Introduction - If you have any usage issues, please Google them yourself
himself wrote a practical encryption and decryption procedures, commonly used in the Application of the configuration file encryption and decryption, encrypted with the characters on the config file, decryption procedures can be called when declassified.