Computer Security 101, part 2