12/25/2023 0 Comments Gnu privacy guard![]() update-trustdb update the trust database refresh-keys update all keys from a keyserver search-keys search for keys on a key server gen-revoke generate a revocation certificate ![]() delete-secret-keys remove keys from the secret keyring delete-keys remove keys from the public keyring check-sigs list and check key signatures c, -symmetric encryption only with symmetric cipher b, -detach-sign make a detached signature Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512Ĭompression: Uncompressed, ZIP, ZLIB, BZIP2ĭefault operation depends on the input data See the file COPYING for details.Ĭipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH This is free software, and you are welcome to redistribute it under certain conditions. This program comes with ABSOLUTELY NO WARRANTY. Once you have installed GnuPG you can issue the command “ gpg” from the command line with the “–help” qualifier as shown in Figure gpg -helpĬopyright (C) 2005 Free Software Foundation, Inc. Once the YaST tool has loaded you can search for the GnuPG program simply by searching for the keyword “ gnupg“. To install the GnuPG package you can issue the following command to start YaST “ yast sw_single” or “ yast2 sw_single“. SLED 10 SP1 ships the GnuPG RPM (Red Hat Package Management) package. The installation of GnuPG on SUSE Linux Enterprise Desktop 10 SP1 is very simple. If you are using SUSE Linux Enterprise Server 10 SP1 you will need to compile the GunPG software. In this article we will be using SUSE Linux Enterprise Desktop 10 SP1. The GnuPG application is a free implementation of the OpenPGP application with features such as: “Decrypts and verifies PGP 5, 6 and 7 messages”, “Supports ElGamal, DSA, RSA, AES, 3DES, Blowfish, Twofish, CAST5, MD5, SHA-1, RIPE-MD-160 and TIGER”, “English, Danish, Dutch, Esperanto, Estonian, French, German, Japanese, Italian, Polish, Portuguese (Brazilian), Portuguese (Portuguese), Russian, Spanish, Swedish and Turkish language support” and many other features. In this article we are going to look at setting up GnuPG and how to encrypt sensitive data.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |