Introduction - If you have any usage issues, please Google them yourself
This is a string manipulation through the text to achieve encryption and decryption of the source, through the disruption of the text string in the order, hide information, through declassified, we can restore the normal order of the original characters to achieve the purpose of encryption and decryption. Compressed including source files, then vc run.