We will transform
any establishment
into an Internet
Cafe.
The
ICafe system has
two setup files
one is installed
on the server and
the other one is
installed on the
internet workstations
/ terminals.
In
an internet cafe
usually we find
a number of computers
connected together.
One of the computers
is used as a server
where the owner
of the internet
cafe can create
user accounts, check
the remaining times,
check who is logged
in etc. All the
other computers
are referred to
as the workstations.
The
ICafe system was
designed to be as
user-friendly as
possible, with
a point and click
front end providing
a simple path for
getting right out
on the web.

After
purchasing an account
from the internet
cafe reception the
customer is prompted
with a screen where
he can enter his
username and password.
The
interface can be
customized and you
can even put your
company logo.

Once
the customer logs
in he has a toolbar
with the options
he has available.

You
can decide to have
your windows exposed
to malicious customers.

Or
else you can have
your windows completely
protected by the
ICafe software

It is
up to you to decide what level
of security you
want to enforce!!!
"
Account Log-in and
Log-out"
One
of the main features
of this internet
cafe software is
that the customer
can log off and
use his remaining
time at later time.
He is not forced
to use the time
he bought at one
go! Instead he can
log in and log out
as many times as
required until his
time is finished.
In
today's business
this is very important.
Imagine a situation
where a customer
needs to read an
important e-mail.
All he needs is
5 minutes of internet.
He will never buy
a 30 minutes account
which can be used
only once.
"Security
Options"
Once
a customer logs
in using his account,
that account is
locked so to prevent
other users from
logging in using
the same username
and password.
The administrator
can give various
permissions to each
account, such as
-
can see the windows
desktop
- can use Internet
Explorer
- can access the
windows taskbar
From
the ICafe administration
module the owner
of the internet
can decide the level
of freedom he wants
to give to his customers.
You
have the option
to restrict each
workstation. The
following are some
of the security
options you have
available.
-
disabling certain
windows keys
- disabling the
windows shutdown
option
- do not allow the
clients to download
and install programs
- restrict web sites
from installing
software
- remove the windows
START menu
- hide the other
workstations on
the network
It is
up to you to decide
the level of security
you want. Be sure
that this Internet
Cafe can be
very restrictive
and secure.
"Accounts
Creations"
The
creation of accounts
is made easier since
the system is capable
of generating unique
random usernames
and password.

There
is no way for a
user to guess what
a password might
look like, since
there is no pattern
when accounts are
generated.
"Audit
Logs"
An audit log is
maintained showing
when users logged
in and out of the
system, when accounts
where generated
or modified, etc.
These
are some of the
features of the
Internet Cafe software.
Please do not hesitate
to contact
us for a free
demonstration of
our product.
This article is translated to Serbo-Croatian language.
|