offtopic: need help from Mac owner

2009-03-28 Thread Hardeep Singh
. 3. In the text box, enter 'otalt' and this time, instead of pressing enter - press the Unjumble button. Same thing should happen, 'lotta' should be displayed. In no case should the form reload. Please let me know what happens. Regard

Re: questions: no input file, and pascal programming

2009-05-02 Thread Hardeep Singh
The same can be done in Windows. Visit http://blog.hardeep.name/computer/20080828/linux-shell-on-windows/ this will give you the shell and the Echo commands that you need. Hardeep Singh http://blog.Hardeep.name On Sat, May 2, 2009 at 1:05 PM, Philip wrote: > I found that if I just type &

Re: beginner type questions

2009-10-10 Thread Hardeep Singh
try gpg --gen-key --expert Hardeep Singh http://blog.Hardeep.name On Mon, Oct 5, 2009 at 9:37 PM, Durant, Dean wrote: > Hello, I noticed, on windows (which I truly despise), when I type > > C:\Documents and Settings\me\Application Data\gnupg>gpg --gen-key > > I get: >

Re: Interesting article on password guessing via cloud computing

2009-11-14 Thread Hardeep Singh
Hi David Vedaal and everyone This is something even I have thought: this seems to be a sure way to prevent such computing from being able to 'guess' the password. Why is then, parallel computing being haled as the antidote to privacy? Regards Hardeep Singh http://blog.Hardeep.name

Re: Regarding Encryption through vb.net code using gpg

2009-12-17 Thread Hardeep Singh
Hi Jagadeesh The discussion here might be of help: http://blog.hardeep.name/computer/20080904/auto-gpg/ Hardeep Singh On Tue, Dec 8, 2009 at 6:52 PM, Jagadeesh Bantrotu wrote: > Hi, > > > > I am trying to encrypt the file using vb.net code but the data is not > encryp

Questions from a newbie

2006-12-05 Thread Hardeep Singh
ve without installation. Regards Hardeep Singh Give your resume visibility. Get a home for it. Resume Central. http://RC.Hardeep.name ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

PGP software pirated

2007-06-11 Thread Hardeep Singh
really broken? Regards Hardeep Singh ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Revoke and expire

2007-06-11 Thread Hardeep Singh
Hi When a key is revoked using the revocation certificate, does it have the same effect as reaching the expiry date of the key? In other words if I set a key to no expire but generate a revocation certificate, it is equally safe? Regards Hardeep ___ Gn

Re: PGP software pirated

2007-06-12 Thread Hardeep Singh
> Even if the PGP license key was somehow compromised (which I highly > doubt), it does not follow that "probably our keys can also be > cracked". Why not? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg

Converting ascii armored signature to cleartext

2007-06-24 Thread Hardeep Singh
Hi If someone sends me an ASCII armoured file with some signed text, can I convert it into cleartext sign so that I can display it to people without GPG also? Regards Hardeep Singh ___ Gnupg-users mailing list Gnupg-users@gnupg.org http

Re: Converting ascii armored signature to cleartext

2007-06-30 Thread Hardeep Singh
hile you can't always go from a signed file to > a clearsigned file, you can safely do the opposite of what the > original poster asked: converting from cleartext to a signed file > (armored or not) is possible. > > (I'm not sure when someone would want to do this, but...) >

ECC - how does it compare

2007-10-29 Thread Hardeep Singh
es seem to exist is that there is no need to persistently store any part of the key - so the threat of someone meddling with your key on the pen drive seems to be removed. What do you all think about this? Should we start building an ECC WOT? :-) Regards Har

Fwd: ECC - how does it compare

2007-11-01 Thread Hardeep Singh
e-way hash. If you input the same password, given the same curve, the key generated will always be the same. So, basically, there is no randomness involved in key generation. Doesnt that make ECC more prone to dictionary attacks? Regards Hardeep -- Forwarded message ------ From: Har

Decrypt only if signed

2007-12-20 Thread Hardeep Singh
should only decrypt if signed by a specific KEY ID. Please let me know if this is possible through GPG with some shell scripting if needed. Thanks & Regards Hardeep Singh ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mai

Offtopic: Compiling a Windows program for Linux

2007-12-31 Thread Hardeep Singh
program allows saving a part of the screen to a bitmap. Can someone tell me if that part of the code needs to change? And if so, how. Thanks & Regards Hardeep Singh ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/list

Social networking

2007-12-31 Thread Hardeep Singh
Hi All Current social networking sites have a major problem: anybody can download your photograph and related details, edit them to his wish, and repost on the same site. I would suggest the following: building of, or using an existing WOT and each person wishing to join the social networking sit

Prime searching

2008-01-19 Thread Hardeep Singh
? Regards Hardeep Singh ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

SPOJ signature - may be offtopic

2008-02-13 Thread Hardeep Singh
anyone try and understand what kind of signature this is, what hash function is used? Just hashing the content doesnt prove anything - anybody could change both the content and the hash. Thanks & Regards Hardeep Singh ___ Gnupg-users mailing list G

Re: playing with cryptography...

2008-05-23 Thread Hardeep Singh
Hi > The OpenPGP trust model is a proper superset of the centralized hierarchical > trust model most often seen in the X.509 world. Several years ago Matt Blaze > made the observation that commercial CAs will protect you against anyone who > that CA refuses to accept money from. > Well, that may

Re: Automate decryption

2008-09-04 Thread Hardeep Singh
___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > -- Hardeep Singh http://blog.Hardeep.name ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Comments please

2008-09-07 Thread Hardeep Singh
Hi All For your comments, suggestions for improvement: http://blog.hardeep.name/computer/20080904/auto-gpg/ Thanks & Regards Hardeep Singh http://blog.Hardeep.name ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mai

Re: Someone has harvested my address

2008-09-07 Thread Hardeep Singh
___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > -- Hardeep Singh http://blog.Hardeep.name ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Problem running automated gpg

2008-10-28 Thread Hardeep Singh
. Hardeep Singh http://blog.Hardeep.name 2008/10/22 Adam Robins <[EMAIL PROTECTED]>: > Hello, > > > > I have a perl script called encrypt.pl that runs gpg as follows: > > > > system("gpg -r 'username' --batch --encrypt-files 'filename.ex

Re: Encrypt / Decrypt Scripts

2008-10-28 Thread Hardeep Singh
This may be of help, although it doesnt apply directly: http://blog.hardeep.name/computer/20080904/auto-gpg/ Hardeep Singh http://blog.Hardeep.name 2008/10/28 Salvador Torres <[EMAIL PROTECTED]>: > Hi, > I'm trying to run some Scripts to Encrypt and Decrypt files automatica

Re: Use of gen-random

2008-11-01 Thread Hardeep Singh
. This is used as one basis for entropy. Another way is disk access. When a process asks for random data, its given out of the pool. The story forward is well explained in the other replies. Hardeep Singh http://blog.Hardeep.name On Fri, Oct 31, 2008 at 11:01 PM, Michael <[EMAIL PROTECTED]>

Re: Encrypt / Decrypt Scripts

2008-11-01 Thread Hardeep Singh
so you were on Windows :-) you didnt mention it and I assumed *nix. Hardeep Singh http://blog.Hardeep.name On Wed, Oct 29, 2008 at 9:19 AM, Saltorr <[EMAIL PROTECTED]> wrote: > Thanks Hardeep, > > I think I found a very simple solution if the Command ends successfully > t

RE: Corporate use of gnupg

2008-02-21 Thread Hardeep Singh, Noida
Hi All Isnt it pretty easy to have a script on the server (try to) decrypt each email. If the email decrypts, fine else not allow the email to go through. That will force people to retain the option in conf file if they want their message to reach. Regards Hardeep Singh http