Administrators can customize the user interface to provide site-specific instructions. It uses some of the strongest encryption and hashing algorithms available. Source code for all these algorithms is in the public domain and has undergone years of cryptanalysis. The program has two core components--the Web interface, which users have access to, and the APR server, which requires elevated privileges. A limited one-way trust between these components protects your network from attack.