Comment Re:CyberCafe (Score 1) 76
the best route for security/tamper proofing is to set the workstations to re-ghost on each reboot from a standard configuration. that way a user can do whatever he wants for the time he pays for, but as soon as his time runs out and he reboots, all changes are history and the fresh canned install is restored. easy everything does this all across europe - great business.