Analysis: Tips to make mobile computing more secure