Unlikely to help someone, but anyway.
This list is just a reference which hopefully saves some googling. Let's make it clear that we're talking about symmetric encryption here, that is, a password (or better, a passphrase) is supplied when the file is encrypted, and the same password can be used to decrypt it. No public/private key stuff or other preparation should […]
Bulk replication of directory trees.
TMTOWTDI, even for password hashing.
Just a summary of sparse information about poorly documented features.