8The eBlocker settings....................................................................................................................38
8.1 General......................................................................................................................................39
8.1.1 License..................................................................................................................................39
8.1.2 Updates.................................................................................................................................39
8.1.3 Admin-Password...................................................................................................................39
8.2 Parental Control (beta)..............................................................................................................40
8.2.1 Activate Parental Control ......................................................................................................40
8.2.2 User and Protection profiles..................................................................................................40
8.2.3 Three easy steps...................................................................................................................41
8.2.4 Create a new user.................................................................................................................41
8.2.5Change settings of a user .....................................................................................................42
8.2.6 Remove User ........................................................................................................................43
8.2.7 Create new profile.................................................................................................................43
8.2.8Deny access to categories of websites.................................................................................45
8.2.9 Restrict internet access to certain time slots a day...............................................................46
8.2.10 Limit the maximum Internet usage per day...........................................................................46
8.2.11 Assign a user to device.........................................................................................................47
8.2.12 Controlbar for users with protection profiles .........................................................................48
8.2.13 What happens if the daily internet usage time is limited?.....................................................49
8.2.14 What happens if the internet access is denied? ...................................................................50
8.2.15 Add own lists to the Blacklists...............................................................................................52
8.2.16 Add whitelists to blacklist categories.....................................................................................54
8.2.17 Add own whitelist categories.................................................................................................55
8.2.18 Change of user through controlbar .......................................................................................56
8.2.19 Migration of Parental Control to eBlockerOS 1.0..................................................................58
8.3 Devices......................................................................................................................................58
8.3.1 Devices –General.................................................................................................................59
8.3.2Devices - General - Name.....................................................................................................59
8.3.3 Devices - General - Activate eBlocker ..................................................................................59
8.3.4 Devices - General - Enable SSL...........................................................................................59
8.3.5 Devices - General - Activate eBlocker icon...........................................................................59
8.3.6 Devices –Anonymization......................................................................................................60
8.3.7 Devices –Messages.............................................................................................................61
8.3.8 Devices - Discover new devices or remove devices from the list.........................................61
8.4 SSL............................................................................................................................................62
8.4.1 Define exemptions for end-to-end encryption.......................................................................63
8.5 Apps..........................................................................................................................................64
8.6 Set up and use the Tor network................................................................................................65