I have it set up for a task at work and I have data. I am specifically looking to ensure certain traffic is encrypted.
The guides on the line are far far far too geeky for me and I was wondering if anyone else uses it and can give me some pointers here!?
Just the fact that some geniuses were laughed at does not imply that all who are laughed at are geniuses. They laughed at Columbus, they laughed at Fulton, they laughed at the Wright brothers. But they also laughed at Bozo the Clown.