. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Be smarter than your kids on the smartphone

So you bought your son a smartphone and it’s driving him crazy … even though he has some protection services when he uses WIFI, he totally loses control. How do you regain some sanity and make sure they are protected? Here are some things you can do.

There are some applications that you can use to regain or maintain control. With these software packages, you can configure phone usage times, monitor text messages, and block applications that you don’t want them to have access to. After you have read, you can decide which of these or similar tools will work for you. These are just suggestions and should be used as a starting point for what you can do. Let’s start with the tools in no order of importance:

1. PhoneSheriff, this not only monitors text messages but also provides GPS tracking so you know where they are. You can also set time controls to decide what times of the day the phone can be used. This is great for homework and bedtime.

2. Smart AppLock Pro with Think Yeah technology, this app locks any apps or services on the phone that you don’t want them to have access to. With this, you can block the market, YouTube tube, camera, almost anything that is a phone. For example, I used it to lock settings as I didn’t want my kids to go in and enable WIFI anywhere. There are other app lockers if you don’t like the interface of this product.

3. App1Studios Text Tracker, this actually shows you the actual received and sent texts. However, if you have PhoneSheriff, you don’t need this app.

4. Checking the market settings is part of the Android software. When you control the market settings, apps cannot be purchased above the maturity level you have set without your permission. To do this, select market-> menu-> settings-> content filtering. After this, set a password so that they cannot access applications above the level you have set.

5. Safe eyes mobile will work for iPhone and iPad devices, this is the only software application you would need in this case. You will be able to log in and set privileges by remotely controlling where and when they can browse, and what rating they are allowed.

Using all of these tools will take some time as you have to install and configure them, but if you really want to keep your kids safe, it’s worth the effort. Your smartphone can be both a blessing and a curse, so you need to decide how much protection your children need and apply it when the need arises.

Leave a Reply

Your email address will not be published. Required fields are marked *