Introduction - If you have any usage issues, please Google them yourself
The preparation of a simple encryption program it to a file of all the letters according to the following rules of conduct for non-letter characters remain unchanged. Text can be created, the file name can be self-conversion law: A → Z, B → Y,