56 - Veterans Resources - A community for military veterans

Oct 13, 2006 · The second stage is that if you deal in anything even slightly controversial take precautions to secure the info in your system. Encryption is a definite must, as well as any other tricks to hide data on your system and prevent tampering. When encrypting data stay away from DES. ................
................