Using A Weak Encryption Methodologies In Software