Description: The use of an XOR encryption algorithm program, and a better interface, while the decryption. The name of the reversible encryption. Any document can be full code XOR, while use of other communication tools transmission XOR password. Achieve the file transfer security.
To Search:
File list (Check if you may need any files):
可逆加密\MSSCCPRJ.SCC
........\Module1.bas
........\Form1.frm
........\工程1.vbp
........\工程1.vbw
........\Form1.frx
........\可逆加密.exe
........\w.ico
可逆加密