In five pages this paper discusses predators, firewalls, and passwords and they pertain to safety on the Internet. Five sources are cited in the bibliography.