Category Archives: Practical Cryptography

Encrypting text at the command line with GnuPG

Storing GnuPG content of any kind (that is, plain text to be encrypted, encrypted text to be decrypted, even public keys from co-respondents) on disk can result in the same kind of vulnerabilities associated with storing any sensitive data on … Continue reading

Posted in Command Line, GNU Privacy Guard, How-To, Open source applications, Open source software, Practical Cryptography, Secure computing, Security/Cryptography | Comments Off on Encrypting text at the command line with GnuPG

Using diff

diff is a *nix command that takes two files and compares them, reporting on the differences between them. For example: $ diff foo.bar foo.bar $ When the files are identical, no output is generated (as in this case, comparing a … Continue reading

Posted in Command Line, computer science, How-To, Open source software, Practical Cryptography, Programmer's Tools, Secure computing, Security/Cryptography, Utilities | Comments Off on Using diff

GPG tutorials

Paul Heinlein’s GPG Quick Start (very basic, but useful) The GNU Privacy Handbook (more a how-to for gpg, plus concepts) GnuPG FAQ (some helpful things here, but pages more likely will be found via google) Using the GNU Privacy Guard … Continue reading

Posted in Practical Cryptography, Secure computing, Security/Cryptography | Comments Off on GPG tutorials

Using GPG on Windows

Using GPG on Windows is possible at the command line, or with a GUI front end. Here are guides: GPG4Win is a free software suite and includes an implementation of Gnu Privacy Guard for Windows. Using GPG on Windows at … Continue reading

Posted in Practical Cryptography | Comments Off on Using GPG on Windows

GPG on Mac OSX

GPG on Mac OS X can be done either at the command line, or with a GUI front-end. In either case, software must be installed as Gnu Privacy Guard is not part of the OS X installation (it is included … Continue reading

Posted in Practical Cryptography | Comments Off on GPG on Mac OSX

Using GPG

There are many GPG resources, but here are the ones that I’ve found most helpful for doing the basics: The GNU Privacy Handbook is an official document of the GPG project and provides comprehensive description of GPG commands as well … Continue reading

Posted in Practical Cryptography | Tagged | Comments Off on Using GPG