Security Manager's Journal: Hashing out secure applications