Description: Give a lot of file encryption technology, which is divided into different levels to fit the needs of different occasions. Give here the most simple file encryption technology, which adopts the document-by-byte XOR with the password encrypted on the file, when decrypted, simply re-run again encryption procedures. The following is an example of the procedure, any document can be encrypted, password, require users to input, limited to eight days (of course you can change). Procedures have a very good fault-tolerant design, that is what we should study the
To Search:
File list (Check if you may need any files):
encryption.txt