The Internet Gateway For Kids

Internet Safety

KoiniSecure Internet Security

Sadly many children have been confronted with material that is disturbing or inappropriate, there are too many cases where children have been victimized by serious crime as a result of going online. Koinisecure's mission is to take steps to help parents shield their children from such material. Parents can greatly minimize the chances that their children will be victimized by installing the KoiniSecure browser, a very easy installation.

Our Login process offers three levels of protection ensuring your child has a safe and enjoyable on line experience.

Level 1
Password Strength

Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The strength of a password is a function of length, complexity, and randomness. However, other attacks on passwords can succeed without a brute search of every possible password. For instance, knowledge about a user may suggest possible passwords (such as pet names, children's names, etc). Hence estimates of password strength must also take into account resistance to other attacks as well.

The KoiniSecure password strength indicator allows you to know how safe your password is from being guessed and hacked with a simple bar letting you know how safe yours is from 1-100% and then you can adjust it from there to make it as strong as possible. Using special characters, capital letters and numbers are all vital in making your password as safe as possible.

Check out our Password Tips

Level 2
Personal Verification Question (PVQ)

KoiniSecure requires it's users to enter personal verification questions about themselves when they first register for an account.

What are PVQ's?

PVQ's are a series of random questions that we provide to the users of our sites, they range from the ?make of your first car? to ?what was the name of your first school?. The user is required to enter 3 different PVQ's into the system then, whenever the user signs on to any of our websites they will have to enter the correct answer to a randomly generated PVQ to enter into the site.

Why do you use PVQ's?

KoiniSecure believes that usernames and passwords provide insufficient security to protect sensitive websites, as hacking techniques have become more advanced.. By adding a second layer of security in PVQ's it makes accessing someone else's account significantly more difficult and thus lowers the potential of cyberbullying and other inappropriate activities.

Level 3
Password Protection

Secure Sockets Layer (SSL) protects the communication between you (your browser) and our servers via encryption With the KoiniSecure Personal Verification system you can manage the activities of your child anywhere you have Internet access, using your laptop or a trusted computer terminal.

Encryption is presently the most effective way to achieve data security.

How does encryption work?

The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online server. Encryption makes it very difficult for unauthorized people to view information traveling between computers. It is therefore very unlikely that anyone can read this page as it travels across the network.

How does SSL Encryption work?

When visiting online sign-on page, your browser establishes a secure session with our server.
The secure session is established using a protocol called Secure Sockets Layer (SSL) Encryption. This protocol requires the exchange of what are called public and private keys.
Keys are random numbers chosen for that session and are only known between your browser and our server. Once keys are exchanged, your browser will use the numbers to scramble (encrypt) the messages sent between your browser and our server.
Both sides require the keys because they need to descramble (decrypt) messages received. The SSL protocol assures privacy, but also ensures no other website can "impersonate" your selected KoiniSecure websites, nor alter information sent.

Please note: Microsoft is no longer supporting Windows 98. Because Microsoft no longer provides security updates, KoiniSecure no longer support browsers used in combination with the Windows 98 operating system. If you are still using Windows 98, we strongly recommends that you upgrade your operating system.

Internet Predators

Using Internet communication tools such as chat rooms, e-mail and instant messaging can put children at risk of encountering online predators. The anonymity of the Internet means that trust and intimacy can develop quickly online. Predators take advantage of this anonymity to build online relationships with inexperienced young people. Parents can help protect their kids by becoming aware of the risks related to online communication and being involved in their kids' Internet activities.

How do online predators work?

Predators establish contact with kids through conversations in chat rooms, instant messaging, e-mail or discussion boards. Many teens use "peer support" online forums to deal with their problems. Predators, however, often go to these online areas to look for vulnerable victims.

Online predators try to gradually seduce their targets through attention, affection, kindness, and even gifts, and often devote considerable time, money and energy to this effort. They are aware of the latest music and hobbies likely to interest kids. They listen to and sympathize with kids' problems. They also try to ease young people's inhibitions by gradually introducing sexual content into their conversations or by showing them sexually explicit material.

Some predators work faster than others, engaging in sexually explicit conversations immediately. This more direct approach may include harassment or stalking. Predators may also evaluate the kids they meet online for future face-to-face contact.

Harmful Content

Most of us caring, responsible parents want to instil in our children our own personal values about relationships, sex, intimacy, love, and marriage. Unfortunately, the powerful irresponsible messages of pornography may be educating our children on these very important life issues. Just as thirty-second commercials can influence whether or not we choose one popular soft drink over another, exposure to pornography shapes our attitudes and values and, often, our behaviour.

Photographs, videos, magazines, virtual games, and Internet pornography that depict rape and the dehumanization of females in sexual scenes constitute powerful but deforming tools of sex education. The danger to children stems at least partly from the disturbing changes in attitude that are facilitated by pornography. Replicated studies have demonstrated that exposure to significant amounts of increasingly graphic forms of pornography has a dramatic effect on how adult consumers view women, sexual abuse, sexual relationships, and sex in general. These studies are virtually unanimous in their conclusions: When male subjects were exposed to as little as six weeks' worth of standard hard-core pornography, they:
developed an increased sexual callousness toward women
began to trivialize rape as a criminal offense or no longer considered it a crime at all
developed distorted perceptions about sexuality
developed an appetite for more deviant, bizarre, or violent types of pornography (normal sex no longer seemed to do the job)
devalued the importance of monogamy and lacked confidence in marriage as either a viable or lasting institution
viewed non-monogamous relationships as normal and natural behaviour

Create Strong Passwords

If someone steals your passwords, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. To prevent this, you can do the following:

Follow 6 steps to build a strong password
Learn what makes strong passwords
Avoid common password strategies that fail

6 steps to build a strong password

The strongest passwords look like a random string of characters to attackers. But random strings of characters are hard to remember.Make a random string of characters based on a sentence that is memorable to you but is difficult for others to guess.

1.Think of a sentence that you will remember
Example: "My son Aiden is three years old."

2.Turn your sentence into a password
Use the first letter of each word of your memorable sentence to create a string, in this case: "msaityo".

3.Add complexity to your password or pass phrase
Mix uppercase and lowercase letters and numbers. Introduce intentional misspellings.
For example, in the sentence above, you might substitute the number 3 for the word "three", so a password might be "MsAi3yo".

4.Substitute some special characters
Use symbols that look like letters, combine words, or replace letters with numbers to make the password complex.

Using these strategies, you might end up with the password "M$8ni3y0."
5.Test your new password with Password Checker
Password Checker evaluates your password's strength as you type.

6.Keep your password a secret
Treat your passwords with as much care as the information that they protect. For more information, see 5 tips to help keep your passwords secret.

Qualities of strong passwords

Each character you add to your password increases the protection it provides.
8 or more characters are the minimum for a strong password; 14 characters or longer are ideal.

The greater variety of characters that you have in your password, the harder it is to guess.
An ideal password combines both length and different types of symbols.
Use the entire keyboard.

Easy to remember, hard to guess
The easiest way to remember your passwords is to write them down.
It is OK to write passwords down, but keep them secret so they remain secure and effective.

Password strategies to avoid weak, easy-to-guess passwords

Avoid sequences or repeated characters
"12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not make secure passwords.

Avoid using only look-alike substitutions of numbers or symbols
Criminals will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd".
These substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case.

Avoid your login name
Don't use any part of your name, birthday, social security number, or similar information for your loved ones.
This type of information is one of the first things criminals will try, and they can find it easily online from social networking sites, online resumes, and other public sources of data.

Avoid dictionary words in any language
Criminals use sophisticated tools that can rapidly guess passwords that are based on words in multiple dictionaries, including words spelled backwards, common misspellings, profanity, and substitutions.

Avoid using only one password for all your accounts
If your password is compromised on any one of the computers or online systems that use it, you should consider all of your other information protected by that password compromised as well.
It is critical to use different passwords for different systems.

Be careful with password recovery questions
Many Web sites offer a "password " service that lets you provide the answer to a secret question. If you forget your password, the service will send it to you if you can remember the answer to your secret question.
The questions are often random, but sometimes the answers to these questions are freely available on the Web. Choose your questions carefully or make up the answers.

Avoid using online storage
If criminals find your passwords stored online or on a networked computer, they have access to all your information.

Kids and parents alike know that sometimes "The Talk" is awkward for both parties, especially when they come to the "know it all" age. The problem is that your kids might use computer lingo that is completely new to you.

Below is a list of articles, tips and guidlines to help you speak to your kids in a way that they can relate to what you're saying.

The KoiniSecure site, is registered with Child Exploitation and Online Protection (CEOP)
The following links contain useful information for you and your family:?

Information for...Parents

Everything you wanted to know and were afraid to ask
So, how can you protect your child online?
Supporting your children to use the internet safely
Internet ?Safety
View the latest Internet safety film from CEOP 
Video content
External news feed

Information for...Children

For the ages of? 5, 6 or 7
For the ages of 8 to 10
For the ages of 11 to 16
How to report abuse
United Kingdom
United States

What are my kids doing online?

The internet is a powerful tool for many things, what has stood out in recent years though is the communication aspect. The ability to be able to share your thoughts, pictures, videos and music with all of your friends instantly is an appealing concept.

Also with new systems allowing you to chat live on the site, email is quickly becoming a thing of the past. At KoiniSecure we think the best way for a person to understand anything is gain hands on experience. That is the reason we developed the Koini social network. If you join you will get firsthand experience of what social networks have to offer and from that, learn about how useful they can be if used correctly.

More resources: