Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication.
Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication.