On Sun, Jun 21, 2009 at 4:13 PM, Michel Messerschmidt -
li...@michel-messerschmidt.de +gpg2+maniams+878ee80e19.lists#
michel-messerschmidt...@spamgourmet.com wrote:
On Sun, Jun 21, 2009 at 12:15:48PM +0400, gpg2.20.mani...@dfgh.net wrote:
4. Sorry if this is OT or if this is a long post I
Dear Members
At office I work on my Laptop PC that is connected to a network. Using
Active directory my company seems to have mapped the My Documents on my
Laptop to a network drive (directory in network drive) sitting on some
central server.
I am ok with that policy / precaution and backup
On Sun, Jun 14, 2009 at 12:57 AM, Charly Avital - shavi...@mac.com wrote:
gpg2.20.mani...@dfgh.net wrote the following on 6/13/09 12:36 AM:
[...]
1. How do I find out if a signature file _is_ PGP / GPG compliant
2. Presently I use GPG command line version. With that how do I verify
Hi
On Fri, Jun 5, 2009 at 10:19 PM, Robert J. Hansen - r...@sixdemonbag.org
+gpg2+maniams+ba4eefb302.rjh#sixdemonbag@spamgourmet.com wrote:
reynt0 wrote:
I'm a litle late commenting, but I think it's worth noting
in this discussion that any security improvement(s) may be
useful even
On Mon, Jun 8, 2009 at 11:43 AM, Werner Koch - w...@gnupg.org
+gpg2+maniams+381edcc67a.wk#gnupg@spamgourmet.com wrote:
On Sat, 6 Jun 2009 22:52, malte.g...@gmx.de said:
Does the GPG4Win package support the GnuPG smartcard? Of course, given
there is a reader and its driver installed
Wow Felipe ... WowT
On Sun, May 24, 2009 at 8:38 AM, webmas...@felipe1982.com
+gpg2+maniams+aec56db6fa.webmaster#felipe1982@spamgourmet.com wrote:
As of this writing, no algorithm supported by GnuPG has been
compromised. Even MD5 is still on its feet.
i don't think this is correct.
Dear Robert
On Sun, May 24, 2009 at 6:42 AM, Subu gpg2.20.mani...@dfgh.net wrote:
On Sun, May 24, 2009 at 6:15 AM, Robert J. Hansen - r...@sixdemonbag.org
+gpg2+maniams+ba4eefb302.rjh#sixdemonbag@spamgourmet.com wrote:
gpg2.20.mani...@dfgh.net wrote:
What are the algos that are
Dear Members
What are the algos that are compromised ? or NOT to be used ? If this is too
long a list
What are the Algos that are _to_be_
/or/
_could_be_ used
/or/
_not_yet_compromised_
I understand that choosing the key size and algo is something personal and
others cant decide. but I'm
Hi
Request list members to help me with _command_line_ tips on how to migrate
keys from PGP (6.5.x CKT) to GPG 1.4.9.
Is the converse possible i.e. send keys from GPG 1.4.9. to PGP (6.5.x CKT)
I work on a Windows XP environment . I do _not_ use any GPG front ends
regards
maniams
Dear Members :
Could you (or the list ) help me with the following :
- I have an source xl file - say something dot xls
- I wish to encrypt this and the recipient is say Mr. Y
- I wish to have an encrypted result file that is recognized and readable by
Mr. Y using PGP
- A command line (that
On Thu, May 7, 2009 at 12:06 AM, John Clizbe - j...@mozilla-enigmail.org
+gpg2+maniams+ede7096b82.john#mozilla-enigmail@spamgourmet.com wrote:
gpg2.20.mani...@dfgh.net wrote:
Dear Members :
Could you (or the list ) help me with the following :
- I have an source xl file - say something
Dear Members
Can GPG 1.4.9 be used for commercial purposes ? like sending company files
to a recepient ?
regards
subu
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Dear List
How to import a key pair (my own secret and public keys) from GPG 1.4.9 to
PGP 6.5 ?
Command line help preferred.
If not possible help using some GPG graphical interface please
I'm Using a win XP machine
thanks in advance
Regards
subu
___
13 matches
Mail list logo