Weak Encryption Algorithm Examples In Real Life