Parental Control and Internet Filtering Software English versionDeutsche Version
HOME   ARTICLES   SUPPORT   PARTNERS   PRODUCTS

  Requirements
  Support

  Useful Advice
  How It Works
  (network ver.)
  Set up Instructions
  (network ver.)
  Overview
  Getting Started
  Manual




Frequently Asked Questions
About iProtectYou

What is iProtectYou?
iProtectYou is an Internet filtering and Parental control software program that allows parents, schools, and libraries to protect children from harmful information on the Internet.

Who should use iProtectYou?
If your child's computer is connected to the Internet and you want to protect them from the many dangers which exist online, or if you are an administrator of a public school or library and you need efficient Internet Filtering software, then iProtectYou is the right solution for you.

General
  • I am a parent, what can iProtectYou do for me?
  • I am a network administrator; can I administer all installed copies of iProtectYou from my administrator's computer remotely?
  • Some of the programs such as online games may be slowed down or malfunction. What can I do?


  • Customizing iProtectYou
  • How do I open the iProtectYou Control Panel?
  • How do I activate iProtectYou?
  • How do I protect my settings from being viewed or changed by unauthorized persons?
  • How do I schedule Internet use to predetermined hours per day?
  • How do I limit the amount of data that can be sent or received from/to my computer per day?
  • How do I save all Internet traffic on the hard disk?
  • How do I customize the standard iProtectYou warnings?
  • How do I receive daily e-mails reports?
  • How do I run iProtectYou in the invisible mode?
  • How do I run iProtectYou in the surveillance mode?
  • How do I instruct iProtectYou to use a Proxy server provided by my ISP?
  • How do I update the iProtectYou built-in databases?
  • How do I receive notification e-mail when a blocked operation takes place?
  • How do I obtain my child's computer screenshot?


  • Working with Users and groups
  • How does iProtectYou identify users?
  • How do I prohibit anonymous access to the Internet?
  • How do I add new users into iProtectYou?
  • How do I set different level of restrictions for different users?


  • Working with Inappropriate Words
  • How do I stop bad language from reaching my child's computer?
  • How do I change the intensity level at which blocking begins?


  • Working with Web Sites
  • How do I block a certain category of Web Sites?
  • How do I block a particular Web Site?
  • How do I restrict a user to only a few specified Web Sites?
  • How do I prevent a Web Site from being blocked by iProtectYou?
  • What are the Web Sites patterns?


  • Working with News Groups
  • How do I block certain categories of News Groups?
  • How do I block a certain News Group?
  • How do I restrict users to only specified News Groups?
  • How do I prevent a News Group from being blocked by iProtectYou?
  • What are the News Group patterns?


  • Administering Internet Programs
  • How do I block a certain program from accessing the Internet?
  • How do I restrict a user to only a few specified Internet programs?
  • How do I prevent a program from being blocked by iProtectYou?


  • Working with Log Files
  • How do I view the list of blocked web sites, chats, or programs and determine the reason for blocking?
  • How do I view the history of visited Web Sites and News Groups?
  • How do I view the Programs Internet activity logs on my computer?
  • How do I get the amount of data that was sent/received by my computer?
  • How do I view the log files in the friendly form of charts or diagrams?


  • Troubleshooting
  • How do I check if iProtectYou is working properly?
  • What if I disabled iProtectYou for a while and now that I have turned it on again it does not block the content?


  • I am a parent. What can iProtectYou do for me?
    iProtectYou allows you to protect your children from widespread pernicious Internet content. iProtectYou filters web sites containing pornographic, satanic, extremist, etc. information. Also, iProtectYou allows you to limit Internet access time and amount of downloaded data to prevent your children from downloading pornographic films or non-licensed software. Moreover, iProtectYou has a built-in e-mail notification system. It will send you e-mail messages when any banned web site has been visited. You can receive a full copy of your child’s computer screen at the moment of blocking. This feature allows you to talk to the child immediately, which greatly increases the affect of your remarks, when your child has visited a banned web site.

    With iProtectYou you can:
    • Restrict your family members from visiting Web Sites and News Groups that may contain pernicious information.
    • Block e-mails, online chats, instant messages and P2P connections if they contain inappropriate words.
    • Set a schedule to specify days and times when the Internet activity is allowed.
    • Limit Internet Traffic to a specified amount of data that can be sent or received per user / per day.
    • Get notification e-mails with full description of blocked operations and an attached screen-shot of your child's computer to control them remotely.
    • Get daily reports with attached log files containing history of visited web sites and news groups, amount of data that has been sent or received, etc.
    • Get detailed information about your child's online activity.
    To get more information, please read iProtectYou User Manual or visit SoftForYou web site at www.softforyou.com

    Back to Top

  • I am a network administrator. Can I administer all installed copies of iProtectYou from my computer remotely?
    iProtectYou allows you to perform remote supervision over all installed copies of the software from a single administrator's PC.
    All changes made on the server, including database update, will be updated on the client computers after synchronization. So the administrator can control all iProtectYou copies from one computer, avoiding the need to adjust every client PC separately.

    Back to Top

  • Some of the programs such as online games may be slowed down or malfunction. What can I do?
    Put them into the 'Trusted program List' and restart them. This way the data processed by these programs will not be filtered.

    Back to Top

  • How do I open the iProtectYou Control Panel?
    After installation of iProtectYou on your computer, the iProtectYou icon - a blue knight's head - will appear in the system tray near the clock.
    If you use Windows XP and you can not see the icon, please click on the "circle with an arrow" icon near the clock to make the iProtectYou icon visible.

    To open the iProtectYou Control Panel, double-click on the iProtectYou icon, or alternatively, right-click on the icon to open the context menu and choose the "Open Control Panel" item.

    Back to Top

  • How do I activate iProtectYou?
    To activate iProtectYou, use the serial number you receive after buying a license from www.softforyou.com/ip-buy-it.php.
    Then, follow through these steps to activate iProtectYou: Double-click the iProtectYou icon - a knight's head that appears in the system tray near the clock. If you use Windows XP and you cannot see the icon, please click on the "circle with an arrow" icon near the clock to make the iProtectYou icon visible. If you have not activated iProtectYou, you will be prompted to activate your copy of the software. Enter your serial number and push the "Activate" button. You will get the "Activation completed successfully" message in a few seconds.

    Please note, if you are using HTTP proxy server, you should open the iProtectYou Control Panel and click on the Settings. After that push the "Proxy" button and instruct iProtectYou to use the proxy to connect to the Internet by entering the proxy name and port into the corresponding fields.
    If you are using a personal firewall, you should add iProtectYou to its Trusted Programs list or temporarily disable it.

    Back to Top

  • How do I protect my settings from being viewed or changed by non authorized persons?
    iProtectYou is a password protected program. To prevent unauthorized access to the control panel of the iProtectYou program and changing your settings by any other person, we strongly recommend you set up an administrator's password as soon as possible after installing iProtectYou.

    To change your password, open the iProtectYou Control Panel and click on Settings. In the opened window find "Administrators password" and click "Change". Type a new password and its confirmation, press OK.
    Using the security question/answer is the only way you can restore your password in case you forget it.
    We recommend that you change your password immediately after the iProtectYou installation.

    Back to Top

  • How do I schedule Internet use to predetermined hours per day?
    iProtectYou allows you to set up the time interval when users can have Internet access, or, on the contrary, the time interval when access will be prohibited by setting limitations per user / per day.

    To activate the Internet Timetable of the iProtectYou program, open the iProtectYou Control Panel and click on Settings. Then select the group you want to schedule and mark the "Enable Timetable" checkbox. Unmarking this checkbox allows you to turn off this option without losing the entered data.

    To deny Internet access at certain hours, just click on those hours once to make them red. To enable Internet access at these hours, click them once more. The cell should change its face color from red to green.
    By clicking on "Permit All" you can remove all restrictions. By clicking on "Forbid All" you can disable Internet access completely.

    Back to Top

  • How do I limit the amount of data that can be sent or received from/to my computer per day?
    iProtectYou allows you to set limitations for Internet traffic (the amount of data that can be sent or received) per user / per day.

    To activate the Traffic Limits, open the iProtectYou Control Panel and click on Settings. Then select the group you want to restrict and mark the "Enable Traffic Limits" checkbox.
    Then set the amount of data that can be sent or received for the specified days.
    Unmarking this checkbox allows you to turn off this option without losing the entered data.

    Back to Top

  • How do I save all Internet traffic on the hard disk?
    iProtectYou allows you to save all Internet content (all data sent or received by your computer) on the hard drive.

    To save the Internet content on the hard drive, open the iProtectYou Control Panel and click on Settings. Then mark the "Save content in" checkbox and select the location for that content by entering a file name where the Internet content should be stored.

    For heavy Internet traffic the content file can reach a huge size, so you should clean out the file from time to time.

    Back to Top

  • How do I customize the standard iProtectYou warnings?
    You can decide between two types of warning messages. The first variety contains large amusing pop-ups for kids, which are helpful to soften the affect of necessary restrictions. The other one includes more professional-looking small, auto-hiding pop-ups for adult users. You can customize the warning text (which will be displayed to user) in both variants. You can even customize the warning text for each users group.

    To customize the standard iProtectYou warnings, open the iProtectYou Control Panel and push the "Users and Groups" button. After that select the user group. You can choose the type of warning messages from the iProtectYou combo-box.
    You can select one from several entertaining themes for a series of images that will accompany warning messages.
    Use the "Warnings Theme" combo-box to select the theme.
    Click on the "Preview" button to review all available themes.

    Back to Top

  • How do I receive daily e-mails reports?
    An option to receive daily e-mails reports with attached log files is available for you. All log files will be archived into a single ZIP archive file and will be encrypted by provided password. iProtectYou uses its own built-in email system that will not leave any records in the Sent window of your e-mail program.

    To activate the Daily Reports, open the iProtectYou Control Panel, click on Settings and select the "E-mail Notifications" item. Mark the "Send Daily Report" checkbox. Enter the SMTP-server name in the "Outgoing e-mail server" field. Also enter your Reply e-mail address ("From" address) in the "Your e-mail address" and your Destination e-mail address ("To" address) in the "Recipients" field (for more than one address, divide them by commas or semicolons).
    You can enter the time for the Daily Report to be sent in the "Time" field.
    You should enter the "Password" field to provide the password protection for the Daily Report messages.
    We recommend that you test the Daily Report settings by pushing the "Test" button below the "Send Daily Report" checkbox.

    Back to Top

  • How do I run iProtectYou in the invisible mode?
    To enable the invisible mode, open the iProtectYou Control Panel and click on Settings. After that mark the "Invisible Mode" checkbox and close the Control Panel. Unmarking this checkbox will disable the invisible mode.

    After switching into the Invisible Mode, the iProtectYou Control Panel icon will not be visible in the tray menu (near the clock). To open the iProtectYou Control Panel, you should click Start, point to Programs, point to iProtectYou, and then click Control Panel.

    Back to Top
  • How do I run iProtectYou in the surveillance mode?
    It is possible to run iProtectYou in the surveillance mode and record all online activities of users on your computer.
    To enable the surveillance mode, open the iProtectYou Control Panel and click on Settings. After that mark the "Surveillance Mode" checkbox and close the Control Panel. Unmarking this checkbox will disable the surveillance mode.

    Advantages of surveillance mode:
    Does not block any Web Site, E-mail or Instant Message and does not show any warning message. Only logs user's activity and sends you notification e-mails with attached screen-shots so you can understand your family member's online behavior and create the best protection plan for them.

    After switching into the Surveillance Mode, the iProtectYou Control Panel icon will not be visible in the tray menu (near the clock). To open the iProtectYou Control Panel, you should click Start, point to Programs, point to iProtectYou, and then click Control Panel.

    Back to Top

  • How do I instruct iProtectYou to use a Proxy server provided by my ISP?
    A proxy server is a computer that stands between your computer and the Internet. When you ask for a web page, your computer connects to the proxy server and it is the computer that actually fetches the web page from the Internet for you.

    To change the proxy server settings, open the iProtectYou Control Panel and click on the Settings. After that push the "Proxy" button. If you do not want to use a proxy server at all, mark the "Direct" radio button. To customize the proxy server settings, mark the "Custom" radio button and then enter the proxy server address and port to the corresponding fields.

    Unless you are sure that you connect to the Internet with a proxy server and have all of the connection details, we recommend that you do not alter this screen in any way.

    Back to Top

  • How do I update the iProtectYou built-in databases?
    It is very important to keep your database up to date. Every day the Internet is filled with hundreds of new web sites and many of them will be undesirable. The database update capability is available for registered users only. The database update can be performed in the manual or scheduled mode.

    To customize the database update settings, open the iProtectYou Control Panel, click on the Settings and select the "Database Update" item.
    To choose the auto-update mode, mark the "Enable Database Auto-update" checkbox.

    If you choose the auto-update mode, use the "Frequency" box to select the periodicity of the operation.
    To update the database manually, use the "Update" button. Just after clicking on the button the update will follow.
    To cancel the update operation, click on the "Cancel" button.

    Back to Top

  • How do I receive a notification e-mail when a blocked operation takes place?
    You can set up the program so that it will send you e-mail notification of every warning produced by iProtectYou. The notification includes a description of the reason for blocking and a copy of the screen. The e-mail notification allows you to talk with your child in a timely fashion. This greatly increases the affect of your comments.

    iProtectYou uses its own built-in email system that will not leave any records in the Sent window of your e-mail program.

    To turn on e-mail notifications, open the iProtectYou Control Panel, click on the Settings and select the "E-mail Notifications" item. After that mark the "Send E-mail notification" checkbox.

    You should enter the SMTP-server name in the "Outgoing e-mail server" field. Also enter your Reply e-mail address ("From" address) in the "Your e-mail address" and your Destination e-mail address ("To" address) in the "Recipients" field (for more than one address, divide them by commas or semicolons).

    We recommend you to test the E-mail notification settings by pushing the "Test" button below the "Send Notification E-mail" checkbox.

    You can also receive a full copy of the screen at the moment of blocking. But you should take into account that an attached screen-shot in the JPEG format can reach a size of as much as 100-150 KB depending on screen resolution and color palette.

    Back to Top

  • How do I get my child’s computer screenshot?
    You can set up the program so that it will send you e-mail notification of every warning produced by iProtectYou.
    You can receive a full copy of your child’s computer screen at the moment of blocking. But you should take into account that an attached screen-shot in the JPEG format can reach a size of as much as 100-150 KB depending on screen resolution and color palette.
    To get screen-shots, you should turn on e-mail notifications (see "How do I receive a notification e-mail when a blocked operation takes place") and mark the "Attach screenshot to the E-mail" checkbox in the E-mail Notifications settings.

    Back to Top

  • How does iProtectYou identify users?
    The iProtectYou program identifies a user by the same login name user enters when he/she logs in to Windows. If you did not add a new login onto the user list of iProtectYou, the program will add them automatically to the "Guests" group.

    Back to Top

  • How do I prohibit anonymous access to the Internet?
    Since all unregistered iProtectYou users obtain the Guests group rights you should ban Internet access for the "Guests" group to prohibit anonymous access to the Internet.

    Open the iProtectYou Control Panel, push the "Users and Groups" button, choose the Guests group and mark the "Disable Internet" checkbox to prohibit anonymous access to the Internet.

    Back to Top

  • How do I add new users into iProtectYou?
    The iProtectYou program identifies a user by the same login name the user enters when he/she logs in to Windows. If you do not add a new login to the user list of iProtectYou, the program will add them automatically to the "Guests" group.

    Open the iProtectYou Control Panel, push the "Users and Groups" button, choose the group for your new user, push the "New User" button, enter the user name and push the "OK" button to add the user. Please note that the User Name and the User Windows login must be identical.

    You can move any user from one group to another using a drag & drop operation. The user's rights and settings will be changed according to the group.

    Back to Top

  • How do I set a different level of restrictions for different users?
    Administrators of iProtectYou are able to set up different levels of restrictions for different departments depending on the duties (sales, accountants, etc.).

    To facilitate the administration, iProtectYou allows you to unite users into groups and customize settings for a whole group. There is no need to customize every user's settings.

    You can move any user from one group to another using a drag & drop operation. The user's rights and settings will be changed according to the group.

    To add a new group, open the iProtectYou Control Panel, push the "Users and Groups" button, choose the group for your new user, push the "New Group" button, enter the group name and push the "OK" button.

    To add a new user, open the iProtectYou Control Panel, push the "Users and Groups" button, choose the group for your new user, push the "New User" button, enter the user name and push the "OK" button.

    Back to Top

  • How do I stop bad language from reaching my child's computer?
    The iProtectYou program provides you with the capability to block web pages, e-mails, online chats, instant messages and P2P connections if they contain inappropriate words. All inappropriate words are classified into five intensity levels depending on the acceptability level. That allows you to customize settings for each users group more precisely.

    At the time of blocking iProtectYou displays a small auto-hiding warning pop-up, but the word itself will not be displayed. The iProtectYou icon of the system tray near the clock changes its color to red. To see more detailed information about the interruption, please visit the "Log Files" page.

    To enable the iProtectYou inappropriate language protection open the iProtectYou Control Panel, click on Settings and select the "Inappropriate Words" item. Then push the "Customize" button, choose the users group for which the inappropriate language protection will be applied and mark the "Enable Inappropriate Words" checkbox.

    Please note that the iProtectYou inappropriate language protection is enabled by default.

    Back to Top

  • How do I change the intensity level from which blocking begins?
    The iProtectYou program provides you with the capability to block web pages, e-mails, online chats, instant messages and P2P connections if they contain inappropriate words. All inappropriate words are classified into four intensity levels depending on their offensiveness. That allows you to customize settings for each users group more precisely.

    You can set up the intensity level for each users group. All inappropriate words starting with this level will be blocked. Words with lower intensity level will not be blocked.

    You should open the iProtectYou Control Panel, click on the Settings and select the "Inappropriate Words" item. After that push the "Filtering Level" button, choose the users group for which the intensity level will be changed and mark the appropriate radio button to select the word intensity level from which you want the blockage to begin.

    Back to Top

  • How do I block a certain category of Web Sites?
    The built-in database of pre-selected forbidden web sites and news groups is divided into 15 categories to enhance filtering. You can include or exclude each category from filtering depending on your administrative and/or parental control needs.

    Open the iProtectYou Control Panel, click on Settings and select the "Web Sites" item. Push the "Built-in Database" link, then mark the "Enable Built-in Database" checkbox, choose the users group and mark or unmark categories, which you are going to include or exclude from filtering for the specified users group.

    Back to Top

  • How do I block a certain Web Site?
    If you discover some Web Site with unacceptable content that is not included in iProtectYou's built-in database, and you would like to block access to this Web Site, you can add it to the "Blocked Web Sites" list.

    Open the iProtectYou Control Panel, click on the Settings and select the "Web Sites" item. Then push the "Blocked Web Sites List" link, mark the "Enable Blocked Web Sites List" checkbox, select the users group and push the "Add" button. Enter the undesirable web site name, choose the users group and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I restrict users to only few specified Web Sites?
    You can restrict some users to only a few specified Web Sites. Access to any other web sites will be prohibited.


    Open the iProtectYou Control Panel, click on Settings and select the "Web Sites" item. Then push the "Trusted Web Sites List" link, select the user's group, mark the "Enable Trusted Web Sites List" and "Only these Web Sites are allowed" checkboxes, and push the "Add" button. Enter the permitted web site name, choose the user's group, and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I prevent a Web Site from being blocked by iProtectYou?
    If iProtectYou blocks a certain Web site for some reason but you consider the site viewable, you can add this web site to the "Trusted Web Sites" list to prevent it from being blocked by iProtectYou.

    Open the iProtectYou Control Panel, click on Settings and select "Web Sites" item. Then push the "Trusted Web Sites List" link, select the user's group, mark the "Enable Trusted Web Sites List" checkbox, and push the "Add" button. Enter the trusted web site name, choose the user's group, and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • What are Web Site patterns?
    iProtectYou provides you with a proprietary technology of checking web sites by template (pattern).
    You can enter some word that may be part of the web site's URL, and the program will block access to this resource, as if it belongs to the "Blocked Sites" list.

    Open the iProtectYou Control Panel, click on Settings and select "Web Sites" item. Then push the "Web Sites Patterns" link, select the user's group, and mark the "Enable Web Sites Patterns" checkbox.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I block certain categories of News Groups?
    The built-in database of pre-selected forbidden web sites and news groups is divided into 15 categories to improve filtering. You can include or exclude each category from filtering depending on your administrative and/or parental control needs.

    Open the iProtectYou Control Panel, click on Settings and select "News Groups".
    After that push the "Built-in Database" link, choose the users' group, and mark or unmark categories, which you are going to include or exclude from filtering for the specified users' group.

    Back to Top

  • How do I block certain News Group?
    If you discover some News Group with unacceptable content that is not included in iProtectYou's built-in database, and you would like to block access to this News Group, you can add it to the "Blocked News Groups" list.

    Open the iProtectYou Control Panel, click on Settings and select "News Groups". Then push the "Blocked News Groups List" link, select the user's group and push the "Add" button. After that enter the undesirable News Groups name, choose the user's group and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I restrict users to only specified News Groups?
    You can restrict some users to only a few specified News Groups. Access to any others news groups will be prohibited.

    Open the iProtectYou Control Panel, click on Settings and select the "News Groups" item. Then push the "Trusted News Groups List" link, select the user's group, mark the "Enable Trusted News Groups List" checkbox and "Only these News Groups are allowed" checkboxes, and push the "Add" button. Enter the permitted web site name, choose the user's group, and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I prevent a News Group from being blocked by iProtectYou?
    If iProtectYou blocks certain News Group for some reason but you consider this News Group viewable, you can add the News Group to the "Trusted News Groups" list to prevent the it from being blocked by iProtectYou.

    Open the iProtectYou Control Panel, click on Settings and select "News Group". Click on "Trusted News Groups List" link, select the user's group, mark the "Enable Trusted News Group List" checkbox and push the "Add" button. Enter the trusted News Group name, choose the user's group and push the "OK" button.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • What are News Group patterns?
    iProtectYou provides you with a proprietary technology of checking News Groups by template (pattern).
    You can enter some word that may be part of the News Group name, and the program will block access to this resource, as if it belongs to the "Blocked News Groups" list.

    Open the iProtectYou Control Panel, click on Settings and select "News Groups". Then push the "News Groups Patterns" link, select the user's group and mark the "Enable News Groups Patterns" checkbox.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Back to Top

  • How do I block a certain program from accessing the Internet?
    You can specify some programs which will be able to access the Internet without any restrictions. And contrariwise, you can specify some programs, which will not be able to access the Internet. For example, you can ban Internet chatting by blocking Internet access for the instant messenger. And yet, you can instruct iProtectYou not to check or block your E-mail program. Moreover, you can restrict some users to only a few specified programs to access the Internet. We recommend using this feature for advanced users (or administrators) only.
    To block a certain program from accessing the Internet, add this program to the "Blocked Programs" list.

    Open the iProtectYou Control Panel, click on the Settings and select "Programs". Then push the "Blocked Programs List" link, select the user's group and mark the "Enable Blocked Programs List" checkbox and push the "Add" button.
    After that select the undesirable program's executable name.

    To edit the list, use the "Add", "Edit" and "Delete" buttons located on the bottom of the window.

    Note: You can find detailed information about programs that have had Internet access in the "Programs Activity" log.
    To view the "Programs Activity" log, open the iProtectYou Control Panel and push the "Logs and Charts" button. After that, select the "Programs Activity" page.

    Back to Top

  • How do I restrict a user to only a few specified Internet programs?
    You can specify some programs which will be able to access the Internet without any restrictions. And contrariwise, you can specify some programs which will not be able to access the Internet. For example, you can ban Internet chatting by blocking Internet access for the instant messenger. At the same time, you can instruct iProtectYou not to check or block your E-mail program. Moreover, you can restrict some users to only a few specified programs to access the Internet. We recommend using this feature for advanced users (or administrators) only.

    To restrict some users to only a few specified programs which will be able to access the Internet, you should enable the "Permitted Programs" list and add necessary programs to the list. In that case only programs from the "Trusted Programs List" and "Permitted Programs List" will be able to access the Internet.

    Open the iProtectYou Control Panel, click on Settings and select "Programs". Then push the "Permitted Programs List" link, select the user's group and mark the "Enable Permitted Programs List" checkbox and push the "Add" button. After that select the permitted program's executable name.

    Use "Add", "Edit" and "Delete" buttons located on the bottom of the window to edit the list.

    Note: You can find detailed information about programs that have had Internet access in the "Programs Activity" log.
    To view the "Programs Activity" log, open the iProtectYou Control Panel and push the "Logs and Charts" button. After that, select the "Programs Activity" page.

    Back to Top

  • How do I prevent a program from being blocked by iProtectYou?
    You can specify some programs that will be able to access the Internet without any restrictions. And contrariwise, you can specify some programs which will not be able to access the Internet. For example, you can ban Internet chatting by blocking Internet access for the instant messenger. But you can also instruct iProtectYou not to check or block your E-mail program. Moreover, you can restrict some users to only a few specified programs to access the Internet. We recommend using this feature for advanced users (or administrators) only.

    To instruct iProtectYou not to block a specified program, you should add the program to the "Trusted Programs" list. For example, you can allow your E-mail program or FTP program to access the Internet without any restrictions. But we recommend you to be careful adding them to the list, as they will not be controlled and their protocol will not be recorded either. We strongly recommend you not to add your Internet Browser to the "Trusted Programs" list.

    Open the iProtectYou Control Panel, click on Settings and select the "Programs" item. Then push the "Trusted Programs List" link, select the user's group and mark the "Enable Trusted Programs List" checkbox and push the "Add" button. After that, select the trusted program's executable name.

    To edit the list use the "Add", "Edit" and "Delete" buttons located on the bottom of the window.

    Note: You can find detailed information about programs that have had Internet access in the "Programs Activity" log.
    To view the "Programs Activity" log, open the iProtectYou Control Panel and push the "Logs and Charts" button. After that select the "Programs Activity" page.

    Back to Top

  • How do I view the list of blocked web sites, chats, programs and etc. and determine the reason for blocking?
    When blocking any web sites, news groups, chats, programs etc. iProtectYou writes detailed information to the Warnings log about the Internet resource that has been blocked and about the reason for blocking.
    We recommend you to look through the Warnings log periodically to be informed about attempts to access forbidden Internet resources.
    Also, you can receive the Warnings log every day by e-mail if you have customized the Daily Reports function.

    To view the warnings log, open the iProtectYou Control Panel and push the "Logs and Charts" button. On the "Warnings Log" page you will find the whole list of operations which were blocked by iProtectYou. You can find the reason for blocking in the "Reason" column.

    Back to Top

  • How do I view the history of visited Web Sites and News Groups?
    Viewing the log of visited web sites and news groups can give you a lot of information about your kid's habits, interests and online friends.
    Normally you should do this only occasionally but there may be cases when you should check more often.

    iProtectYou keeps its logs in encrypted, hidden files and it is impossible to delete these logs without knowing the administrator password.
    Also, you can receive the Online Activity history every day by e-mail if you have customized the Daily Reports function.

    To view the history of visited Web Sites and News Groups, open the iProtectYou Control Panel and push the "Logs and Charts" button. On the "Online Activity" page you will find the information about used Internet resources including history of visited Web Sites and News Groups.

    Back to Top

  • How do I view the Programs Internet Activity logs on my computer?
    The iProtectYou program writes detailed information about the Internet activity of programs on your computer. This information allows you to find out the programs your kids prefer to use. Accordingly, you can customize more flexible filtering rules for them. Moreover, the revision of these logs allows you to find out about suspicious programs, which send/receive data to/from the Internet without you permission.

    To view the programs Internet activity logs, open the iProtectYou Control Panel and push the "Logs and Charts" button. On the "Programs Activity" page you will find detailed information about programs that have had Internet access, duration of access, and amount of data that have been sent/received by each program.

    Back to Top

  • How do I get the amount of data that was sent/received by my computer?
    The iProtectYou program writes detailed information about Internet activity of programs on your computer, including the amount of data that have been sent/received by each program, the history of visited web sites and news groups, used ports and much more.

    Open the iProtectYou Control Panel and push the "Logs and Charts" button. On the "Programs Activity" page you will find detailed information about programs that have had Internet access. The list includes the amount of data that have been sent/received by each program in the "Data Sent" and "Data Received" columns.

    Back to Top

  • How do I view the log files in the presentable form of charts or diagrams?
    iProtectYou gives you the ability to review statistical information gathered during Internet activity, in the presentable form of charts or diagrams.
    The program builds these images based on the information in the log files after some preliminary processing and statistical analysis.

    To reach the Charts and Diagrams builder, open the iProtectYou Control Panel and push the "Logs and Charts" button. After that select the "Charts and Diagrams" page.
    Then select the chart type, form, time period and then click the "Build" button to display the chart after adjusting the whole set of parameters and get a quick review of the requested data.

    Back to Top

  • How do I check if iProtectYou works properly?
    The simplest way to check that is to open a certainly forbidden web site (for example www.sex.com). Appearance of the iProtectYou warning means that iProtectYou is enabled and works properly. Moreover, check the Online Activity log to make sure that the records about the web sites you have visited has been written to the log.

    Also, make sure that the iProtectYou icon is blue. It means that the filtering is enabled. If the icon is gray, it means that the filtering is temporarily disabled and iProtectYou does not control and block anything.

    If you are still not sure that iProtectYou works properly, we recommend you to go to www.softforyou.com/php_dir/download/cat_ipy.exe to download the program (cat_ipy.exe). Then apply it and send us the text information from the window that opens just after double clicking on cat_ipy.exe. That allows us to find out the source of your problem and fix it.

    Back to Top

  • I disabled iProtectYou for a while and now that I have turned it on again it does not block the content?
    When you disable iProtectYou and visit some web sites with inappropriate content your web browser caches these pages on your hard disk. And next time when you open them again, it loads them from the cache. Please clear your web browser cache.

    Back to Top



  • About SoftForYou   Privacy   Legal   Contact Us

    Copyright © 2000—2011  SoftForYou  


    Web Blocker · Stop Porn · Porn Blockers · Porn Blocker · Limit Internet · Internet Traffic Monitor · Block Porn · Parent Software
    Internet Monitor · Parental Controls · Internet Access · Pornography Filter · Network Control · Computer Monitoring · Web Filter
    Internet Monitoring · Internet Control · Content Filtering · Child Computer · Porn Filters · Safe Surfing · Filtering Software