Unplugged: How To Get Your Kids Outside and Away From Screens

amykwilliams-kidsplay1Remember your childhood? The knock on your front door a few hours after school let out, that always belonged to some classmate straddling his bike and asking if you “could play”? The way you burst out the front door on Saturday mornings, leaving your parents standing in a flurry of papers and flapping curtains like victims of a cartoon tornado? The freckled, tanned skin you sported all summer, which your mother tried to protect with sunscreen – that is, if she could catch you?

No matter where you grew up, your childhood is likely marked with the tell-tale signs of playtime outside. But for many children growing up today, these trademarks of youth are being replaced by screentime: selfies, Candy Crush, and hours of television.

Symptoms of Screentime

Technological innovations have made our world more “plugged in” than ever before, and experts are wary of the effect this has on our children. One study from UCLA found that time away from screens makes children better at reading human emotions and nonverbal cues. A 50-year study has noted that children’s creativity has been markedly decreasing since 1990 – the correlation between this decrease and the rise of technology is undeniable.

What’s more, children’s bodies are suffering after hours of screentime; today’s kids are less active, and therefore more prone to obesity. Even if they avoid weight gain, 84% of teens and reported experiencing back and neck pain in a 2013 survey, which Doctors attribute to “slumping and hunching over computers.”

Reclaiming Recreation

As the research piles up against screentime for the youngsters, we parents need to take on the task of getting the kids playing outside. But how? Here are a few tips for making playtime a must-do for your family:

Provide Active Toys

When holidays and birthdays roll around, kids start begging for a new cell phone or the latest video game. But they can have just as much fun with active toys! Sports equipment, jump ropes, hula hoops, and others can promote playtime that keeps them off the couch. And once they find an activity they love, you’ll be hard-pressed to stop them from staying out until the street lights come on.

Sign ‘Em Up, Cheer ‘Em On

Community sports are almost always in session, so why not sign your kids up? Not only will the kids get their much-needed outside playtime, they can learn about teamwork, discipline, and other critical social skills (which, as you’ll remember, kids who indulge in excessive screentime lack). Soccer, baseball, basketball, swimming – the possibilities are many, which gives your kid the chance to try and find out where he or she excels. And who knows: you may have a future Olympian on your hands!

Of course, there is one key to making these sports a real win for your children: support them! If you’re at the games, cheering them on and praising their effort and the fun they’re having (note: NOT necessarily whether or not they won), your kids will learn to love playing outside just for the fun of it. That attitude will help keep your kids healthy long into adulthood.

Make it A Family Affair

While squeezing in a workout may seem like another item on an already overflowing plate, getting active with the kids is a surefire way to make sure they get their 60 minutes (the recommended amount of playtime children need). Take them with you to walk the dog, visit your local park, or even pay a game of catch in the yard. With the kids moving – and you, too – the whole family will feel healthier and happier before you know it.amykwilliams-kidsbikes

Lead By Example

Have you ever found yourself in this scenario: you just got done scolding your child about “always being on that phone,” only to realize that you are sitting with the TV on and your phone in your hand, open to some email or distracting game? As parents, we have to resist the rising tide of constant-connectedness and set an example for our children. Maybe you need to schedule time where your phone is put away. Maybe you need to make a “tech jar,” where excessive tech time is met with financial consequences. However you do it, showing your children that less screentime is possible will make them far more likely to follow through.

Posted in General Safety, In Real Life | Leave a comment

How To Teach Your Kids To Safely Play Pokemon Go

How To Teach Your Kids To Safely Play Pokemon Go

“Mom, wake up,” whispered my nine year old into my ear as he nudged my shoulder, “Mooommmm.”

I glanced at the alarm clock, it was only 6:45 a.m. on a weekend. I immediately thought he was sick or needed some help getting breakfast, so I complacently rolled over to get out of bed. Then he said it, “Mom, come on! Can you please turn on your data so I can grab the Cloyster sitting in the Smith’s yard before the neighbors get it?”

Yes, my lovely child had risen with the sun to sneak in a little extra Pokémon GO (on my phone by the way) before his siblings woke up. I should be shocked and a little surprised, but this free app has downloaded an entirely new dynamic into our family. Often, the kids are so engrossed with the game that they are strategizing, discussing, and heading out together in pursuit of snagging an elusive Pokémon or to hatch eggs. This is a stark contrast with how they used to interact, mainly fighting over the remote or who got the last cookie.

Lately, concerns have surfaced about the dangers and risks associated with Pokémon GO. These are very real problems, but as parents, we need to sit back and examine if the benefits outweigh the cons of the Poké revolution. This game is uniting families, getting children excited about exercise, allowing them to develop critical thinking skills, and developing camaraderie within communities in unprecedented ways.

kid-playing-pokemon-go

10 Essential Tips For Safely Playing Pokémon GO

So far, Pokémon GO has been downloaded at least 15 million times and that number is growing daily. As more and more Poké trainers and hunters hit the streets, there is undoubtedly a need to teach our kids to safely play this app. Thankfully, we can follow the safety strategies listed below to reduce our children’s risks:

Play in pairs or groups. Avoid allowing kids to play alone and encourage them to go out with a friend or two. Additional people will provide a safety net, making it less likely that a child will encounter a dangerous situation.

Better yet, play with them! Take advantage of a child’s interests and build in a little extra quality one-on-one or family time while getting everyone outside exercising.

Dress for safety and wear reflective or highly visible clothing. By doing so, we are increasing our sons and daughters overall visibility to drivers and bikers which will reduce the likelihood of accidents.

Draw boundaries of where kids can and cannot play the game. This game is built to encourage a lot of walking and kids might wander a little too far from home. Before letting them head out, set clearly defined boundaries that meet your approval.

Require kids, including teenagers, to map out their planned routes and have them check in every now and then. In addition, consider giving a child a pocket sized emergency charger so they can power up a dying phone. This will allow our kids the ability to contact us at all times.

Help children develop the skills needed to be aware of their surroundings. Have them stop in safe public locations, avoid walking and watching their screens, and to never play in areas that are secluded. If they feel uncomfortable in a location, tell them to leave and call you.

Go into the game’s settings and select it to vibrate or buzz when a Pokémon is nearby. This simple measure will enable a child to walk safely and pay attention to their surroundings without missing out on any great captures. 

Never allow kids to walk around at night. A majority of pedestrian accidents that result in death occur after sunset. It’s okay to limit playtime to daylight hours, as an added bonus you will be providing some much needed time to unplug and unwind.

Teach children to be respectful at all times. Instruct kids on public etiquette, good manners, to walk only on sidewalks, and to be mindful of other people’s property. Politeness is an absolute necessity while playing this game.

Never operate a vehicle while playing Pokémon GO. The distractive nature of this game is a dangerous combination with driving. If they need to drive, stress the importance of stopping a vehicle in a safe spot before playing and choosing a designated driver.

How do you teach your sons and daughters to safely play Pokémon GO?  Leave your comments and suggestions below.

Posted in Articles, Education, Games and Fun, General Safety, In Real Life | Tagged , , , , , , , , | Leave a comment

Intenet and Email Safety | ZooBuh

Email is a great communication tool but young members of the family have to be taught how to use it correctly. Discover these internet and email safety tips.

Teaching Kids About Safe Email Usage

Email is a very important form of communication. It is quick, easily accessed world-wide. In seconds we can contact friends and family around the world. Unfortunately email can also be used to criminals, predators, and others who try to exploit people online. While everyone faces danger from the activity of unscrupulous email users, children in particular are vulnerable to scams. Teaching your children about safe email and internet usage can help prevent many problems.What Does Safe Email Usage Look Like?

Having firm ground rules regarding internet and computer usage is important; every member of the family should follow them. The rules about email usage might include:

• Not sharing personal information through email
• Email can be sent and received during regular internet-use hours; no checking email past bedtime
• Email should only be checked on the family’s computer; this computer is kept in a shared space, such as the living room or rec room
• Using a kid-friendly email service such as ZooBuh to monitor how messaging is used; sign up instantly today!

Improve Everyone’s Safety

Parents can begin considering how reasonable internet-use rules by examining their own email behavior. Are there ways in which you can improve? It is very simple to fall into bad habits that put personal and family safety at risk; learn to recognize these so they can be stopped early.

Posted in Email for Kids, Internet Safety, safe email for kids | Tagged , , | Leave a comment

Parents Can Decode Online Lingo | Zoobuh

Kids and teens use slang and online lingo to communicate with friends. Parents should learn what these words mean in order to monitor conversations.

Discover What Kids Text About

There is no question that kids are discovering new ways to use technology almost as fast as new devices are released. As soon as a new phone, tablet, or game device hits the market kids are learning how to use them, especially to talk with friends. Texting, chatting, and other forms of instant messaging are convenient ways to keep in touch and kids love sending short funny messages to one another. Because these messages can include lingo peculiar to texting and online chatting, parents are sometimes unfamiliar with the contents of these messages. This can make monitoring a child’s use of text messaging difficult.

Learn the Newest Popular Phrases

These are just a handful of the abbreviated words and terms that might be utilized in an text conversation:

• ATM – At the moment
• ASL – Age, sex, location
• AF – “As f*ck”; an emphasis
• B/C – Because
• D/L or DL – Download
• FTW – “For the win”; a declaration of success or superiority
• Gr8 – Great
• IKR – “I know, right?”; a way of expressing agreement
• PLS – Please
• SMH – Shakes my head; expressing disbelief, frustration, or incomprehension
• NP – No problem

Find and search the list of chat words here.

Parents Can Help Keep Kids Safe

There is new online lingo being developed every day and kids pick up on it fast. Learning about your child’s conversations can be a good way of keeping them safe. Zoobuh allows parents to preview email messages sent to a kid-friendly email account; sign up for yours today.

Posted in Education, Internet Safety, Teens | Tagged , , | Leave a comment

Teaching Children About Basic Online Safety

Parents can take an active role in teaching children how to use the internet safely. Make online safety a part of your household.

Teaching Children About Basic Online Safety

Online safety is a very important subject and has to be discussed with children as soon as they begin to use a computer to access the internet. Parents can protect children by setting a good example regarding safety and developing simple strategies.

Talk About Private Information

Kids love to share but parents are not always alright with kids sharing everything. For instance, there is some information that should be regarded as personal. This can include:

• A child’s real name and the names of their family members, including pets
• The names of schools, day cares, places of employment, and frequent shopping destinations
• The name or location of churches or other places of worship
• Telephone numbers and home addresses
• Age, height, eye color, hair color, and skin color

Even though information such as the name of a pet or the location of a favorite shopping mall might seem harmless, online predators and criminals can use this information to impersonate parents, family friends, or concerned community members. Distinguishing characteristics, including health information like allergies, should also be treated as private.

Creating an Atmosphere of Privacy

Parents can encourage children to cultivate a healthy skepticism of strangers by discussing topics like personal boundaries and what makes information private. These lessons will help children stay safe online and out in the world. Zoobuh’s kid-friendly email service empowers parents with tools that enhance online safety for every member of the family. Sign up today!

Posted in Articles, Email for Kids, Internet Safety, safe email for kids | Tagged , , | Leave a comment

SPAMisconceptions – 5 Misconceptions About Spam

A Short List of SPAM Myths by Alan Fullmer

There are many types of SPAM.  (bulk, annoyance, illegal, etc.)
You have everything from body part enhancement, to window replacement, penny stock promotions, virus and Trojan related messages.

It can be tricky to figure out what messages are real, what’s fake and which want to simply steal your identity.

My first rule of thumb is, question everything.  If you didn’t ask for it, don’t click on it.

Unfortunately, even that isn’t enough.  I’ve received spams that appeared to be from friends, even my wife—but it was nothing more than a link to a phishing website.

I have compiled a few myths that a lot of people think to be true but are in reality—false.  These are more targeted at the marketers that fail to acknowledge them, intentionally or otherwise.


Myth #1: Spam isn’t that bad, just hitting the delete key isn’t that hard.

Spam goes beyond the mere annoyance of having to press the delete key.  Behind the scenes is an incredible amount of non-stop filtering that happens.  Just because you don’t see the spam doesn’t mean it’s not there.  I always say to people; “I wish I could let all spam through just for a couple minutes to show you how much you really would get.”   Now there are some that get more than others.  The jim@, john@, mary@ etc.  The names that are commonly known which dictionary attacks are good at guessing.  Then there are the people that sign up for everything.  Whilst the actual requested emails they asked for are not what we are as concerned about, it’s the ones that come in that have been sold multiple times.

I’ve done tests.   I do a lot of tracking when I have to sign up for things.  Even companies that promise my email address will not be sold or given to anyone.  Certainly we all have concluded that is a lie.  In one instance, I gave an email address alan1234@zoobah.com (where the 1234 is the ID I assigned to that company or institution requesting it and misspelled zoobuh.com as zoobah.com) to a car dealership to send me notices when it’s time for service.  The terms of this negotiation had language indicating it would not be shared with anyone.   Yes, I look at the fine print, it’s just what I do.  5 years later, I am still getting an incredible amount of spam coming in on that address—this after their promise of it not being shared with anyone and I have never used it with any other place.  I have since disabled the email address, but they still send spam through it.

I’ve also done the test where you click on any unsubscribe link in a spam message. When it takes you to the unsubscribe page, simply put in a made up address.  Similar to my previous test, I will do jibberish5678@zoobuh.com.  Of course without checking their records it will say, “Your email will be removed in 24 hours.”  And of course, we will see spam coming in on that made up address through the unsubscribe link.

One last test, and in my opinion a very effective way to combat spam, is a spam trap (honeypot).  Carefully placed secret email fake addresses scattered around the web.  Web scrapers love these.  They scour the internet for users’ email addresses from forums, blogs, etc. and then adding them to their spam lists.  (Of course they will say you signed up for it. 😉 )
The main reason spam traps are useful and effective is that nobody uses them.  They are fake.  So if we receive mail on these addresses, we simply block every subsequent request from that server.  We know it is spam.  Our tests show that it usually takes about a week for these addresses to be harvested and placed onto spam lists ready to be sold.  More information on this can be found here: https://en.wikipedia.org/wiki/Spamtrap

Myth #2: Spam isn’t any different than companies mailing you car ads, coupons, house refinancing, etc. through the US Mail.

Companies spend a lot of money, printing, paying for postage and buying lists of addresses to send these to. The burden of cost is on the sender of the ads.

With Email Spam, you can get a billion email addresses for under $50.  It’s practically free to send spam.  Sure you might pay for your internet connection at home or work, but you’re paying that anyway and it’s a very small cost.  Furthermore, Wi-Fi hotspots, libraries, schools and wide-open networks can be tapped into at no cost.

So the burden of cost is now on the receiver (we the ISP) instead of the sender.

Just one domain out of the many available to our customer base, received over 30+ million spams since the beginning of the year (end of June 2014).  In one year’s time this particular domain could see over 5 million spams per month, 167k per day, 7000 per hour.   This is also assuming the volume stayed static, which it never does.  It always grows.  Combine all the other domains and addresses we host and that number climbs insanely high.

Myth #3: You signed up for it.

Perhaps there are some that do, but for the majority of people do not.
My favorite line: You are receiving this because you asked to receive offers from _______.

No, I did not. Whatever the “from” equates to, I never asked anything of the sort. I don’t want my mortgage refinanced, I don’t want or need an affair, I don’t want any particular body part enhanced and I don’t want any cheap Canadian meds.

Spammers use this line frivolously. I am unsure if they think it makes it all legitimate, or they assume you’ll say to yourself, “Well golly gee, maybe I did sign up for it.”

Myth #4: Dictionary attacks aren’t bad because it doesn’t go to real users.

This is very wrong. Just because we receive messages for users that don’t exist, doesn’t mean we don’t still process it. The system has to verify the user even exists. This means it has to access it from some type of database, compare to any RBL filters and honeypots—at the very least. Compound that with a decision to discard it, or bounce it. I particularly like the fact that if I flub the address, I get a response back from the server telling me that there is no person there, rather than wondering if the recipient ever got my message. That said, an extremely high percentage of spams come from addresses that are not real. So a bounced message (backscatter) will generally ping pong between servers, or sit in the queue for days until it expires, or even worse—if the domain is something like @yahoo.com, the bounces end up being received by Yahoo and they decide to blacklist your IP. This puts a lot of work on additional employee(s) to create rules and configuration to prevent backscatter.  http://en.wikipedia.org/wiki/Backscatter_(email)

Myth #5: it’s just part of a company’s budget. It’s not a big deal.

In the past, the IT budgets never included money for spam filtering. Surprisingly, even today, most budgets still don’t include it. It never shows up as a line item or issue. I think because it’s just assumed you get to deal with it and is part of the email system. But usually the people making those decisions don’t get to see how much spam they are really getting. Out of sight, out of mind. But they do seem concerned at times about the constant upgrading and purchasing of heavier duty servers and equipment “just for email.” Hard disk use, power consumption due to processing, bandwidth can be very costly.
If you were to track the time you spend sorting through the few spams that made it through the filtering system for a year. I think you would be surprised at the time spent.


Processing Spam used to be simple.  Install an off-the-shelf anti-spam product and you’re set.   Today, it’s become a science.  Marketers are trying harder than ever to bypass filters.  One cannot simply rely on any one technology.  You can’t simply look for words and phrases.  Marketers try everything from obfuscation of text, replacing English letters with Greek or German because they are still readable.   Adding Bayesian checks helps, but even still marketers try to poison the database with random words, texts or phrases.  Personally, I’ve yet to see this method very successful, I’m sure it works to some degree.  This is easy to spot.  Most of the time the random words are hidden in HTML text or CSS code.  Other times you’ll see excepts from random poems or news articles at the bottom of the message.

The CAN-SPAM Act of 2003 is pretty black and white when it comes to this stuff.  A lot of the wording is based around false and misleading information.

If you have to wonder about how legitimate the company is that’s trying to sell you something, you don’t need to go further than looking into how hard they try hiding their marketing identity.  Allow me to elaborate;

There are two main domains associated with the emails.  The domain that the sender’s email comes from, and the link(s) in the body of the message.  There are many “whois” lookup services that can get you this information for free.

  1.  When you look at the record of the domain holder, is it private? Does it have any wording like Domain Protected or Privacy Protected.
  2.  Are any of the domains .us, .info, .biz, or .pl?   (Not limited to only these extensions)
    These are “disposable” domains.  They are cheap.  Usually they are only a few dollars compared to .com and others that are closer to $12 for a year.
    Spammers will register them for one year—fully knowing that they won’t be renewed and will quickly be blacklisted.  But by that time, they’ve already sent the billions of spam.  It’s an easy investment.
  3.  Are there patterns in the domain name? For example, someword-joe23.us
  4.  Do the domain names reflect anything from the content/advertiser?

Somewhere the message must indicate it’s an advertisement.  It should be a simple sentence that should read “This is an advertisement, unsubscribe here” but instead you’ll see every attempt to disguise it by using words like “advert,” “admsg,” etc., even going as far as to use every variation of a word found in a thesaurus.  The fact is, they aren’t being upfront and honest.   Lately there has been a lot of images that have this wording to try to bypass context filters.  The main problem with this is these images are generally remotely hosted.  This has two main benefits for the spammer.  It doesn’t get picked up by the filter and second they can track and verify you’ve viewed that image.
Since most email programs now require a step to view remote images, you’ll probably never see it.  Also, if the remote image is removed or broken, the unsubscribe language will never be seen.

Another common thing a spammer does is use a PO Box or a UPS store box to hide their real identity.

I personally would never want to do business with anyone that can’t be upfront and honest with their ads and/or marketing.  You would never allow this in a newspaper ad, why would email be any different?  The fact that they are trying to deceive should be the only red flag you need to know to stay away.

Dan Hates Spam (http://danhatesspam.com/whyspamsucks.html) sums it up perfectly:

“The Internet offers tremendous potential for marketers to deliver precisely targeted and customized information and offers to consumers who truly want to receive them, but all too often, spammers abuse the potential of the technology and instead take advantage of zero-variable-cost nature of email to blast their unsolicited advertisements at every email address they possibly can.  Let me repeat this point – there is no financial incentive for a spammer to do any kind of list management that a traditional (offline) marketer would use.  That’s why men get spammed for breast enlargement pills and women get spammed for penis enlargement pills; why people with regular plumbing get spammed for septic tank solutions; why children get spammed with prostitution ads, etc.”


I hope you find something useful in this article. I am not a writer or really care to be one so forgive my mistakes. I just want to lay out some facts for you. If you do find this article useful, feel free to share it. Also, if you have any comments, leave them below.
-Alan Fullmer

 

PS.  I am going to do a test and report back with the results in a month or so.  I am going to create a fake address.  Let’s call it art0717@zoobuh.com and see how many unsolicited emails we receive on this address in a month’s time due to spam scraper utilities…  but please readers, don’t add it manually to any lists, that would defeat the purpose of the test 😉

Posted in Articles, Education, Spam and Scam, Technical | Tagged , , | Leave a comment

themillionairesclub.co spam scam

Many of you already know we are very proactive in combating spam. Occasionally we come across a few we feel our users should know about.  We have received at least 100,000 of these emails in the last few weeks.  Of course they have been flagged as spam as the violations of these emails are easy to spot.

Here’s an example of one of the spam messages:

Hello!

We are looking for employees working remotely.

My name is Roland, I am the personnel manager of a large International company.
Most of the work you can do from home, that is, at a distance.
Salary is $2500-$5000.

If you are interested in this offer, please visit Our Site

Best regards!

The link provided sends the user to a hacked site, such as WordPress, then forwards onto their landing page:

Capture1

Then clicking through gets you to their site where you watch a video trying to convince you to sign up with their scam.

Capture3

A quick bit of research on the domain name shows it’s a proxy/private registered domain in the Bahamas.  Two major red flags.  Simply put, they don’t want you to know who they are.  If that’s the case, are they to be trusted?  No.

I did a simple test by entering a jibberish md5 hash generated email address on their unsubscribe link, despite the “You Will Never Get Spam”, and of course hours later we are receiving messages sent to that fake email address.

I’m including two links to external sites that go into much more detail about it.

https://www.binaryoptionsspot.com/millionaires-club-scam-exposed/
http://binaryoptionsopportunity.com/the-millionaires-club-scam/

Posted in Internet Safety, Money Scams, Spam and Scam, Technical | Tagged , , , , , , | Leave a comment

iPhone, iPod, iPad Email Setup Instructions

How to set up POP3 on your iOS device. There will be slight differences between the devices and OS versions but they are close enough for this tutorial.

Step #11             
Locate and tap the settings icon.
Step #22

Tap Mail, Contacts, Calendars
Step #33

Locate and tap the settings icon.
Step #44

You will see various types of preset accounts such as Google, Yahoo, AOL, iCloud, etc.Choose “Other”
Step #55

Add Mail Account
Step #66

1. Under Name, put your child’s name.
2. In the Email field put the complete email address of your child. Replace “username” with your child’s selected username.
3. Password is case sensitive. If you set a password with upper and lower case letters, it is required to be identical.
4. Description can be whatever you want. This is so your child can recognize it from the list. If you have multiple children using the same device, then specify it accordingly.
Step #77

Select POP. Do not choose IMAP. This tutorial is for POP only.
Step #88

Incoming Mail Server Settings:
Host Name: incoming.zoobuh.com
User Name: complete email address of child account
Password: case sensitive passwordOutgoing Mail Server Settings:
Host Name: outgoing.zoobuh.com
User Name: same as incoming (above)
Password: same as incoming (above)
Step #99

This may or may not pop up. If it does, choose “Yes”
Step #1010

After you complete that portion, we are going to go back into the account and check the settings. Select and tap the account you just set up.
Step #1111

Scroll down and tap “Advanced”
Step #1212

1. Verify that SSL is selected/turned on.
2. Server port should be 110. If it is anything but 110, it will not work.
3. The other options can remain default.
4. Scroll back up and tap Done
Step #1313

Next screen, scroll down and tap SMTP this time. Then tap on the outgoing.zoobuh.com server which should be listed under primary.
Step #1414

1. Host Name and User Name should be as set in step #8. It should already be populated.
2. Use SSL should be selected/turned on.
3. Server port should be 587. Any port besides 587 will not work.
4. Save the settings and you should be done.
Step #15
Ensure you saved everything as you back out to the settings screen. Once complete, you can go into the Mail App and start receiving and sending mail.

 

Posted in How To, Internet Safety, Technical | Tagged , , , , | Leave a comment

Facebook post: Drugs disguised as candy brought to school.

It’s unfortunate when we see stories like this.  Parents beware:

Looks like ‘Smarties’ but it’s actually meth kid brought to school

“IONE, Calif. — A middle school student at a school in California was caught snorting methamphetamine that was packaged to resemble Smarties candy.”

read more…  https://www.facebook.com/ZooBuh/posts/10154032658782310

Posted in In Real Life | Tagged , , , | Leave a comment

Open Up New Communication Opportunities with the Best Email for Kids

If you are like most parents, you’ve been wishing that there were a safer way for children to communicate online. ZooBuh is breaking new ground in the realm of making your child’s online communications safer. If you’ve been looking for a superior email for kids option, then ZooBuh is the answer.

The Dangers of Cyberbullying

More and more these days, parents are worried about what kind of communication is happening with their child online. Stunningly, a Harris Interactive-McAfee study concluded that 20% of children have engaged in cyberbullying.

Cyberbullying, a term that was virtually unknown just a few years ago, has become a very serious problem as teens and even children post embarrassing photos, discuss rumors and generally demean and harass other children. Protecting your child from such inappropriate behavior is one of the reasons why ZooBuh was created.

What Does ZooBuh Offer?

The features built within ZooBuh are powerful. ZooBuh’s email for kids was designed to protect children from a wide spectrum of unwanted and potentially damaging communications. Once you’ve tried ZooBuh for yourself, you will agree that there has never been as functional or useful tool for managing email for kids.

One of the key features of ZooBuh is the Mail Queue System – which makes it possible for parents to approve or deny any incoming or outgoing message before your child sends it or sees it. This feature brings peace of mind to parents as they know exactly what messages are coming and going from their child’s inbox.

Learn When and Why Communications Occur

ZooBuh’s parent friendly and intuitive tools include the ability to send copies of incoming as well as outgoing messages directly to you, the parent. Imagine for a moment being able to know what kind of emails your child is sending. With our service, you’ll also learn when and why these communications take place. Any parent looking to keep their child safe will absolutely love ZooBuh and all it has to offer.

There are additional features – such as the ability to restrict the times that email can be used, restrict email use entirely, block specific senders, pre-approve other senders such as family members and a great deal more. And the activity-logging feature of ZooBuh means that you will never be left wondering how your child is using email.

The Best Email for Kids

With each year that passes by, email for kids is becoming a greater priority. With ZooBuh, parents can finally relax and know that an innovative, effective, and proven technology is now on their side.

Posted in Articles, Email for Kids, ZooBuh | Leave a comment