With all the NSA hooplah this past year, and mounting concerns over user security, it’s not surprising that you might want to shield certain of your files from prying eyes. You can use any of a number of overly complicated solutions, including Terminal commands and expensive consultants, but software developer […]
Read the original post by Serenity Caldwell