|
- The GNU Privacy Guard
GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications A wealth of frontend applications and libraries are available
- GnuPG - Support
Mailing lists Describes the purposes of each mailing list hosted on this server and gives instruction on how to subscribe Links to other GnuPG-related discussion groups are also available Wiki The official GnuPG Wiki contains community-maintained documentation for GnuPG and related software BTS Before you report a bug, please consult the list of bugs
- Encrypting and decrypting documents - GNU Privacy Guard
The software expects the name of the document to encrypt as input or, if omitted, on standard input The encrypted result is placed on standard output or as specified using the option --output The document is compressed for additional security in addition to encrypting it alice%gpg --output doc gpg --encrypt --recipient blake@cyb org doc
- GnuPG - GnuPG wiki
The main command line interfaces are gpg and gpgsm Standards GnuPG is a complete and Free Software implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP) It also implements the Cryptographic Message Standard (CMS), needed for S MIME emails and provides supports for Secure Shell (ssh) Free Software
- GnuPG - User guides
A Practical Introduction to GPG in Windows This guide, written by Brendan Kidwell, shows you how to use the free public key cryptography system GnuPG from a Windows user perspective
- Operational GPG Commands (Using the GNU Privacy Guard)
This command basically uses the same algorithm as used when locating keys for encryption and may thus be used to see what keys gpg might use In particular external methods as defined by --auto-key-locate are used to locate a key if the arguments comain valid mail addresses
- GnuPG - gpg man page
Helper programs gpg-connect-agent (1) Access the background processes watchgnupg (1) Watch debug output gpg-check-pattern (1) Helper to check passwords gpg-mail-tube (1) Encrypt mails in a pipeline
- The GNU Privacy Handbook
The command-line option --export is used to do this It takes an additional argument identifying the public key to export As with the --gen-revoke option, either the key ID or any part of the user ID may be used to identify the key to export alice%gpg --output alice gpg --export alice@cyb org
|
|
|