On 08/14/2013 10:56 PM, Foo Bar wrote:
>
> Hello!
>
> Thank you for your response. Some comments inline...
>
> - Original Message -
>> From: MFPA
>>
>> You can create a key with whatever information you wish to
>> put in the user-id(s), truthful or otherwise.
>
> I have tried to enter
On 08/16/2013 04:20 PM, Steven Bonda wrote:
> I did a lot of research and digging and was finally able to get the file to
> decrypt:
>
> c:\temp>gpg2 --batch --try-all-secrets --passphrase pass -o temp.txt -d
> temp.txt.pgp
> gpg: anonymous recipient; trying secret key A328FC0E ...
> gpg: WARNING:
On 08/18/2013 03:45 PM, ashish tiwari wrote:
Is this a Turing test? I wrote a private reply to try
to find if that is what is happening. I mean, is
"--sign" as opposed to "-sign" that hard to understand?
Here is what -sign chould probably mean:
-s same as --sign
-i same as --interactive
-g
her things that are going
wrong are already in the archives some place. Actually
the secmem messages are just bothersome and won't cause
any problems.
Original Message
Subject: Re: Issue with --sign option
Date: Sun, 18 Aug 2013 16:18:54 +0000
From: Henry Hertz Hobbit
On 08/20/2013 09:43 PM, Snehendu Ghosh wrote:
> Hi Peter,
>
> Thanks for your reply.
>
> In brief, the background is that we are replacing an existing
> iHub system which acts as a router for files transfer to and
> from Oracle EBS. In current system, for inbound interfaces,
> encrypted files co
On 08/22/2013 06:22 PM, Jasper den Ouden wrote:
>> The solution of course is as you urged takethe...@gmx.de , to get a
>> free operating system such as Linux or BSD, complete with free
>> build tools & compile your own (even non programmers can do that,
>> eg on an OS downloaded from http://www.
On 08/23/2013 11:00 PM, Faramir wrote:
> El 22-08-2013 9:56, Robert J. Hansen escribió:
> ...
>> GnuPG extends this with support for Camellia-128, Camellia-192 and
>> Camellia-256. I don't know the reasoning for introducing Camellia,
>> but I'm sure there's a solid basis for it.
>
> IIRC, some
On 08/27/2013 01:29 AM, Avi wrote:
> With the recent release of GPG4Win, I decided to try it once again.
> One of the things I like about the shell I use is the ability to use
> the GUI to start more advanced operations like editing keys (for
> cleaning/disabling, etc) and setting prefs for individ
On 08/29/2013 06:01 PM, Csabi wrote:
> Hi all,
>
> Why does not support GNUPG the CAST6 (256 bit key) variant of the CAST
> algorithm?
> It supports the CAST5 (128 bit key) variant and it is the default cipher.
>
> Best regards, Csabi
Because there is no RFC for it in OpenPGP. Unless there is a
On 08/31/2013 08:27 PM, Anthony Papillion wrote:
> Personally, I trust my 4096 bit key for now until ECC is integrated
> into GnuPG. Then, I'll recreate my keys. Looking for a key that will
> never be broken is like looking for the fountain of youth: it's a nice
> idea but not realistic to plan yo
On 09/01/2013 09:15 PM, Pete Stephenson wrote:
> On Sun, Sep 1, 2013 at 2:57 PM, MartinHvidberg wrote:
>> I'm returning to GPG, and Enigmail, and not for the first time. This means
>> that I have earlier generated key-pairs and uploaded them to servers like
>> keys.pgp.net or something like that.
On 09/02/2013 06:28 PM, Nicholas Cole wrote:
> On Mon, Sep 2, 2013 at 5:04 AM, Henry Hertz Hobbit
> wrote:
>
> [snip]
>
>>
>> Paradoxically, AES256 & AES192 had
>> weaknesses that made them less safe than AES (AES-128) several
>> years back.
On 09/03/2013 04:49 PM, Peter Lebbing wrote:
> To expand on what Johan Wevers said: symmetric ciphers do not change the
> length
> of the encrypted text (by more than the block size). They certainly do not
> compress. Usually, data is compressed before encrypting it (compressing it
> after
> is
On 04/10/2013 03:18 PM, Werner Koch wrote:
> Hi,
>
> please write to gnupg-users@gnupg.org and not to the webmaster address.
>
> Thanks,
>
> Werner
>
Sorry.
Right now I am not subscribed and haven't been for years. It is
just that this is a serious issue where I had no way that I could
eas
On 04/13/2013 11:04 AM, Pete Stephenson wrote:
> [1] http://www.entropykey.co.uk/ [3]
Are you sure you aren't advertising it? Using the URL
you supplied, this one has been written about and the link
you are looking for (well, at least one of them) is from
its links:
http://www.entropykey.co.u
On 04/14/2013 12:55 AM, Hauke Laging wrote:
> Am So 14.04.2013, 00:18:09 schrieb Henry Hertz Hobbit:
>> On 04/13/2013 11:04 AM, Pete Stephenson wrote:
>>
>>
>>> [1] http://www.entropykey.co.uk/ [3]
>>
>>
>>
>> Are you sure you aren't adv
On 04/14/2013 12:18 AM, Henry Hertz Hobbit wrote:
> On 04/13/2013 11:04 AM, Pete Stephenson wrote:
>
>> [1] http://www.entropykey.co.uk/ [3]
>
I take it back. Farther down Aaron's page it DOES say it fills
up /dev/random. So it IS compatible. I am doing way too many
thin
On 04/15/2013 09:07 PM, Robert J. Hansen wrote:
> On 4/15/2013 1:24 AM, Ashley Holman wrote:
>> I also have a followup question. Is it acceptable practice to make a
>> paper backup of your private key by exporting it in ascii armored mode
>> and printing it onto some paper? (with a passphrase app
On 04/17/2013 09:05 PM, Beith, Linda wrote:
> Gpg: can't open 'rwu.dbdump_Nov2012.sql.gz.gpg'
> Gpg: decrypt_message filed: file open error
Daniel Kahn Gillmor is correct on this being a file permissions
problem or maybe an OS problem for a file of that large size.
Like Daniel, I assume the first
On 04/17/2013 11:39 PM, Henry Hertz Hobbit wrote:
> On 04/17/2013 09:05 PM, Beith, Linda wrote:
>
>> Gpg: can't open 'rwu.dbdump_Nov2012.sql.gz.gpg'
>> Gpg: decrypt_message filed: file open error
>
> Daniel Kahn Gillmor is correct on this being a file permi
On 04/18/2013 12:28 AM, Daniel Kahn Gillmor wrote:
> On 04/17/2013 06:25 PM, Daniel Kahn Gillmor wrote:
>> On 04/17/2013 05:05 PM, Beith, Linda wrote:
>>> Gpg: can't open 'rwu.dbdump_Nov2012.sql.gz.gpg' Gpg:
>>> decrypt_message filed: file open error
>>
>>
>> This message suggests that there is a
On 04/22/2013 07:28 AM, Lema KB wrote:
> Hi all
>
> Is there any other way of using one and the same private-key by several
> users, except exporting the priv-key?
> We are decrypting some csv-files on a virtual machine. and it's for us not
> so appropriate to share private-key through exporting.
On 04/22/2013 11:52 AM, Peter Lebbing wrote:
> On 22/04/13 12:44, Henry Hertz Hobbit wrote:
>> I just copy my whole key ring (contents of ~/.gnupg folder on Linux)
>> among my multiple OS with the random_seed file modified with hexedit
>> and the 0-9 & A-F modified with
Both of my Linux systems were recently involved in a test of
about a dozen plus replacments for OpenSuse 11.4 and Ubuntu 10.04.
After all the experimenting was over I ended up with the same
operating systems but swapped with each having the OS that was
on the other machine before the experimentati
On 04/29/2013 03:39 AM, 儒風管理部-潘右文 wrote:
> Hi there ,
>
> Can someone help me with this error?
>
> I reinstalled the program , and encrypt the file again, still don’t work.
>
> I used to encrypt file without any issue. My program version is 1.1.4.
>
> Thanks.
Has the key expired? I notice y
On 04/29/2013 03:39 AM, 儒風管理部-潘右文 wrote:
> Hi there ,
>
> Can someone help me with this error?
>
> I reinstalled the program , and encrypt the file again, still don’t work.
>
> I used to encrypt file without any issue. My program version is 1.1.4.
>
> Thanks.
Are you saing it used to encrypt
Correction. My signfile script makes detached signatures
with no problems, the pcrypt script makes public encrypted
files with no problems, and the decrypt script decrypts the
publicly encrypted files with no problems on OpenSuse 11.4.
Here is what gets printed in the xterm when I try to do a
a
On 04/29/2013 02:43 PM, M Russell wrote:
> Hello,
>
> I hope someone might be able to lend me a hand. I am running
> into an error message that I resolve. I get a lock error when
> trying to encrypt or decrypt a file. I found other forums
> that suggest deleting the random_seed file and killing
On 05/03/2013 08:45 AM, Lema KB wrote:
Werner is of course correct but since you need to do a send to
userid_1, userid_2, and userid_3 you will need the public key
for all three of the recipients. You need the public key for
each person you want to send a public key enciphered (encrypted)
file
First, a restriction on who can access folder restricted to
just a group on 'nix should probably be:
drwxrwx--- (chmod 770 dir - all group members can write)
drwxr-x--- (chmod 750 dir - only owner can write)
http://www.securemecca.com/public/ChmodTable.txt
On OpenVMS you can and the military
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/03/2013 08:43 PM, Henry Hertz Hobbit wrote:
First, I think public key encryption is apropos for what you
are doing if privacy is a concern. The way you approached
it without telling us you are on Windows until later on
indicates privacy IS
On 05/09/2013 08:30 AM, Peter Lebbing wrote:
> On 08/05/13 21:01, Werner Koch wrote:
>> That is not crude but a standard Unix pattern.
>
> I considered putting the status-fd stuff into a file, then reading the file
> and
> finally deleting it a much cruder method than connecting the parsing logic
On 05/14/2013 09:24 AM, Laurent Jumet wrote:
>
> Hello Bob !
>
> Bob Henson wrote:
>
>>> ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.13.exe
>
>> Thanks very much - duly installed.
>
> I'm using this for my own, you may find it useful too:
>
> http://www.pointdechat.net/MyMan_GnuPG
On 05/14/2013 04:39 PM, Laurent Jumet wrote:
>
> Hello Henry !
>
> Henry Hertz Hobbit wrote:
>
>>>>> ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.13.exe
>>>
>>>> Thanks very much - duly installed.
>>>
>>>
On 05/17/2013 12:57 PM, Lema KB wrote:
> hi all
>
> I have to generate a key-pair using another user-account (which is given
> right in local security settings to log on as a batch job) and export its
> public key.
>
> i did generate on windows cmd, but after i taped the passphrase, cmd window
>
On 05/20/2013 08:57 PM, Bettina Huber wrote:
> Been told I now have to use this to develop keys and sign a file that gets
> ftp'd
> to the bank. We do not need to encrypt the file. Have read some of the
> documentation, but understand very little of it - I can do basic commands,
> but
> noth
On 05/21/2013 08:48 AM, Lema KB wrote:
> thanks for your replies
>
> i do have gnupg4win-2.1.0.exe.
>
> i wanted just to pen this Kleopatra.exe under another user (on cmd using
> runas command) to see the list of keys. but it says it's missing
> libkleo.dll file. but it opens from start-menu.
>
All:
I assume anybody who has used Windows for a modicum of time
knows the following:
0. I take an extremely dim view of not setting your Windows
system up to show the ENTIRE file name, including the
extension. I have thousands of malware ending in
".pdf.exe". But it is appropriate for
On 05/21/2013 05:06 PM, Werner Koch wrote:
> On Tue, 21 May 2013 18:28, hhhob...@securemecca.net said:
>
>> 5. At the of the PATH you add:
>>;C:\Program Files\GNU\GnuPG\
>>(if it already has a ";" at the end you only need one
>> semi-colon)
>
> You should not add this but
>
> ;C
On 05/24/2013 04:49 PM, irak wrote:
> I don't understand your answer. The original encrypted (.pgp) is provided by
> a client that transmits the file to me using a binary transmission. On my
> Linux server when I previously deciphered the file, it resulted in a file
> with CRLF as the EOR. When I u
On 05/24/2013 09:09 PM, Zece Anonimescu wrote:
> Robert J. Hansen wrote:
>> This is something I wrote for PGP-Basics a few weeks ago. It's bleak
>> and depressing, but I believe it's an accurate picture of where things
>> currently stand:
It looks spot on to me. I cannot get anybody to use
On 05/28/2013 04:17 PM, Forlasanto wrote:
> The fact remains that email is "the house that Jack built." The wall
> plugs are upside down, the wiring is sketchy at best, the plumbing is
> crazy and doesn't function correctly, the house is half wood and half
> brick, and/Jack forgot to put locks on t
On 05/28/2013 04:32 PM, Peter Lebbing wrote:
> Personally, I /am/ interested in why people use their keys (the original
> question), and not in the relevance of e-mail.
I use OpenPGP to sign my downloads for others. Everybody
using my stuff are either French, Belgian, or Canadian
French. The Lin
On 05/29/2013 06:12 AM, edgard devaux wrote:
> hello
> using Gnupg with linux debian 7.0 and gnome; i created a key pair.
> my e-mail client asks me a certificat for personal to sign , and an
> other certificat for the key.
> How can i get this certificat for keyring , i don't find where .
> e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/29/2013 07:27 PM, Doug Barton wrote:
> On 05/29/2013 12:09 PM, Henry Hertz Hobbit wrote: | On 05/29/2013
> 06:12 AM, edgard devaux wrote: |> hello using Gnupg with linux
> debian 7.0 and gnome; i created a |> key pair. my e-mai
On 06/10/2013 03:14 AM, Hauke Laging wrote:
What a mouthful. I shortened it to those things most relevant
to me. My keys are NOT part of the WoT due mostly to nobody
around my home having OpenPGP keys. I would say that I have
a higher option that you do of the Wot when contrasted with
one SSL
My personal observations agrees with Rob Hansen's studies 100%.
Even when required to use encryption people hate doing it and
their concept is entirely focused on the ciphering with them
thinking that people who use encryption are trying to hide
something. They don't even begin to understand that s
On 06/10/2013 08:46 AM, Henry Hertz Hobbit wrote:
> is because for what ever reason they want to complain like mad
> about Prism but then go to Facebook and broadcast their personal
> lives to the entire world. Why? I would like to say I don't
> know why and that it could be us
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/12/2013 09:49 AM, Nils Faerber wrote:
> Am 12.06.2013 07:24, schrieb Navin:
>> Hi,
> Hi!
>
>> Since GnuPG comes under the GPL, I would like to clarify if a
>> person's proprietary software makes use of GnuPG purely by
>> invocation of the comm
On 06/13/2013 03:20 AM, Anilkumar Padmaraju wrote:
> Hi Gnupg Users,
>
> I have question that on of the user gave a file to import and the file
> is having .txt extension, for example test.txt. I usually import
> files having .asc or .gpg extensions. Can I do "gpg --import
> test.txt" with that
I just answered a question on whether you could import somebody
else's keys from a file named "other.txt" rather than "other.asc"
or "other.gpg". While perhaps technically correct I also pointed
out that Windows depends on the proper file-name extension and
some Linux distros like OpenSuSE are ver
On 06/19/2013 03:21 PM, Heinz Diehl wrote:
> On 18.06.2013, NdK wrote:
>
>> If the key is generated on-card, you have no way to backup it. No need
>> for "unexportable" flag: simply there's no command to export it.
>
> And if the key is generated off-card and properly moved to the
> smartcard af
On 06/21/2013 07:50 AM, Michael Tokarev wrote:
> Hello.
>
> Recently I upgraded a Debian machine from squeeze to wheezy,
> which lead to upgrading gnupg from 1.4.10 to 1.4.12. And
> immediately noticed that many automated tools I used stopped
> working, refusing to encrypt with the error indicate
On 06/21/2013 10:22 AM, Peter Lebbing wrote:
> On 21/06/13 12:00, Henry Hertz Hobbit wrote:
>> Who or what is "gconf"? If that is what is actually used then
>> it is neither an email address or the keyid.
>
> I don't think that's the problem, gpg is
On 06/24/2013 06:18 PM, Bob Henson wrote:
> When I ran
>
> regsvr32 c:\Program Files (x86)\GNU\GnuPG2\bin\gpgex.dll
>
> it just caused an error, saying "The module "c:\program" failed to load.
> Make sure the binary is stored at the specified path or debug it to
> check for problems with the bi
On 06/25/2013 06:12 PM, Jack Bates wrote:
> Hello, I want to transfer a subkey from one keyring to another, but I
> get the following error:
>
>gpg: key 7FABB65F: already in secret keyring
>gpg: Total number processed: 1
>gpg: secret keys read: 1
>gpg: secret keys unchanged:
On 06/27/2013 09:24 AM, Daniel Pocock wrote:
>
> Some of the discussion in this bug seems relevant to the GnuPG and
> GnuPG2 packages in Debian, but the bug is against the archive
> pseudo-package:
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612657
I wouldn't classify it as a bug but I did
On 07/07/2013 03:10 AM, eMyListsDDg wrote:
> now i'm finding out after moving from XP to Win7 that i can't
> edit my keys or decrypt email test messages.
>
> the passphrases to decrypt i have aren't working from command
> line or my email app.
>
> during migration i copied all the files from
> \
On 07/08/2013 01:07 AM, Werewolf wrote:
> On Mon, Jul 08, 2013 at 10:24:27AM +1000, Fraser Tweedale wrote:
>> How about an armadillo?
>
> Or a Masked armadillo?
There is no such critter. There are naked-tailed, long-nosed,
and hairy Armadillos but no Masked Armadillo. There is even a
Pink Fairy
On 07/08/2013 09:22 AM, Peter Lebbing wrote:
> On 07/07/13 21:53, Henry Hertz Hobbit wrote:
>> I did the same there but I do modify the random_seed file with hexedit for
>> each key-ring which some people object to. From my point of view that is far
>> better than just
On 07/08/2013 03:42 AM, eMyListsDDg wrote:
> Hello Henry,
> i copied the 32-bit XP gnupg dir contents to this dir on Win 7-64bit
>
> from:C:\Documents and Settings\\Application Data\gnupg
>
> to: C:\Users\\AppData\Roaming\gnupg\
>
That is the correct folder. I have no idea on what Wi
On 07/13/2013 09:56 PM, kardan wrote:
> Hi,
>
> When I search for a key via browser on [1] I get an unencrypted
> answer from [2]. This happens for some keys that are only
> available on some servers. The problem is that the info, whose
> key I am searching is presented to sniffers in plaintext. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/16/2013 03:24 PM, Daniel Kahn Gillmor wrote:
> Hi Ira--
>
> On 07/16/2013 11:08 AM, ira.kirsch...@sungard.com wrote:
>> With PGP you can do something like: pgp -e -r
>> -o --archive
>>
>> This will create a single "output file name" with t
On 07/16/2013 04:04 PM, Werner Koch wrote:
> On Tue, 16 Jul 2013 17:08, ira.kirsch...@sungard.com said:
>
>> This will create a single "output file name" with the entire "filelist" each
>> individually encrypted.
>
> That is the PGP Zip format, right? We support it for ages; our tool is
> calle
On 07/18/2013 05:15 PM, Anthony Papillion wrote:
> Hello Everyone,
>
> I'm designing an application that will run on Windows and utilize
> GNUPG. Right now, I'm detecting if GPG is installed by calling it
> then parsing the output of the command to see if it succeeded or
> failed. This is VERY me
hout corroboration is
known as hear-say. Hear-say is deemed as inadmissable in a
court of law. Therefore, as Judge Hobbit I deem it inadmissable
in my court-room. Furthermore I could find no place where
Associate Professor Michael Donald Bailey at the University of
Mich
On 07/25/2013 07:34 PM, takethe...@gmx.de wrote:
> Hi everybody,
>
> why should I trust gpg4win? I have doubts since it was ordered by the
> "Bundesamt für Sicherheit in der Informationstechnik (BSI)", which has
> close connections to secret services. Is gunPT any better? Finally, why
> should I t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
All
Disclamimer: I have no connections with the GnuPG effort other
than as a thankful end user.
I have a much longer Part 2 of this. After my tongue in cheek
statment about the article at Technology Review I came up with
what they were citing, no
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
If the licensing issues can be resolved GoldBug may be the only
chance we have of getting people to use encryption in any form.
I think it is time for attorneys to have their say.
Ergo, GoldBug should have done this a little more transparently
rathe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/29/2013 11:02 PM, Hauke Laging wrote:
> Hello,
>
> is it possible to change a passphrase in batch mode?
>
>From what the man pages say, no. You can delete keys and there
is experimental key creation with notes in the doc/DETAILS of
of the s
On 08/02/2013 01:31 PM, Martin T wrote:
> Hi,
>
>> Your description sounds, to me, as if you are only generating a key for the
>> other persons use.
>
> Not quite. At the beginning I need to use those keys myself in order
> to create the needed database objects. Once those are done, I need to
>
On 08/04/2013 09:55 PM, MFPA wrote:
> Hi
>
>
> On Sunday 4 August 2013 at 9:24:51 PM, in
> , Larry Brower wrote:
>
>
>> What is with the helpdesk being a list member?
>
> I suspect somebody has forwarded their mail to the helpdesk,
> forgetting to turn off message delivery from the list and th
It looks like the initial guess (not my guess) is correct as my
test shows (message from TeamSpeaK USA to me)
http://www.securemecca.com/tmp/TeamSpeakUSA-Direct.txt
http://www.securemecca.com/tmp/TeamSpeakUSA-Msg.txt
Setting up a system like this which can spam a mailing list is
an abuse. Whethe
On 08/05/2013 08:18 AM, Brad Rogers wrote:
> On Mon, 05 Aug 2013 09:36:42 +0200
> Werner Koch wrote:
>
> Hello Werner,
>
>> On Sun, 4 Aug 2013 22:24, ivangrun...@gmail.com said:
>>> What is with the helpdesk being a list member?
>> They are. I have set the moderation flag.
>
> The XOrg list
On 08/06/2013 12:42 AM, Jean-David Beyer wrote:
> On 08/05/2013 09:23 AM, TeamSpeak Piracy wrote:
>> Jean-David Beyer,
>>
>> Thank you for contacting us. This is an automated response confirming
>> the receipt of your ticket. One of our agents will get back to you as
>> soon as possible. For your r
/sub but still has the
same key number in both --list-keys and list--secret-keys.
Beyond that I will let somebody else elaborate. You put
just your main key in the ~/.gnupg/gpg.conf file on Linux
and everything just works. Ditto for selecting it on
Windows. E/g.:
pub 2048R/E05A9F9F 2013-08-06 [
On 08/07/2013 12:49 PM, Jean-David Beyer wrote:
> Is the address ab...@teamspeakusa.com actually required? I know
> "postmas...@teamspeakusa.com" is required and it must go to a real
> person, but is any other?
SKIP TO TEAMSPEAK OR SPECIFIC.
Actually, even "postmaster" is no longer required. T
On 08/08/2013 09:17 PM, Khelben Blackstaff wrote:
(please read the original)
Short answer: Your github URL converted into an email
address is NOT a good solution. Read on if you want to
know why.
It is not necessary to "own" the domain. For example, I could
perhaps have an email account at
On 08/12/2013 09:18 AM, Peter Lebbing wrote:
> On 11/08/13 23:11, adrelanos wrote:
>> I could think of a way to export the key, change --homedir, create a new
>> keyring, and import a the key. But is there a more elegant way?
>
> gpg --export 0xDEADBEEF | gpg --no-default-keyring --keyring \
> /et
On 08/12/2013 08:40 AM, Martin T wrote:
> Hi,
>
> one can sign the message with "--clearsign" option which adds ASCII
> armored(Radix-64 encoding) "PGP signature" at the end of the text.
> This "PGP signature" contains the UID of the signer, timestamp and key
> ID. However, two questions:
GnuPG d
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/14/2013 07:47 AM, Axel Braun wrote:
> Hi,
>
> one (stupid?) question:
>
> Where is the requirement to sign your own key documented? I had a
> look into RFC 4880 but could not spot the requirement there.
>
> Thanks for clarifying Axel
Th
On 08/14/2013 08:33 AM, Johan Wevers wrote:
> On 14-08-2013 5:36, Foo Bar wrote:
>
>> I would like to create a domain key, which can be used for all
>> emails in a particular domain. For example, if the key is for
>> "*@example.com", then sending to both "f...@example.com" and
> "b...@example.com"
y at the time,
when I tried to purchase the books, I couldn't get them. If they
were classified as munitions, you could not buy them. Phil went
through a lot to open things up in the United States,
Shalom back at you Werner
HHH
--
Key Name: "Henry Hertz Hobbit" <[EMAIL PRO
can't make sense out of them.
I don't mind Norton scanning for viruses / worms, but
it is the responsibility of them to look for the PGP
and GnuPG and other OpenPGP compliant messages to
realize what they are without me sayi
hunderbird that you upgrade Thunderbird to the latest version as
well. That would be version 1.0.2. It fixes some very noticeable
security problems (phishing), and you should also upgrade to the
latest version of Firefox as well.
HHH
--
Key Name: "Henry Hertz Hobbit" <[EMAIL PRO
g if I were
>you! ;-))
I don't know whether he has Apache in a default config on a 'nix box
or what. I am assuming he has some version of 'nix with the word "root"
in the lines. If it is a default config, then he has an Apache user:
Password Entries:
ex&search=0xE1FA6C62
You will notice I did NOT sign my own key. Since I created it
and also have the secret half of the key as well, it has ultimate
authority (unless I have a multiple personality disorder).
Ciao
Henry Hertz Hobbit
___
of the activity the person
was engaged in! But since PGP was not used to hide the evidence and
the idiot didn't even clean out his browser history - what can you
say? Wouldn't it be interesting to discover that the version of PGP
he was using was over seven years old and had never been us
ght. It is a non issue
with Windows users since they probably use GnuPG just for signing
and encrypting email. Now you know why I didn't send it to the
list. This note is NOT of general interest, and the added
functionality requested may not be important. Then again, maybe
it is.
Henry Hertz
ike that judge who found the mere presence of PGP on the person's
machine (I would have loved being a member of the jury to show the judge
just how ignorant he was) as indication of illegal activity, this IS an
illegal use of encryption! I am amazed they even caught it at all, and
evidently a bat file
on in
g10\exec.c file:
/* lines 140...145 */
if(tmp==NULL)
{
#if defined (_WIN32)
tmp=m_alloc(256);
if(GetTempPath(256,tmp)==0)
strcpy(tmp,"c:\\windows\\temp");
If the registry key isn't the problem, then I suspect the
gpg.conf file is either different or not
re chips optimized for encryption for your
purposes.
Then on the other hand, maybe somebody will optimize the algorithm for
your specific purpose for the price (I am NOT offering my services - I
leave that for others to pursue).
HHH
--
Key Name: &q
rings on both machines, then export
from one and import on the other one.
HHH
PS Please reply to the Cc: address, not this one.
--
Key Name: "Henry Hertz Hobbit" <[EMAIL PROTECTED]>
pub 1024D/E1FA6C62 2005-04-11 [expires: 2006-04-11]
Key fingerprint = ACA0 B65B E20A 552E DFE2 EE1D
huge file. The indirection (< input > output) works,
but I think you have lost your file. I suggest regenerating it and
using the indirection. I am assuming it is a huge backup and that
you CAN regenerate it again. If you can't, Microsoft is your best
bet at finding out how
\out.bkf
I imagine they won't post this to the group. That is why I
Bcc:'d the reply to you. You should have searched the archives.
It won't handle the problem you will have writing to the DVD. I
would like to say it is a separate issue, but it isn't. Large
files can cau
hose pretty "[User ID not found]"
after all of those sigs. Thank goodness I am NOT part of the WOT.
If I was (part of the WOT) and cleaned out all of those signatures
on his key, signed it, and uploaded it to one of the keyservers so it
reflected he had another signee, what would happen to
to you. I do need to add one statement.
bzip2 doesn't have compression levels per-se. Yeah they are
there, but the faster doesn't make it go all that much faster,
nor does the best make it any better because that is the
default. I would just take the default unless you want it to go
f
default compression algorithm. Most Windows compression
programs can handle them, but one of the things I do to contain
the Trojan files while they are on Windows is to bzip2 them on
Linux. When virus writers conceal their nasty worms in bzip2
files, all of this will change.
Henry Hertz Hobbit
Nikolaus Rath <[EMAIL PROTECTED]> writes:
>Henry Hertz Hobbit <[EMAIL PROTECTED]> writes:
>>> >Now I wonder why GPG needs random data for symmetric
>>> >encryption. Should I care about the message or not?
>>> >And how can I make it disappear?
"enediel gonzalez" <[EMAIL PROTECTED]> wrote:
> Hello:
>
> I use debian sarge and I need to encrypt and decrypt
> automatically backup files using gpg
>
> I created a php script will the whole procedure, which
> includes the following declaration
>
> ...
>
>
> $str_execute = "cd /tmp/backup
1 - 100 of 169 matches
Mail list logo