Introduction - If you have any usage issues, please Google them yourself
1. Through file encryption to prevent unauthorized users to view, to protect the purpose of the paper 2. Legitimate users enter the correct password to open and operate normally be 3. In addition to file encryption file encryption time, save the path records the formation of the log. 4. Development and design can be achieved after the data refer to an executable program running results