Text this: Case studies in secure computing