In six pages this paper considers computer networking protection through public key infrastructure in this overview that includes its system development. Five sources are cited in the bibliography.