This paper considers computer network security and related issues in ten pages. Ten sources are cited in the bibliography.