Home Page Icon
Home Page
Table of Contents for
Title page
Close
Title page
by Peter Loshin
Simple Steps to Data Encryption
Cover image
Title page
Table of Contents
Copyright
To the Reader
Preface. What Is This?
What Is Cryptography?
What Can Cryptography Do?
Basic Cryptographic Functions
Does “Secret” Mean the Same as “Private”?
What OS Should I Use?
How Do I Do All This Stuff?
Introduction
Chapter 1. Using Gnu Privacy Guard
1.1 Keeping Data Secret, for a Novice GnuPG User
1.2 The Simplest Example: GnuPG Symmetric Encrypting Text
1.3 Decrypting a File (Symmetric Key)
1.4 Encrypting Interactively
1.5 ASCII Armor
1.6 Command Summary and Review
1.7 Review Questions
Chapter 2. Selected FAQs on Using GnuPG
2.1 Why Use GnuPG
2.2 Why Start with the Command Line
2.3 Why Use the Command Line
2.4 Getting to the Command Line
2.5 Is GnuPG Even Installed?
2.6 GnuPG Commands and Options
2.7 Simple Examples
2.8 Options: Getting More Information
2.9 Options: Text or Binary
2.10 Command Summary and Review
2.11 Review Questions
Chapter 3. Public Keys
3.1 Getting Someone’s Public Key
3.2 Generating a Public Key
3.3 Why Two Key Pairs?
3.4 Key Length
3.5 Key Expiration and Key Revocation
3.6 Reasons for Key Revocation
3.7 Generating a Public Key Pair, Completed
3.8 Exporting a Public Key
3.9 Command Summary and Review
3.10 Review Questions
Chapter 4. Public Key Functions
4.1 Decrypting and Verifying
4.2 Web of Trust
4.3 Encrypt and Sign
4.4 Benefits of Digital Signatures
4.5 Command Summary and Review
4.6 Review Questions
Chapter 5. More About Signatures
5.1 “Decrypting” a Digital Signature
5.2 More About Signatures
5.3 Digital Signature Types
5.4 Signing and Verifying, Summarized
5.5 Review Questions
Chapter 6. Working with Public Keys
6.1 Trusting a Public Key
6.2 Using Keyservers
6.3 Review Questions
Chapter 7. Editing and Revoking a Public Key
7.1 Editing Keys
7.2 Revoking a Key
7.3 Command Summary and Review
7.4 Review Questions
Chapter 8. Security Practices and Tips
8.1 Verifying Software Downloads
8.2 Passphrases: Doing Them Right
8.3 Dangers of RAM Cache and Other System Artifacts
8.4 Full Disk Encryption
8.5 Encrypting Your System Hard Drive FAQ
Postscript
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover image
Next
Next Chapter
Table of Contents
Simple Steps to Data Encryption
A Practical Guide to Secure Computing
Peter Loshin
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset