As a security administrator, auditor or “ethical hacker,” there are times when you will be tasked to monitor a person’s computer usage, including Internet sites visited, files created and/or modified and computer accounts created and/or modified. As a head-of-household, you face many of the same challenges, especially as a parent. Built-in, free and commercial computer […]