Introduction - If you have any usage issues, please Google them yourself
Simple XOR encryption, key encryption will be expressly adopted after the same operation can be decrypted
Packet : 35738644yihuo.rar filelist
YIHUO\1.txt
YIHUO\2.txt
YIHUO\3.txt
YIHUO\YIHUO2.CPP
YIHUO\YIHUO.ncb
YIHUO\YIHUO.PLG
YIHUO\YIHUO.DSP
YIHUO\YIHUO.exe
YIHUO\3.txt.bak
YIHUO\YIHUO.CPP
YIHUO\YIHUO.OPT
YIHUO\YIHUO.DSW
YIHUO\Debug
YIHUO