
By default, the program uses the same proxy server settings as for Internet Explorer.
To customize them, push the "Proxy" button and make the changes. See the chapter "Proxy Server" for more information.
|
<< Previous Page Next Page >>
|
|