f a q
 system requirements
 latest news
 buy now
 special offers
 contact us

Choose your language: English Romana

Hodoman Timer :: Internet Cafe Software :: Cyber Cafe Software

The server-application of Hodoman Timer 6.0 may even be installed on the Internet Gateway Computer. It will provide a web-interface for both the administrator and the employees, so you don't really need physical access to the computer it is installed on. In fact, it is recommended that you should use it this way.

Customer Support Center
Live chat by BoldchatPlus
Live chat by Boldcenter
Bookmark us
 Add to favorites
 Make Homepage
Newsletter Subscribe


Receive HTML mailings?
Subscribe Unsubscribe
How many computers in your Cyber Cafe?
< 5
5 - 10
11 - 20
21 - 30
30 - 50
> 50
Customer feedback

Hodoman rules!!! Cool product! I liked it from the begining and now I love it. I recommended you guys to other friends of mine and they, too, are pleased by your product. Thank you and good luck!
Elder, UK, 10 computers

I was mostly impressed by your support team with fast and accurate answers. Thank you for having helped me to set this up.
Eric, France, 8 computers
Buy now!   Buy now!          

The entire software has been developed with modern technologies and paying a great attention to security issues and problems that might occur. We have faced numerous and different kinds of attacks since our first version in 1999 and tried to integrate all of the solutions to these problems in this version.

A maximum level of security can be attained by installing the server on a different computer from the one your employees operate on and thus, preventing them from gaining physical access to it.

The communication between the server and the computer stations is encrypted and authenticated with the Client ID password. Using different passwords for each computer station makes the system even more secure.

Hodoman Timer
Security Enhancements

Client application security

  • disabled F8 and other boot keys at startup
  • restricted important files from being edited
  • registry policies
  • shell protection
  • anti-crash protection
  • encrypted configuration files

Server application security

  • encrypted configuration files
  • cookie and session authentication
  • data integrity protections
  • encrypted passwords

Communication security

  • encrypted messages
  • authentication password
  • IP authentication

FindApp.com - Download Windows Software
Web links
IntelliSoft SRL © 2004 All rights reserved.