|
- The GNU Privacy Guard
GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications A wealth of frontend applications and libraries are available GnuPG also provides support for S MIME and Secure Shell (ssh)
- Encrypting and decrypting documents - GNU Privacy Guard
alice% gpg --output doc gpg --encrypt --recipient blake@cyb org doc The --recipient option is used once for each recipient and takes an extra argument specifying the public key to which the document should be encrypted
- GnuPG - Support - GNU Privacy Guard
GnuPG is a free implementation of OpenPGP HOWTOs Includes links to some HOWTOs available in several languages to get out the best from GnuPG
- GnuPG - User guides - GNU Privacy Guard
A Practical Introduction to GPG in Windows This guide, written by Brendan Kidwell, shows you how to use the free public key cryptography system GnuPG from a Windows user perspective It started life as an outline for a talk Brendan was going to give in his Cryptology class, but it quickly grew into a document that stands on its own
- GnuPG - GnuPG wiki - GNU Privacy Guard
It integrates with other applications A number of frontend applications and libraries are available The main command line interfaces are gpg and gpgsm Standards GnuPG is a complete and Free Software implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP)
- Operational GPG Commands (Using the GNU Privacy Guard)
gpg caches the passphrase used for symmetric encryption so that a decrypt operation may not require that the user needs to enter the passphrase The option --no-symkey-cache can be used to disable this feature
- GnuPG - gpg man page - GNU Privacy Guard
gpg-connect-agent(1) Access the background processes watchgnupg(1) Watch debug output gpg-check-pattern(1) Helper to check passwords
- The GNU Privacy Handbook
alice% gpg --output doc gpg --encrypt --recipient blake@cyb org doc The --recipient option is used once for each recipient and takes an extra argument specifying the public key to which the document should be encrypted The encrypted document can only be decrypted by someone with a private key that complements one of the recipients' public keys
|
|
|