.
3. In the text box, enter 'otalt' and this time, instead of pressing
enter - press the Unjumble button. Same thing should happen, 'lotta'
should be displayed.
In no case should the form reload. Please let me know what happens.
Regard
The same can be done in Windows.
Visit http://blog.hardeep.name/computer/20080828/linux-shell-on-windows/
this will give you the shell and the Echo commands that you need.
Hardeep Singh
http://blog.Hardeep.name
On Sat, May 2, 2009 at 1:05 PM, Philip wrote:
> I found that if I just type &
try gpg --gen-key --expert
Hardeep Singh
http://blog.Hardeep.name
On Mon, Oct 5, 2009 at 9:37 PM, Durant, Dean wrote:
> Hello, I noticed, on windows (which I truly despise), when I type
>
> C:\Documents and Settings\me\Application Data\gnupg>gpg --gen-key
>
> I get:
>
Hi David Vedaal and everyone
This is something even I have thought: this seems to be a sure way to
prevent such computing from being able to 'guess' the password. Why is
then, parallel computing being haled as the antidote to privacy?
Regards
Hardeep Singh
http://blog.Hardeep.name
Hi Jagadeesh
The discussion here might be of help:
http://blog.hardeep.name/computer/20080904/auto-gpg/
Hardeep Singh
On Tue, Dec 8, 2009 at 6:52 PM, Jagadeesh Bantrotu
wrote:
> Hi,
>
>
>
> I am trying to encrypt the file using vb.net code but the data is not
> encryp
ve without installation.
Regards
Hardeep Singh
Give your resume visibility. Get a home for it. Resume Central.
http://RC.Hardeep.name
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
really broken?
Regards
Hardeep Singh
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Hi
When a key is revoked using the revocation certificate, does it have
the same effect as reaching the expiry date of the key? In other words
if I set a key to no expire but generate a revocation certificate, it
is equally safe?
Regards
Hardeep
___
Gn
> Even if the PGP license key was somehow compromised (which I highly
> doubt), it does not follow that "probably our keys can also be
> cracked".
Why not?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
Hi
If someone sends me an ASCII armoured file with some signed text, can
I convert it into cleartext sign so that I can display it to people
without GPG also?
Regards
Hardeep Singh
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
hile you can't always go from a signed file to
> a clearsigned file, you can safely do the opposite of what the
> original poster asked: converting from cleartext to a signed file
> (armored or not) is possible.
>
> (I'm not sure when someone would want to do this, but...)
>
es seem to exist is that there is no need to
persistently store any part of the key - so the threat of someone
meddling with your key on the pen drive seems to be removed.
What do you all think about this? Should we start building an ECC WOT? :-)
Regards
Har
e-way hash. If you input the same password, given the same curve,
the key generated will always be the same. So, basically, there is no
randomness involved in key generation. Doesnt that make ECC more prone
to dictionary attacks?
Regards
Hardeep
-- Forwarded message ------
From: Har
should only
decrypt if signed by a specific KEY ID.
Please let me know if this is possible through GPG with some shell
scripting if needed.
Thanks & Regards
Hardeep Singh
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mai
program allows saving a part of the screen to a bitmap. Can
someone tell me if that part of the code needs to change? And if so,
how.
Thanks & Regards
Hardeep Singh
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/list
Hi All
Current social networking sites have a major problem: anybody can
download your photograph and related details, edit them to his wish,
and repost on the same site.
I would suggest the following: building of, or using an existing WOT
and each person wishing to join the social networking sit
?
Regards
Hardeep Singh
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
anyone try and understand
what kind of signature this is, what hash function is used? Just
hashing the content doesnt prove anything - anybody could change both
the content and the hash.
Thanks & Regards
Hardeep Singh
___
Gnupg-users mailing list
G
Hi
> The OpenPGP trust model is a proper superset of the centralized hierarchical
> trust model most often seen in the X.509 world. Several years ago Matt Blaze
> made the observation that commercial CAs will protect you against anyone who
> that CA refuses to accept money from.
>
Well, that may
___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
--
Hardeep Singh
http://blog.Hardeep.name
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Hi All
For your comments, suggestions for improvement:
http://blog.hardeep.name/computer/20080904/auto-gpg/
Thanks & Regards
Hardeep Singh
http://blog.Hardeep.name
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mai
___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
--
Hardeep Singh
http://blog.Hardeep.name
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
.
Hardeep Singh
http://blog.Hardeep.name
2008/10/22 Adam Robins <[EMAIL PROTECTED]>:
> Hello,
>
>
>
> I have a perl script called encrypt.pl that runs gpg as follows:
>
>
>
> system("gpg -r 'username' --batch --encrypt-files 'filename.ex
This may be of help, although it doesnt apply directly:
http://blog.hardeep.name/computer/20080904/auto-gpg/
Hardeep Singh
http://blog.Hardeep.name
2008/10/28 Salvador Torres <[EMAIL PROTECTED]>:
> Hi,
> I'm trying to run some Scripts to Encrypt and Decrypt files automatica
. This is used as one basis for entropy. Another
way is disk access. When a process asks for random data, its given out
of the pool.
The story forward is well explained in the other replies.
Hardeep Singh
http://blog.Hardeep.name
On Fri, Oct 31, 2008 at 11:01 PM, Michael <[EMAIL PROTECTED]>
so you were on Windows :-) you didnt mention it and I assumed *nix.
Hardeep Singh
http://blog.Hardeep.name
On Wed, Oct 29, 2008 at 9:19 AM, Saltorr <[EMAIL PROTECTED]> wrote:
> Thanks Hardeep,
>
> I think I found a very simple solution if the Command ends successfully
> t
Hi All
Isnt it pretty easy to have a script on the server (try to) decrypt each
email. If the email decrypts, fine else not allow the email to go
through. That will force people to retain the option in conf file if
they want their message to reach.
Regards
Hardeep Singh
http
27 matches
Mail list logo