The Tried and True Way of Virtual Info Security in Step by Step