Similar Items: Security in computing