|
Review and how it works
Naomi was designed to continuously monitor the internet connections, preventing children access to inappropriate and harmful Internet content - e.g. photos or texts related to vulgar terms, pornography and aggressive images and video.
The parental control software Naomi stops sites that popularize violence scenes, terrorism, extremist sects and hate groups, drugs, casino games, occultism, etc.
This program it is not based on a plain list of prohibited sites. But how does it work? Well it checks simultaneously all the data spread and collected by each internet program. In this way it will recognize automatically the new inappropriate materials.
The tool analyzes and guarantees parental control, blocking web browsers, chat software, news readers, and the rest.
After installing, Naomi will be visible as a red flower icon in the tray area (near Windows' time).
Naomi comes as a free tool that filters web content. It is the right solution for parental control.
Brief details Naomi children protector software is a versatile instrument, suitable for many situations and it doesn’t change any computer configuration.
A certain level of parental control is absolutely necessary.
Naomi is able to detect some dialer sites, blocking them.
It uses the method of heuristic analysis intended for detecting new content (previously unknown) on the fly.
It also makes a semantic analysis, including website text, addresses and links.
It supports several of the most spoken languages.
This application recognizes ICRA (Internet Content Rating Association) labeling system.
Naomi internet filter examines instantaneously all the data and blocks web sites to shelter children from inappropriate online material.
How to install & uninstall Naomi - system requirements NOTE: Certain antivirus programs may report Naomi as containing a virus. This is a confirmed false positive caused by their heuristic detection engines which are not always 100% accurate and the technology behind the filter which does not allow to be uninstalled by unauthorized persons, without providing the right password. It is completely safe to be used. Accordingly, you may need to configure your anti-malware program to allow it.
|
|