How To Teach Your Kids To Safely Play Pokemon Go

How To Teach Your Kids To Safely Play Pokemon Go

“Mom, wake up,” whispered my nine year old into my ear as he nudged my shoulder, “Mooommmm.”

I glanced at the alarm clock, it was only 6:45 a.m. on a weekend. I immediately thought he was sick or needed some help getting breakfast, so I complacently rolled over to get out of bed. Then he said it, “Mom, come on! Can you please turn on your data so I can grab the Cloyster sitting in the Smith’s yard before the neighbors get it?”

Yes, my lovely child had risen with the sun to sneak in a little extra Pokémon GO (on my phone by the way) before his siblings woke up. I should be shocked and a little surprised, but this free app has downloaded an entirely new dynamic into our family. Often, the kids are so engrossed with the game that they are strategizing, discussing, and heading out together in pursuit of snagging an elusive Pokémon or to hatch eggs. This is a stark contrast with how they used to interact, mainly fighting over the remote or who got the last cookie.

Lately, concerns have surfaced about the dangers and risks associated with Pokémon GO. These are very real problems, but as parents, we need to sit back and examine if the benefits outweigh the cons of the Poké revolution. This game is uniting families, getting children excited about exercise, allowing them to develop critical thinking skills, and developing camaraderie within communities in unprecedented ways.


10 Essential Tips For Safely Playing Pokémon GO

So far, Pokémon GO has been downloaded at least 15 million times and that number is growing daily. As more and more Poké trainers and hunters hit the streets, there is undoubtedly a need to teach our kids to safely play this app. Thankfully, we can follow the safety strategies listed below to reduce our children’s risks:

Play in pairs or groups. Avoid allowing kids to play alone and encourage them to go out with a friend or two. Additional people will provide a safety net, making it less likely that a child will encounter a dangerous situation.

Better yet, play with them! Take advantage of a child’s interests and build in a little extra quality one-on-one or family time while getting everyone outside exercising.

Dress for safety and wear reflective or highly visible clothing. By doing so, we are increasing our sons and daughters overall visibility to drivers and bikers which will reduce the likelihood of accidents.

Draw boundaries of where kids can and cannot play the game. This game is built to encourage a lot of walking and kids might wander a little too far from home. Before letting them head out, set clearly defined boundaries that meet your approval.

Require kids, including teenagers, to map out their planned routes and have them check in every now and then. In addition, consider giving a child a pocket sized emergency charger so they can power up a dying phone. This will allow our kids the ability to contact us at all times.

Help children develop the skills needed to be aware of their surroundings. Have them stop in safe public locations, avoid walking and watching their screens, and to never play in areas that are secluded. If they feel uncomfortable in a location, tell them to leave and call you.

Go into the game’s settings and select it to vibrate or buzz when a Pokémon is nearby. This simple measure will enable a child to walk safely and pay attention to their surroundings without missing out on any great captures. 

Never allow kids to walk around at night. A majority of pedestrian accidents that result in death occur after sunset. It’s okay to limit playtime to daylight hours, as an added bonus you will be providing some much needed time to unplug and unwind.

Teach children to be respectful at all times. Instruct kids on public etiquette, good manners, to walk only on sidewalks, and to be mindful of other people’s property. Politeness is an absolute necessity while playing this game.

Never operate a vehicle while playing Pokémon GO. The distractive nature of this game is a dangerous combination with driving. If they need to drive, stress the importance of stopping a vehicle in a safe spot before playing and choosing a designated driver.

How do you teach your sons and daughters to safely play Pokémon GO?  Leave your comments and suggestions below.

Posted in Articles, Education, Games and Fun, General Safety, In Real Life | Tagged , , , , , , , , | Leave a comment

Intenet and Email Safety | ZooBuh

Email is a great communication tool but young members of the family have to be taught how to use it correctly. Discover these internet and email safety tips.

Teaching Kids About Safe Email Usage

Email is a very important form of communication. It is quick, easily accessed world-wide. In seconds we can contact friends and family around the world. Unfortunately email can also be used to criminals, predators, and others who try to exploit people online. While everyone faces danger from the activity of unscrupulous email users, children in particular are vulnerable to scams. Teaching your children about safe email and internet usage can help prevent many problems.What Does Safe Email Usage Look Like?

Having firm ground rules regarding internet and computer usage is important; every member of the family should follow them. The rules about email usage might include:

• Not sharing personal information through email
• Email can be sent and received during regular internet-use hours; no checking email past bedtime
• Email should only be checked on the family’s computer; this computer is kept in a shared space, such as the living room or rec room
• Using a kid-friendly email service such as ZooBuh to monitor how messaging is used; sign up instantly today!

Improve Everyone’s Safety

Parents can begin considering how reasonable internet-use rules by examining their own email behavior. Are there ways in which you can improve? It is very simple to fall into bad habits that put personal and family safety at risk; learn to recognize these so they can be stopped early.

Posted in Email for Kids, Internet Safety, safe email for kids | Tagged , , | Leave a comment

Parents Can Decode Online Lingo | Zoobuh

Kids and teens use slang and online lingo to communicate with friends. Parents should learn what these words mean in order to monitor conversations.

Discover What Kids Text About

There is no question that kids are discovering new ways to use technology almost as fast as new devices are released. As soon as a new phone, tablet, or game device hits the market kids are learning how to use them, especially to talk with friends. Texting, chatting, and other forms of instant messaging are convenient ways to keep in touch and kids love sending short funny messages to one another. Because these messages can include lingo peculiar to texting and online chatting, parents are sometimes unfamiliar with the contents of these messages. This can make monitoring a child’s use of text messaging difficult.

Learn the Newest Popular Phrases

These are just a handful of the abbreviated words and terms that might be utilized in an text conversation:

• ATM – At the moment
• ASL – Age, sex, location
• AF – “As f*ck”; an emphasis
• B/C – Because
• D/L or DL – Download
• FTW – “For the win”; a declaration of success or superiority
• Gr8 – Great
• IKR – “I know, right?”; a way of expressing agreement
• PLS – Please
• SMH – Shakes my head; expressing disbelief, frustration, or incomprehension
• NP – No problem

Find and search the list of chat words here.

Parents Can Help Keep Kids Safe

There is new online lingo being developed every day and kids pick up on it fast. Learning about your child’s conversations can be a good way of keeping them safe. Zoobuh allows parents to preview email messages sent to a kid-friendly email account; sign up for yours today.

Posted in Education, Internet Safety, Teens | Tagged , , | Leave a comment

Teaching Children About Basic Online Safety

Parents can take an active role in teaching children how to use the internet safely. Make online safety a part of your household.

Teaching Children About Basic Online Safety

Online safety is a very important subject and has to be discussed with children as soon as they begin to use a computer to access the internet. Parents can protect children by setting a good example regarding safety and developing simple strategies.

Talk About Private Information

Kids love to share but parents are not always alright with kids sharing everything. For instance, there is some information that should be regarded as personal. This can include:

• A child’s real name and the names of their family members, including pets
• The names of schools, day cares, places of employment, and frequent shopping destinations
• The name or location of churches or other places of worship
• Telephone numbers and home addresses
• Age, height, eye color, hair color, and skin color

Even though information such as the name of a pet or the location of a favorite shopping mall might seem harmless, online predators and criminals can use this information to impersonate parents, family friends, or concerned community members. Distinguishing characteristics, including health information like allergies, should also be treated as private.

Creating an Atmosphere of Privacy

Parents can encourage children to cultivate a healthy skepticism of strangers by discussing topics like personal boundaries and what makes information private. These lessons will help children stay safe online and out in the world. Zoobuh’s kid-friendly email service empowers parents with tools that enhance online safety for every member of the family. Sign up today!

Posted in Articles, Email for Kids, Internet Safety, safe email for kids | Tagged , , | Leave a comment

SPAMisconceptions – 5 Misconceptions About Spam

A Short List of SPAM Myths by Alan Fullmer

There are many types of SPAM.  (bulk, annoyance, illegal, etc.)
You have everything from body part enhancement, to window replacement, penny stock promotions, virus and Trojan related messages.

It can be tricky to figure out what messages are real, what’s fake and which want to simply steal your identity.

My first rule of thumb is, question everything.  If you didn’t ask for it, don’t click on it.

Unfortunately, even that isn’t enough.  I’ve received spams that appeared to be from friends, even my wife—but it was nothing more than a link to a phishing website.

I have compiled a few myths that a lot of people think to be true but are in reality—false.  These are more targeted at the marketers that fail to acknowledge them, intentionally or otherwise.

Myth #1: Spam isn’t that bad, just hitting the delete key isn’t that hard.

Spam goes beyond the mere annoyance of having to press the delete key.  Behind the scenes is an incredible amount of non-stop filtering that happens.  Just because you don’t see the spam doesn’t mean it’s not there.  I always say to people; “I wish I could let all spam through just for a couple minutes to show you how much you really would get.”   Now there are some that get more than others.  The jim@, john@, mary@ etc.  The names that are commonly known which dictionary attacks are good at guessing.  Then there are the people that sign up for everything.  Whilst the actual requested emails they asked for are not what we are as concerned about, it’s the ones that come in that have been sold multiple times.

I’ve done tests.   I do a lot of tracking when I have to sign up for things.  Even companies that promise my email address will not be sold or given to anyone.  Certainly we all have concluded that is a lie.  In one instance, I gave an email address (where the 1234 is the ID I assigned to that company or institution requesting it and misspelled as to a car dealership to send me notices when it’s time for service.  The terms of this negotiation had language indicating it would not be shared with anyone.   Yes, I look at the fine print, it’s just what I do.  5 years later, I am still getting an incredible amount of spam coming in on that address—this after their promise of it not being shared with anyone and I have never used it with any other place.  I have since disabled the email address, but they still send spam through it.

I’ve also done the test where you click on any unsubscribe link in a spam message. When it takes you to the unsubscribe page, simply put in a made up address.  Similar to my previous test, I will do  Of course without checking their records it will say, “Your email will be removed in 24 hours.”  And of course, we will see spam coming in on that made up address through the unsubscribe link.

One last test, and in my opinion a very effective way to combat spam, is a spam trap (honeypot).  Carefully placed secret email fake addresses scattered around the web.  Web scrapers love these.  They scour the internet for users’ email addresses from forums, blogs, etc. and then adding them to their spam lists.  (Of course they will say you signed up for it. 😉 )
The main reason spam traps are useful and effective is that nobody uses them.  They are fake.  So if we receive mail on these addresses, we simply block every subsequent request from that server.  We know it is spam.  Our tests show that it usually takes about a week for these addresses to be harvested and placed onto spam lists ready to be sold.  More information on this can be found here:

Myth #2: Spam isn’t any different than companies mailing you car ads, coupons, house refinancing, etc. through the US Mail.

Companies spend a lot of money, printing, paying for postage and buying lists of addresses to send these to. The burden of cost is on the sender of the ads.

With Email Spam, you can get a billion email addresses for under $50.  It’s practically free to send spam.  Sure you might pay for your internet connection at home or work, but you’re paying that anyway and it’s a very small cost.  Furthermore, Wi-Fi hotspots, libraries, schools and wide-open networks can be tapped into at no cost.

So the burden of cost is now on the receiver (we the ISP) instead of the sender.

Just one domain out of the many available to our customer base, received over 30+ million spams since the beginning of the year (end of June 2014).  In one year’s time this particular domain could see over 5 million spams per month, 167k per day, 7000 per hour.   This is also assuming the volume stayed static, which it never does.  It always grows.  Combine all the other domains and addresses we host and that number climbs insanely high.

Myth #3: You signed up for it.

Perhaps there are some that do, but for the majority of people do not.
My favorite line: You are receiving this because you asked to receive offers from _______.

No, I did not. Whatever the “from” equates to, I never asked anything of the sort. I don’t want my mortgage refinanced, I don’t want or need an affair, I don’t want any particular body part enhanced and I don’t want any cheap Canadian meds.

Spammers use this line frivolously. I am unsure if they think it makes it all legitimate, or they assume you’ll say to yourself, “Well golly gee, maybe I did sign up for it.”

Myth #4: Dictionary attacks aren’t bad because it doesn’t go to real users.

This is very wrong. Just because we receive messages for users that don’t exist, doesn’t mean we don’t still process it. The system has to verify the user even exists. This means it has to access it from some type of database, compare to any RBL filters and honeypots—at the very least. Compound that with a decision to discard it, or bounce it. I particularly like the fact that if I flub the address, I get a response back from the server telling me that there is no person there, rather than wondering if the recipient ever got my message. That said, an extremely high percentage of spams come from addresses that are not real. So a bounced message (backscatter) will generally ping pong between servers, or sit in the queue for days until it expires, or even worse—if the domain is something like, the bounces end up being received by Yahoo and they decide to blacklist your IP. This puts a lot of work on additional employee(s) to create rules and configuration to prevent backscatter.

Myth #5: it’s just part of a company’s budget. It’s not a big deal.

In the past, the IT budgets never included money for spam filtering. Surprisingly, even today, most budgets still don’t include it. It never shows up as a line item or issue. I think because it’s just assumed you get to deal with it and is part of the email system. But usually the people making those decisions don’t get to see how much spam they are really getting. Out of sight, out of mind. But they do seem concerned at times about the constant upgrading and purchasing of heavier duty servers and equipment “just for email.” Hard disk use, power consumption due to processing, bandwidth can be very costly.
If you were to track the time you spend sorting through the few spams that made it through the filtering system for a year. I think you would be surprised at the time spent.

Processing Spam used to be simple.  Install an off-the-shelf anti-spam product and you’re set.   Today, it’s become a science.  Marketers are trying harder than ever to bypass filters.  One cannot simply rely on any one technology.  You can’t simply look for words and phrases.  Marketers try everything from obfuscation of text, replacing English letters with Greek or German because they are still readable.   Adding Bayesian checks helps, but even still marketers try to poison the database with random words, texts or phrases.  Personally, I’ve yet to see this method very successful, I’m sure it works to some degree.  This is easy to spot.  Most of the time the random words are hidden in HTML text or CSS code.  Other times you’ll see excepts from random poems or news articles at the bottom of the message.

The CAN-SPAM Act of 2003 is pretty black and white when it comes to this stuff.  A lot of the wording is based around false and misleading information.

If you have to wonder about how legitimate the company is that’s trying to sell you something, you don’t need to go further than looking into how hard they try hiding their marketing identity.  Allow me to elaborate;

There are two main domains associated with the emails.  The domain that the sender’s email comes from, and the link(s) in the body of the message.  There are many “whois” lookup services that can get you this information for free.

  1.  When you look at the record of the domain holder, is it private? Does it have any wording like Domain Protected or Privacy Protected.
  2.  Are any of the domains .us, .info, .biz, or .pl?   (Not limited to only these extensions)
    These are “disposable” domains.  They are cheap.  Usually they are only a few dollars compared to .com and others that are closer to $12 for a year.
    Spammers will register them for one year—fully knowing that they won’t be renewed and will quickly be blacklisted.  But by that time, they’ve already sent the billions of spam.  It’s an easy investment.
  3.  Are there patterns in the domain name? For example,
  4.  Do the domain names reflect anything from the content/advertiser?

Somewhere the message must indicate it’s an advertisement.  It should be a simple sentence that should read “This is an advertisement, unsubscribe here” but instead you’ll see every attempt to disguise it by using words like “advert,” “admsg,” etc., even going as far as to use every variation of a word found in a thesaurus.  The fact is, they aren’t being upfront and honest.   Lately there has been a lot of images that have this wording to try to bypass context filters.  The main problem with this is these images are generally remotely hosted.  This has two main benefits for the spammer.  It doesn’t get picked up by the filter and second they can track and verify you’ve viewed that image.
Since most email programs now require a step to view remote images, you’ll probably never see it.  Also, if the remote image is removed or broken, the unsubscribe language will never be seen.

Another common thing a spammer does is use a PO Box or a UPS store box to hide their real identity.

I personally would never want to do business with anyone that can’t be upfront and honest with their ads and/or marketing.  You would never allow this in a newspaper ad, why would email be any different?  The fact that they are trying to deceive should be the only red flag you need to know to stay away.

Dan Hates Spam ( sums it up perfectly:

“The Internet offers tremendous potential for marketers to deliver precisely targeted and customized information and offers to consumers who truly want to receive them, but all too often, spammers abuse the potential of the technology and instead take advantage of zero-variable-cost nature of email to blast their unsolicited advertisements at every email address they possibly can.  Let me repeat this point – there is no financial incentive for a spammer to do any kind of list management that a traditional (offline) marketer would use.  That’s why men get spammed for breast enlargement pills and women get spammed for penis enlargement pills; why people with regular plumbing get spammed for septic tank solutions; why children get spammed with prostitution ads, etc.”

I hope you find something useful in this article. I am not a writer or really care to be one so forgive my mistakes. I just want to lay out some facts for you. If you do find this article useful, feel free to share it. Also, if you have any comments, leave them below.
-Alan Fullmer


PS.  I am going to do a test and report back with the results in a month or so.  I am going to create a fake address.  Let’s call it and see how many unsolicited emails we receive on this address in a month’s time due to spam scraper utilities…  but please readers, don’t add it manually to any lists, that would defeat the purpose of the test 😉

Posted in Articles, Education, Spam and Scam, Technical | Tagged , , | Leave a comment spam scam

Many of you already know we are very proactive in combating spam. Occasionally we come across a few we feel our users should know about.  We have received at least 100,000 of these emails in the last few weeks.  Of course they have been flagged as spam as the violations of these emails are easy to spot.

Here’s an example of one of the spam messages:


We are looking for employees working remotely.

My name is Roland, I am the personnel manager of a large International company.
Most of the work you can do from home, that is, at a distance.
Salary is $2500-$5000.

If you are interested in this offer, please visit Our Site

Best regards!

The link provided sends the user to a hacked site, such as WordPress, then forwards onto their landing page:


Then clicking through gets you to their site where you watch a video trying to convince you to sign up with their scam.


A quick bit of research on the domain name shows it’s a proxy/private registered domain in the Bahamas.  Two major red flags.  Simply put, they don’t want you to know who they are.  If that’s the case, are they to be trusted?  No.

I did a simple test by entering a jibberish md5 hash generated email address on their unsubscribe link, despite the “You Will Never Get Spam”, and of course hours later we are receiving messages sent to that fake email address.

I’m including two links to external sites that go into much more detail about it.

Posted in Internet Safety, Money Scams, Spam and Scam, Technical | Tagged , , , , , , | Leave a comment

iPhone, iPod, iPad Email Setup Instructions

How to set up POP3 on your iOS device. There will be slight differences between the devices and OS versions but they are close enough for this tutorial.

Step #11             
Locate and tap the settings icon.
Step #22

Tap Mail, Contacts, Calendars
Step #33

Locate and tap the settings icon.
Step #44

You will see various types of preset accounts such as Google, Yahoo, AOL, iCloud, etc.Choose “Other”
Step #55

Add Mail Account
Step #66

1. Under Name, put your child’s name.
2. In the Email field put the complete email address of your child. Replace “username” with your child’s selected username.
3. Password is case sensitive. If you set a password with upper and lower case letters, it is required to be identical.
4. Description can be whatever you want. This is so your child can recognize it from the list. If you have multiple children using the same device, then specify it accordingly.
Step #77

Select POP. Do not choose IMAP. This tutorial is for POP only.
Step #88

Incoming Mail Server Settings:
Host Name:
User Name: complete email address of child account
Password: case sensitive passwordOutgoing Mail Server Settings:
Host Name:
User Name: same as incoming (above)
Password: same as incoming (above)
Step #99

This may or may not pop up. If it does, choose “Yes”
Step #1010

After you complete that portion, we are going to go back into the account and check the settings. Select and tap the account you just set up.
Step #1111

Scroll down and tap “Advanced”
Step #1212

1. Verify that SSL is selected/turned on.
2. Server port should be 110. If it is anything but 110, it will not work.
3. The other options can remain default.
4. Scroll back up and tap Done
Step #1313

Next screen, scroll down and tap SMTP this time. Then tap on the server which should be listed under primary.
Step #1414

1. Host Name and User Name should be as set in step #8. It should already be populated.
2. Use SSL should be selected/turned on.
3. Server port should be 587. Any port besides 587 will not work.
4. Save the settings and you should be done.
Step #15
Ensure you saved everything as you back out to the settings screen. Once complete, you can go into the Mail App and start receiving and sending mail.


Posted in How To, Internet Safety, Technical | Tagged , , , , | Leave a comment

Facebook post: Drugs disguised as candy brought to school.

It’s unfortunate when we see stories like this.  Parents beware:

Looks like ‘Smarties’ but it’s actually meth kid brought to school

“IONE, Calif. — A middle school student at a school in California was caught snorting methamphetamine that was packaged to resemble Smarties candy.”

read more…

Posted in In Real Life | Tagged , , , | Leave a comment

Open Up New Communication Opportunities with the Best Email for Kids

If you are like most parents, you’ve been wishing that there were a safer way for children to communicate online. ZooBuh is breaking new ground in the realm of making your child’s online communications safer. If you’ve been looking for a superior email for kids option, then ZooBuh is the answer.

The Dangers of Cyberbullying

More and more these days, parents are worried about what kind of communication is happening with their child online. Stunningly, a Harris Interactive-McAfee study concluded that 20% of children have engaged in cyberbullying.

Cyberbullying, a term that was virtually unknown just a few years ago, has become a very serious problem as teens and even children post embarrassing photos, discuss rumors and generally demean and harass other children. Protecting your child from such inappropriate behavior is one of the reasons why ZooBuh was created.

What Does ZooBuh Offer?

The features built within ZooBuh are powerful. ZooBuh’s email for kids was designed to protect children from a wide spectrum of unwanted and potentially damaging communications. Once you’ve tried ZooBuh for yourself, you will agree that there has never been as functional or useful tool for managing email for kids.

One of the key features of ZooBuh is the Mail Queue System – which makes it possible for parents to approve or deny any incoming or outgoing message before your child sends it or sees it. This feature brings peace of mind to parents as they know exactly what messages are coming and going from their child’s inbox.

Learn When and Why Communications Occur

ZooBuh’s parent friendly and intuitive tools include the ability to send copies of incoming as well as outgoing messages directly to you, the parent. Imagine for a moment being able to know what kind of emails your child is sending. With our service, you’ll also learn when and why these communications take place. Any parent looking to keep their child safe will absolutely love ZooBuh and all it has to offer.

There are additional features – such as the ability to restrict the times that email can be used, restrict email use entirely, block specific senders, pre-approve other senders such as family members and a great deal more. And the activity-logging feature of ZooBuh means that you will never be left wondering how your child is using email.

The Best Email for Kids

With each year that passes by, email for kids is becoming a greater priority. With ZooBuh, parents can finally relax and know that an innovative, effective, and proven technology is now on their side.

Posted in Articles, Email for Kids, ZooBuh | Leave a comment

ZooBuh Is About Peace of Mind

Thanks to the Internet and email, it is possible for us to reach out, discover and learn like never before. Email has proven to be a real game changer, and everyone wants to use it as a primary form of communication – and that includes children. Parents are correct in wanting to make sure their kids have access to technology. However, parents need to know that their children are safe when using email.

Ensuring Safe Email for Kids

The ZooBuh difference is that we make email much safer. You’ll enjoy a new level of control as well as peace of mind when using a secure platform for child’s email. If you’ve ever wanted to be able to monitor what is happening with your child’s online email communications, well, now you finally can. Safe email for kids has arrived.

Research Supports Parental Concern

As a parent, you have a right to worry. According to Harris Interactive-McAfee, 63% of teens say that they know how to hide what they do online from their parents. That means that even though you think you have an understanding of what is going on, you likely don’t really know what your child is thinking or doing.

Adding to that concern is the fact that, according to Cox Communication, 69% of teens say that they regularly receive messages from people online they don’t know. Making this even more troublesome is the fact that they don’t follow up by telling an adult when this occurs.

Perhaps most alarming of all, the Rochester Institute of Technology discovered that over 10% of students accepted an invitation to meet an online stranger in person.

Your Proactive Steps

Parents should be motivated to take protective steps. Just because you want to ensure your child’s safe communications online does not mean you’re unreasonable or overprotective. Through ZooBuh, parents now have a safe email for kids option that adds a considerable layer of protection for online communications.

ZooBuh Email Monitoring, Activity Logs & Mail Queue Technology

ZooBuh includes email monitoring and activity logs. You’ll know exactly who is communicating with your child online and why. You can even restrict the times and places where your child can log in so that he or she stays safe when you’re not around.

Want to approve an incoming email message before your child sees it? Our Mail Queue technology places all of your child’s incoming messages into a folder that is not visible to your child. In this way, you can approve, preview and even delete messages before your child sees it.

Enjoy Quick Communication with an Approved List

ZooBuh is also about ease of use. You can select trusted friends and family email addresses so that your child can have quick email correspondence. In fact – you can even limit your child’s email account to only people you’ve approved in advance.
The Internet is a pretty amazing place. ZooBuh wants you and your children to get the most out of the Internet and email. Helping you keep your children safe is what we do at ZooBuh. We think you’re going to like what we have to offer.

Posted in Articles, Email for Kids, safe email for kids, ZooBuh | Leave a comment