Content Filtering using Internet Proxy Servers
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 2
Abstract
Content filtering has been around since the internet has been around. Content filtering is the process of removing certain content from the internet before it gets to the user that requested that page. There are many different reasons you would want to block certain content from users. One popular example is having internet access at work locations; another is making sure students at schools of all type do not go to inappropriate sites that are prohibited in the school policy. Here at Brigham Young University of Idaho we have a content filter in place that makes sure the pages students and faculty are appropriate. Another example is filtering content in homes to protect the children from certain places on the internet. There are many different types of sites that you might want to filter out. The most popular is pornography. Many places also filter out other sites as well, here are some examples: chat, email, games, personal; guns, bombs, ne ws, advertisements, and etc. this paper will show how filtering content can be helpful to raise productivity in school and jobs. This paper will also show how it will help children not go to bad sites and help parents control what their children see on the internet.
Authors and Affiliations
Swati Saxena
Identification And Analysis Of Risks For Cloud Computing In IAAS, PAAS And SAAS
Now a days, cloud computing has been an emerging concept in the IT industry. Cloud computing is not a new technology but is a new way of using or delivering the resources. It also enhances the efficiency of computation b...
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
Sharing Channel In IEEE 802.16 Using The Cooperative Model Of Slotted ALOHA
One of the main problems in WIMAX is to share the medium by multiple users who compete for access. Various random access mechanisms, such as ALOHA and its corresponding variations have been widely studied as efficient me...
Detecting and Alerting Tcp –Ip Packets againt TCP SYN attacks
Transmission Control Protocol Synchronized ( TCP SYN) Flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems...
Competitive Advantage through Business Intelligence for E-Commerce
In today’s competitive business world it is certain that there is lot of data to be processed. It is essential for the business organization to analyze and comprehend the generated data for the performance of the organiz...