This 3 page study examines various ways to protect data in a stand alone computer. Authentication is discussed. Bibliography lists 3 sources.