Two Steps Toward Computer Security