Introduction - If you have any usage issues, please Google them yourself
The use of an XOR encryption algorithm program, and a better interface, while the decryption. The name of the reversible encryption. Any document can be full code XOR, while use of other communication tools transmission XOR password. Achieve the file transfer security.