CAUTION:
Applying the -INSECURE switch allows 3.7 clients to bypass the module's encryption security features.
If you are using the module in conjunction with 3.7, -INSECURE must be applied to the executable in order for 3.7 to access files using the module.