{"id":2213,"date":"2013-07-03T10:36:31","date_gmt":"2013-07-03T14:36:31","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2213"},"modified":"2020-02-26T10:40:43","modified_gmt":"2020-02-26T15:40:43","slug":"limit-childrens-access-to-applications","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/limit-childrens-access-to-applications\/2213\/","title":{"rendered":"Tip of the week: How to limit children&#8217;s access to specific applications?"},"content":{"rendered":"<p>We\u2019ve already told you how to prevent your kids from accessing unwanted data online with tutorials on how to\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/limit-childrens-access-to-websites\/\" target=\"_blank\" rel=\"noopener nofollow\">block access to specific websites<\/a>\u00a0and how to\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/prevent-kids-downloading-files\/\" target=\"_blank\" rel=\"noopener nofollow\">control file downloading<\/a>. But aside from unsafe surfing and dangerous downloading, children can also spend endless hours playing video games. This access should really be limited too, so we would therefor like to show how to control children\u2019s access to video games, chats, social networks and Internet surfing.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015527\/05.gif\"><img decoding=\"async\" class=\"aligncenter\" alt=\"05\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015527\/05.gif\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><b>Parental Control<\/b>\u00a0from\u00a0<a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a>\u00a0allows you to limit the running time of applications on your computer, and you can limit or block access to specific applications on your child\u2019s own account.<\/p>\n<p>To create a list of blocked or allowed applications and to specify time restrictions, open the\u00a0<b>Parental Control<\/b>\u00a0settings. Select the required user account and make sure the\u00a0<b>Enable control<\/b>\u00a0box is checked in the\u00a0<b>Applications Usage<\/b>\u00a0section. To add an application you want to specify limits for, click the\u00a0<b>Add<\/b>\u00a0button.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015526\/tip_3July_1_en-1024x425.png\"><img decoding=\"async\" class=\"aligncenter\" alt=\"tip_3July_1_en\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015526\/tip_3July_1_en-1024x425.png\" width=\"837\" height=\"347\"><\/a><\/p>\n<p>The\u00a0<b>Control running the application\u00a0<\/b>window will then open. Select the executable file of the required application by clicking the\u00a0<b>Select<\/b>\u00a0button. You will be able to choose one of the following options:<\/p>\n<p><b>\u2013\u00a0<\/b>If you select<b>\u00a0Applications<\/b>, you can select an application from the list of running applications.<\/p>\n<p><b>\u2013\u00a0<\/b>If you select<b>\u00a0Browse<\/b>, you can select an executable file of any application installed on your computer.<\/p>\n<p>Once the application is selected, you can limit the application usage on selected days and assign daily usage time. If you would like to do this, check the\u00a0<b>Limit usage on the selected days<\/b>\u00a0box and mark in green the length of time you\u2019d like your child to be given access to the given application.<\/p>\n<p>In addition, you can specify daily usage restrictions. For example, on Saturday the user will be able to surf the Internet from 2 PM till 7 PM, while the browser will only be accessible during a period of 2 hours.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015526\/tip_3July_3_en.png\"><img decoding=\"async\" class=\"aligncenter\" alt=\"tip_3July_3_en\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06015526\/tip_3July_3_en.png\" width=\"559\" height=\"520\"><\/a><\/p>\n<p>You can find a detailed description of the\u00a0<b>Parental Control<\/b>\u00a0options on the corresponding web pages of\u00a0<a href=\"http:\/\/support.kaspersky.com\/kis2013\/settings\/parentalcontrol\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security 2013<\/a>\u00a0and\u00a0<a href=\"http:\/\/support.kaspersky.com\/pure3\/settings\/parentalcontrol\" target=\"_blank\" rel=\"noopener\">Kaspersky PURE<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve already told you how to prevent your kids from accessing unwanted data online with tutorials on how to\u00a0block access to specific websites\u00a0and how to\u00a0control file downloading. But aside from<\/p>\n","protected":false},"author":196,"featured_media":2214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[419,364],"class_list":{"0":"post-2213","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-kaspersky-pure","9":"tag-parental-control"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/limit-childrens-access-to-applications\/2213\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/limit-childrens-access-to-applications\/2200\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/limit-childrens-access-to-applications\/1177\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/limit-childrens-access-to-applications\/2213\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/limit-childrens-access-to-applications\/2213\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-pure\/","name":"Kaspersky PURE"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/196"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2213"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2213\/revisions"}],"predecessor-version":[{"id":32823,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2213\/revisions\/32823"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2214"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}