Introduction - If you have any usage issues, please Google them yourself
reproduced for file encryption technologies lot, which will be divided into different levels, to suit the needs of different occasions. Here is the most simple file encryption technology, which adopts a case-by-byte file with the password or different ways to document encryption, decryption, only re-running again can be encrypted . Below is a sample program that can be an arbitrary document to be encrypted, password request user input limit within eight (of course you can change). procedures have a good fault-tolerant design, that is what we should learn.
Packet : 39709584jm-c.rar filelist
jm.txt