. . "Decrypting the file was a matter of simply repeating the steps: selecting the file, entering the password, and giving the program a few seconds to do its thing." . .