A device for and method of secure computing that includes a computer system having
a processor; an operating-system software program loaded onto the processor; a
type-II virtual machine monitor software program loaded onto the operating-system
software program; a user-definable number of non-sensitive virtual-machines; a
user-definable number of sensitive virtual-machines, where each sensitive virtual-machine
has a user-definable sensitivity level; a user-definable number of encryption virtual-machines,
where each encryption virtual-machine is connected to one of said user-definable
number of sensitive virtual-machines, and where each encryption virtual-machine
includes at least one encryption algorithm capable of encrypting information from
the corresponding sensitive virtual-machine according to the corresponding sensitivity
level; and a router virtual-machine connected to each non-sensitive virtual-machine
and each encryption virtual-machine.