implementations of ARCFOUR stream cipher, SHA-1 hash algorithm,
CRC-32 check sum counter and other tools and functions.
programmers who are fed up with the fact, that their source
code can be stolen and simply modified. It will scramble any