It is easy to crack if the cracker knows what to look for - assuming you can hide this fact (ie, cracker has no availability to code and/or program that decrypts) it can be fairly hard to crack. But: a) Any cracker mindbent on getting that password will try XOR as one approach, and b) that is Security through Obscurity which is a bad thing to rely on.
A long password can be hard to crack with brute force, again providing that the password is entered, and nothing that can possibly be extracted from a program available to the cracker. But (again) XORs are fast to try compared to other "guessing" algorithms. And if the password is possible to see somewhere, well you are out of luck anyways. :)
XOR has the benefit of being easy to implement with just about anything - as you have seen. If you are gonna stick with that, try to add some extra garbling too - for instance change the order of the encrypted characters and introduce garbage. It will make it harder to guess the algorithm. Again, this is null and void if the algorithm may be extracted from a program somehow.
Noone(?) uses XOR for stuff that needs real security. I guess there is a reason. :)
You have moved into a dark place.
It is pitch black. You are likely to be eaten by a grue.