the file is a tar file and unpack it before further processing.
Something like this:
#!/bin/bash
FILENAME=$1
FILE_MIMETYPE=$(file -iN $FILENAME)
if [[ "$FILE_MIMETYPE" =~ "$FILENAME: application/x-tar; charset=binary" ]]
then
tar xvf $FILENAME
fi
As usual, du NO
you could send an email notifying the list when you
publish the results.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ther's signature packets, but depending on your problem it may do the job for
you.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ncrease, hopefully eventually making
intelligence agencies a bit more relaxed to the whole concept.
... and the bad stuff is next to nothing. Anyone not actively enabling this
option will likely never be bothered by it. Which would be the first step to
convincing other sites that this is a safe
(The GnuPG executable is usually named just gpg on linux, I'm not sure what the
command is called if you're on another operating system)
Cheers,
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
an out years ago, so e.g. shop.kernelconcepts.de should be able to ship it to
you.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Sun, Dec 01, 2013 at 01:21:56PM +0100, arne renkema-padmos wrote:
> On 12/01/2013 12:45 PM, Einar Ryeng wrote:
> >
> >Any news on the crypto stick (or similar initiatives) would be appreciated.
>
> An OpenPGP card with something like a Gemalto SIM usb adapter would
&
l hardware token for GPG.
Any news on the crypto stick (or similar initiatives) would be appreciated.
Cheers,
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
owever, I might add that I'm not able to reproduce the problem on linux and I
don't have any Windows computers at hand right now so this is just guesswork.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ore likely
to have a long life as people generally seem to change jobs more often than PGP
keys.
Cheers,
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
erent keys if I were you. Nobody will care that
they have to sign three keys rather than one or two. But you could also look
into the OpenPGP smart card options if you want to simplify your keychain.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-use
if they also
need a way to get your private key.
A good backup is to print the ASCII armoured export of your key on a sheet of
paper and keep it filed somewhere.
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
you also want to create revocation certificates for your key when you make
it, just to be certain that you're able to revoke it if you should come to
lose either your key or your passphrase.)
Cheers,
--
Einar Ryeng
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
rying fall back
gpg: encrypted with 4096-bit RSA key, ID 9A6EE054, created 2011-12-14
"Einar Ryeng "
gpg: public key decryption failed: General error
gpg: decryption failed: No secret key
---
(btw, this is not related to the agent not running)
I suspect this might be a bug
14 matches
Mail list logo