Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:CyberCafe (Score 1) 76

the best route for security/tamper proofing is to set the workstations to re-ghost on each reboot from a standard configuration. that way a user can do whatever he wants for the time he pays for, but as soon as his time runs out and he reboots, all changes are history and the fresh canned install is restored. easy everything does this all across europe - great business.

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.

Working...