Lots of solutions to this problem e.g. here and here but in order to decide which is best I\'d need to know more about the security implications of each solution (or at leas