NAOMI 2.9 (en)family-safe internet
|
Introduction
Installing and uninstalling
User interface
Usage precautions
Final notes
License
Naomi 2.9 is an advanced internet filtering program, easy to use and totally free, intended for families and parents in particular.
Naomi 2.9 is able to constantly monitor all internet connections, protecting children from inappropriate online material (such as obscene or violent contents; pornography and erotism in the form of images or texts; sites that popularize drugs; gambling games; terrorism; hate propaganda; occultism; sects; blasphemy, etc.)
The filter does not rely on a mere list of banned sites; instead, it examines all data that are transmitted or received from the internet using applications like web browsers, chat programs, newsreaders, file sharing tools, and more.
The filtering technology employed in Naomi 2.9 features:
- Heuristic analysis capable of recognizing new sites automatically.
- Semantic analysis of web pages contents and analysis of their addresses and links.
- Recognizes the major languages.
- Recognizes ICRA labelling system.
- Monitoring is not limited to web sites, but covers the whole local internet traffic.
- Works with any software application, and does not alter their settings.
- Password-protected (the password is chosen by the user during the installation).
- User interface is extremely easy to use.
- Does not require configuration.
- Can be used on slow connections (it does not perform any download in background and does not need to contact sites, proxies, databases, etc.)
Installation of Naomi 2.9 only requires a few seconds. You just need to launch its installation (setup) file. Then, you will be promped to choose a password, to prevent unauthorized access to the program. This password is essential for accessing the program's interface, and also for deactivating or uninstalling it. You are advised to choose a password that is difficult to guess (e.g. you can use letters and numbers) and to remember it or keep it in a safe place.
The program is now ready and it immediately starts its monitoring activity. Whenever a potential access to inappropriate sites or material is detected, the application in use is terminated. If, for example, a pornographic website is accessed - on purpose or not -, the web browser is immediately closed, both to prevent further exploration and to avoid the user from seeing any partially downloaded material (e.g. photos, banners, etc.)
To access the user interface, you just need to click twice (left mouse button) on the flower-shaped icon near the Windows clock:
You will be asked to enter the password that you have chosen during the installation.
Once you have entered the exact password, you'll see the user interface. The following buttons are available:
- Hide: hides again the interface and keeps monitoring the internet connections.
- Stop: temporarily stops filtering; the buttons name changes to "Start". Pressing it again restarts filtering.
- Uninstall: stops filtering and uninstalls definitively the filter.
- Help: shows this manual.
- Web site: to visit the official web site from where you can download updates and new versions (you must be connected to the internet to use it).
In some cases, it is possible that the filter detects "false positives", that is, it could result in blocking of legitimate sites. This may happen in the following cases:
- Search engines: many porn sites use common keywords so they can get listed in the results of different searches and entice users to visit them.
- Spamming (unsolicited advertising) received via chat programs like icq or mirc, and on forums, newsgroup, etc. (often they are obscene messages inviting the user to visit a certain site or to join a chat room for adults).
- Advertisement of inappropriate material (for example, porn banners) on "regular" web sites.
If you find that a kids-safe site is erroneously blocked, or that an inappropriate site is not filtered, or if the program does not work for you, please contact me. Your report shall be taken into account for the next versions and updates of the filter.
Using a software filter allows parents to exert less vigilance or internet surfing, but no program can be considered a substitutive of the parent's action of education and control. Don't forget that, unless internet access is limited to a few selected sites, it is not possible to block the 100% of inappropriate contents: programs, in fact, do not "understand"; they just make choices based on criteria that can prove to be more or less valid according to the different cases.
I dedicate this program to a dear friend's baby girl; her name, naturally, is Naomi :-)
Naomi 2.9 is a free program; it is copyrighted and distributed as "freeware".
END-USER LICENSE AGREEMENT FOR THIS SOFTWAREImportant - Read carefully:
This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and the Author of this Software for the Software Product "Naomi", which includes computer software and may include associated media, printed materials, and "online" or electronic documentation ("Software Product").
By installing, copying, or otherwise using the Software Product, you agree to be bound by the terms of this EULA. If you do not agree to any of the terms of this EULA, you are not permitted to use the Software Product in any way, and all copies of it must be deleted from your system(s).SOFTWARE PRODUCT LICENSE.
The Software Product is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The Software Product is licensed, not sold.
1. GRANT OF LICENSE.
This EULA grants you the following rights:
Installation and Use.
You may install and use an unlimited number of copies of the Software Product for personal use and in any business, commercial, educational or goverment organization.Reproduction and Distribution.
You may reproduce and distribute an unlimited number of copies of the Software Product; provided that each copy shall be a true and complete copy, including all copyright and trademark notices, and shall be accompanied by a copy of this EULA.2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
Limitations on Reverse Engineering, Decompilation, and Disassembly.
You may not reverse engineer, decompile, or disassemble the Software Product, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.Separation of Components.
The Software Product is licensed as a single product. Its component parts may not be separated for use on more than one computer.Software Transfer.
You may permanently transfer all of your rights under this EULA, provided the recipient agrees to the terms of this EULA.Termination.
Without prejudice to any other rights, the Author of this Software may terminate this EULA if you fail to comply with the terms and conditions of this EULA. In such event, you must destroy all copies of the Software Product and all of its component parts.Distribution.
The Software Product may not be sold or be included in a product or package which intends to receive benefits through the inclusion of the Software Product. The Software Product may be included in any free or non-profit packages or products.3. COPYRIGHT.
All title and copyrights in and to the Software Product (including but not limited to any images, photographs, text, and "applets" incorporated into the Software Product), the accompanying printed materials, and any copies of the Software Product are owned by the Author of this Software. The Software Product is protected by copyright laws and international treaty provisions. Therefore, you must treat the Software Product like any other copyrighted material.
4. LIMITATION OF LIABILITY.
No warranties.
The Author of this Software expressly disclaims any warranty for the Software Product. The Software Product and any related documentation is provided "as is" without warranty of any kind, either express or implied, including, without limitation, the implied warranties or merchantability, fitness for a particular purpose, or noninfringement. The entire risk arising out of use or performance of the Software Product remains with you.No liability for damages.
To the maximum extent permitted by applicable law, in no event shall the Author of this Software be liable for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use this product (including but not limited to loss of data, or data being rendered inaccurate, or losses sustained by you or third parties, or a failure of the program to operate with any other programs), even if the Author of this Software has been advised of the possibility of such damages.5. LANGUAGE OF AGREEMENT.
You agree that this EULA be drafted in the English language.
Copyright © 2004-2006, Radiant Morning. http://www.radiance.m6.net All rights reserved. |