GPG-encryption - Explain It To Me Like I Am Five Please

I have read about GPG-encryption on the German, English and the Dutch wikipedia and I cannot make sense of it.

So can please someone explain the inner workings of GPG. And by that I don't mean how to make a key. The general idea of it.

Something like: there is Bob and John. Bob wants to send a mail to John in a safe way. He uses GPG for it. And then the story about public and private keys etc. As though I am five years old.


Similar Content



Ssh Public And Private Keys...

hi guys,

i understand the concept of a public and private key for ssh signing and encryption...i just dont get the implementation.

if you have a client and a server and you want two way communication do both have to have each others public keys in the .ssh/authorized_keys files on each respectively?

should you use a password? does it matter if you want to run say rsync from one to the other with a cron job or script?

does anybody just have a breakdown of exactly what you need to do and how it works in different situations...

i found this:

https://www.digitalocean.com/communi...up-ssh-keys--2

seemed to help...but im still not 100% clear...

Ideas To Make Code For Robust Image Watermarking

I need to make following Project on Image Watermarking, need suggestions of maximum people how to start this.
1.) My project shall include a Host file of size(M*M), which will hide a watermark of size(N*N) (may be a grayscale, text or true color image).
2.) Need to encrypt watermark( Suggestions are needed whether use selective encryption, ciphering), where to get maximum help and how to implement this.
3.) Which algorithm I should prefer to encrypt watermark and why?????
4.) Ideas to make Key for Encryption.
5.) Idea to embedd the watermark in host image( Either to use DWT,SVD,DCT,Fibonacci Haar Wavelet) and in which band???????????
6.) What will I loose or gain on embedding in lower frequency bands and higher frequency subbands.
7) How I can make watermark Robust to Rotation, Scaling, Croping, Resizing. Ideas to generate such code.
8.) What performance parameters will decide my robustness.
9.) How to Extract watermark and will they be extracted after attacking the watermarked image.
I will be grateful, if you give your valuable suggestions.

File Encryption

Is there an app for individual file encryption, similar to Axcrypt for Windows?

Problem With Key Authentication

Am trying to set up SSH key authentication with my new VPS.

When I use CyberDuck to log in to my VPS, the "fingerprint" is not matching the one that was created when my keys were created and the connection is failing.

I am wondering if the problem is due to the fact that I ran ssh-keygen on my MacBook and then copied and pasted the Public Key into a webform in cPanel?

While my host allows you to generate the key pair on the VPS, it creates a security issue in that I would then have to find a safe way to get my Private Key back to my MacBook.

So, instead, I opted for the opposite approach and chose to create the key pair on my Mac - thus leaving the Private Key untouched on my Mac.

Any idea what is going on?


Rob

Can Anyone Explain This In Plain English ?

CAN ANYONE EXPLAIN THIS IN PLAIN ENGLISH ?

I am trying to get Oracle SQLDeveloper to work on Ubuntu 14.10...

/usr/bin$ sqldeveloper

(gnome-terminal:7440): GLib-GIO-CRITICAL **: g_settings_get: the format string may not contain '&' (key 'monospace-font-name' from schema 'org.gnome.desktop.interface'). This call will probably stop working with a future version of glib.

Bash More Commands In One Function

hello

first year of learning linux and bash script
Now i wrote a bash script with a function.
Today i recieved a email from my teacher that 1 function only can have 1 command and no more then 1?

thats a part of the script

Code:
function tx_unreachable_msg()
{
LOGLINE="[$DATE] no ip service unreachable"
typewriter "$NOIPSERVICE niet bereikbaar" .1
sleep 1 
typewriter "Mail wordt verzonden naar $email" .1
mail -s "NO ip mail error" "$email"<<EOF
dynupdate.no-ip.com niet bereikbaar @ $DATE
EOF
}

it's part dutch part english but the point is that the first LOGLINE is forbidden in the function because i use the functie to send a mail end not to write a logline but that's a part of the command in my case?

So what does this function?
If the no ip service is unreachable then it's write to /etc/var/log/no-ip and after the sleep it's send a simpel mail to the adres in the variabele mail.

i read here at the first line:
Quote:
Shell functions are a way to group commands for later execution using a single name for the group.
so is it true that my function is wrong and so no can someone point me to a website where it's say that more commands are allow in 1 function0

grts b

Help Regarding Secure ZRP

Hello sir, i want your help to know that in order to add security to ZRP which are the files where we have to make the modifications for encryption, digital signature etc.. as i have very less knowledge regarding so plz help me from the basic level as what should be done in SZRP.

Dd To Copy A Thumb Drive Which I Am Live Booted On To Another Thumb Drive

I created a persistent USB thumb drive boot with LUKS for drive encryption (250 MB /boot and then 7.5 GB ext3 root). There's no swap partition because this is just to store some private files.

I want to make two or three copies of this thumb drive to store apart in case one gets destroyed/lost.

When I am booted from that thumb drive, can I plug in a same sized drive and just do a

Code:
dd if=/dev/sdb of=/dev/sdc

command to make a copy of itself to another thumb drive without booting to another host OS? This way when I make changes to one (such as to update the OS, apps, or data), I could then just copy the entire thumb drive over to the other two while still booted in the original USB.

Or would I effectively have to shut down, boot to my normal host OS (or other), and then copy the thumb drives when not booted into them.

How To Encrypt Data In Ns2 By Any Of Algorithm?

Hi all,

now i need to know

i) how to add encryption and decryption in any of routing-(DSDV,DSR,AODV,OLSR)?

ii) As of now in routing i am able to see only data flows, but is it possible to send some data(message) from source node and i want to retrieve(read) those messages from receiver nodes?

Since i am beginner, Quote:
i dont know whether my question is right or wrong?
Thanks

Pon

Making A DB Backup And Send It To Another Server

Hello everyone;

At this time I need to make a sh script to make a db backup an send it to another server.

Thinking about this, I think I have to:
1.- Make a connection beetween the servers without password
2.- The scrip must to do:
a.- Make the mysqldump
b.- Put it in a gzip file
c.- Send througth scp the gzip file and ONLY when the copy has done the script have to delete the files that are 3 days old.

Could you help me with this?

Do you consider that is a good idea or you have a better one?

Thanks in advance.