Using A Weak Encryption Methodologies Vs Methods