Regards,
Charlie
602.420.4123
> -Original Message-
> From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of
> Robert J. Hansen
> Sent: Wednesday, June 17, 2015 7:15 AM
> To: A.T. Leibson; gnupg-users@gnupg.org
> Subject: Re: Teaching GnuPG to noobs
>
> > What has your ex
Greetings
Whenever I attempt to operate upon a remote file using a UNC, it doesn't seem
to find the file.
C:\Users\cspitzer>gpg --decrypt "\\remote.machine.com\data\Vendor File
Transfers\Archive\Input.2015-06-15.045720.csv.pgp"
gpg: can't open `remote.machine.com\\data \\Vendor File Transfe
So, I used gpg 2.22 to import someone's key, and then encrypted a file with it.
I sent it to them, and they couldn't decrypt it for some reason.
I then exported the same key, and found that the export file doesn't match the
key that I imported. Shouldn't it be the same, or is there something in
inglis...@hauke-laging.de]
Sent: Sunday, March 16, 2014 10:42 AM
To: gnupg-users@gnupg.org
Cc: Charles Spitzer
Subject: Re: problem encrypting with someone else's key
Am So 16.03.2014, 15:48:18 schrieb Charles Spitzer:
> So, I used gpg 2.22 to import someone's key, and then encrypted a fil
Except when your ISP is silently subpoenaed and they satisfy it without
notifying you. There's no telling what the ISP has stashed away without your
knowledge.
I have had my gmail email subpoenaed, but Google notified me when they received
it that they would supply the requested data on a spec
It's happening even faster. My kids, in their mid to late 30s, don't use email
at all. It's all quick, instant gratification type communications, like texts
or their internet-type ilk. Almost none of their friends uses email anymore.
Regards,
Charlie
480.505.8800 x4123
-Original Message
Greetings
Is there a GnuPGP project anywhere that does PGP encryption that is usable in a
C# application? I know I can execute commands at a command line to do this, but
that would require the plaintext to reside on disk somewhere and I'd like to
avoid that. I'd also like to avoid having to rol
Or, to put it another way: security through obscurity is ok. as long as no one
finds out, or goes looking for, public information, everything's hidden well
enough.
Regards,
Charlie
602.420.4123
-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of Rejo
gbenet.com
Sent: Friday, November 14, 2014 10:12 AM
To: Nicole Faerber; gnupg-users@gnupg.org
Subject: Re: My Conclusions
[Charles Spitzer]
That does not work
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users