Secure computing tips