I'm pretty sure it's the correct command line. I asked them twice, and
they sent me a line of copy and paste straight out of the UC4 job. I
had it in my head that the -f indicated the filename, but now that I
look, I'm not sure where I read that. I'm checking with our Production
Control guys now
Hi!
Robert J. Hansen schrieb:
>> Think of it this way. Let's say you don't trust Google for some reason.
>> Then you go to https://mail.google.com, and verify that the SSL
>> certificate is correct, so you can be sure your not on a phishing site.
>> Would you now claim that the site isn't authenti
Hi!
Robert J. Hansen schrieb:
>> Ok, so RSA isn't always significantly faster, as I thought it was. I
>> had read somewhere that it was, (probably on this list) and my own
>> testing with my 4GB backup files showed RSA to be notably faster.
>>
I second Robert here. With 4GB of data, the hashi
Is there a way to ignore a signature when importing a key?
Thank you
--
View this message in context:
http://www.nabble.com/Ignore-Signature-tf4306973.html#a12260503
Sent from the GnuPG - User mailing list archive at Nabble.com.
___
Gnupg-users mail
Hello all,
I have a couple of questions about how to handle the private key on a
server. The company I'm working with , is working with a consultant who said
the following:
"GNUPG has a keyring just like PGP. The private keys on that keyring need to
be controlled and not just left in the keyring
Hello,
I am new to gpg, and while I feel the following questions may be
common, I have not been able to find an answer to it on the web.
When you encrypt test.txt with gpg, you get a file names test.txt.gpg.
However, test.txt still remains on your hard disk. What is the best
way to delete this fi
Thanks for your quick replies. I actually drafted that message last
week but just managed to get it to go through today, so I do have some
more information.
I've gotten someone over here to help me a bit, and we've run some
tests.
Our file is being encrypted with gpg version 1.2.6
We had them
Again, this is not a bug, but a documented part of the protocol.
There are ways around it, and the details on this will be changing in
the future, but at least for today, if you send files as text, you
will lose end-of-line whitespace.
David
On Thu, Sep 06, 2007 at 10:52:18AM -0400, Paladino, Van
Oskar L. schrieb:
> No, in my example I used two, not one messages (pictures) and created
> permutations of both, and then compared both groups of hashes against each
> other.
This appears to be somewhere in the middle between a birthday attack and
a preimage attack.
It looks like a preimage attac
Hi
I'm playing around with the ~/.gnupg/gpg.conf file.
For example I've set "personal-cipher-preferences S9 S8 S7 S10 S4 S3 S2"
(I also tried delimiting them with commas).
I have made sure that those ciphers are supported in my GnuPG version
(Ubuntu Feisty Fawn) by looking at "gpg --version".
B
Hi,
I am using gnupg version 1.2.1 .
I am able to decrypt files in a folder if I specify the file name in the
command for eg:
gpg -o c:\decryption\spacs.txt --decrypt "c:\decryption\wild
card\today.txt.pgp"
but if I use
gpg -o c:\decryption\spacs.txt --decrypt "c:\decryption\wild card\*.pgp"
I ge
Robert J. Hansen schrieb:
>> One more thing: the key expiry. Do you think that setting the expiry
>> date after a year or two is a good choice? Or is better not to set a
>> expiry date and revoke the key when necessary?
>
> For most personal/home users, expiration is not necessary.
We might wan
Hi,
I am Atul, I have some queries regarding the gpg encryption algoritm. These are
as follows:
1. How to use RSA only for encryption?
2. Is 'expert' command recommended to switch the encryption algorithm from
ElGamal to RSA? If not how it is possible?
Thanks,
Atul.
_
Does GPG limit the length of the comment and email address fields when
creating a key? If so, what are the limitations?
Thank you.
--
View this message in context:
http://www.nabble.com/Key-Comment-Email-Address-Length-tf4319759.html#a12301255
Sent from the GnuPG - User mailing list archive at
Hello!
We are pleased to announce the availability of a new stable GnuPG-2
release: Version 2.0.7
This is maintenance release with a few minor enhancements.
The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication
and data storage. It can be used to encrypt data, create digital
15 matches
Mail list logo