Description: a simple and practical data encryption procedures, in our lives important information such as authentication, access expressly adopted, it is easy for others to steal, and after the first use encryption into the database, with the reduction in time, thus ensuring data security.
File list (Check if you may need any files):