I noticed this plugin for squirrelmail if you wanted to do it on your
own server:
http://www.squirrelmail.org/plugin_view.php?id=153
Aside from that there are a few services around, like hushmail.com
that'll do what you want.
On 3/23/06, D_C <[EMAIL PROTECTED]> wrote:
> hello group -
>
> apolo
hello group -
apologies for the newbie questions.
i am wondering if there are any webmail services that can decrypt
email, if i somehow inform of my PGP key?
also, i am travelling without knowing my pgp key. is this somehow
centrally registered, in a way that i can download the key, and use a
co
"Werner Koch" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]
On 14 Mar 2006 20:07:21 +0100, Dennis Heitmann said:
gpg: pcsc_transmit failed: not transacted (0x80100016)
gpg: apdu_send_simple(0) failed: card I/O error
That is a catch all error of thye underlying ifd-handler. I
On 3/23/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> was checking the key preferences in gnupg 1.4.2.2(MingW32)
> with the SHOWPREF command,
> and found all the algorithms listed except for twofish
>
> the key accepts and decrypts messages done in twofish,
> and works fine
>
> have tested thi
[EMAIL PROTECTED] wrote:
> was checking the key preferences in gnupg 1.4.2.2(MingW32)
> with the SHOWPREF command,
> and found all the algorithms listed except for twofish
>
> the key accepts and decrypts messages done in twofish,
> and works fine
>
> have tested this for many of the keys and non
was checking the key preferences in gnupg 1.4.2.2(MingW32)
with the SHOWPREF command,
and found all the algorithms listed except for twofish
the key accepts and decrypts messages done in twofish,
and works fine
have tested this for many of the keys and none of them display
twofish in the prefere
I am getting the following error on MAKE for gpg1.4.2.2
make[2]: *** No rule to make target `../cipher/libcipher.a', needed by
`gpgsplit'. Stop.
This is a solaris9 box...was able to successfully install previously on
another solaris9 box.
Anybody have a suggestion?
_
On 3/22/06, Eric <[EMAIL PROTECTED]> wrote:
> there are two ways "around" this, that I can think of, both
> of which suck for Cox:
>
> 1. Content-based whitelisting, meaning you can't make any kind of
> connection in or out unless Cox can identify the type of traffic by its
> content.
>
...
> 2. A
Here is my idiom; checking for success is vital.
See openssh documentation for details on key-based shell access. Test for
transparent access, if using gpg, test for undisturbed encryption with --batch.
You can pipe the dump (or tar) to gpg instead of gzip. File size will be
reduced. The dd c
On Wed, Mar 22, 2006 at 09:49:34AM +, Daniel Carrera wrote:
> Hi all,
>
> Last question :)
> By default, gpg will refuse to write to a file (myfile.gpg) that already
> exists. Is there a way to change this behaviour?
>
> I am running gpg on batch mode on a server to encrypt a database before
On Wed, Mar 22, 2006 at 02:29:07PM +0100, Peter Palfrader wrote:
> On Tue, 21 Mar 2006, Simon Josefsson wrote:
>
> > [EMAIL PROTECTED]:~$ echo foo |gpg -a -s -v -u b565716f
> > gpg: using subkey AABB1F7B instead of primary key B565716F
> > gpg: writing to stdout
> > gpg: using subkey AABB1F7B inst
Hello!
I have just installed the latest WinPT and GPGOL on a Windows XP SP2, with
Outlook 2003.
The installation was successful and I have created my own set of keys and
imported some friends public keys.
In WinPT I can sign and encrypt with my key and I can encrypt using my
friends public keys.
Is there any documentation on how to do that?
Say server A has the original data and server B has the backup.
You can do from server A:
backup_tool | ssh [EMAIL PROTECTED] dd of=/path/to/backup
or you can do from server B:
ssh [EMAIL PROTECTED] backup_tool | dd of=/path/to/backup
Reg
Stef Caunter wrote:
The documentation does not recommend this.
Since you appear to not want to store the ciphertext but the plaintext,
an encrypted network transfer seems appropriate and less expensive.
Write the backup to an ssh pipe instead of a temporary file.
Is there any documentation o
The documentation does not recommend this.
Since you appear to not want to store the ciphertext but the plaintext, an
encrypted network transfer seems appropriate and less expensive. Write the
backup to an ssh pipe instead of a temporary file.
Stef
http://caunter.ca/contact.html
On Wed, 22 M
On Tue, 21 Mar 2006, Simon Josefsson wrote:
> [EMAIL PROTECTED]:~$ echo foo |gpg -a -s -v -u b565716f
> gpg: using subkey AABB1F7B instead of primary key B565716F
> gpg: writing to stdout
> gpg: using subkey AABB1F7B instead of primary key B565716F
> gpg: RSA/SHA1 signature from: "AABB1F7B Simon J
Hello,
This should be a simple question. What is the recommended way to decrypt
a file from a script that runs on a cron job? This is what I have so far:
cat passphrase | gpg -o MyData --passphrase-fd 0 -d MyData.asc
Where 'passphrase' has the chmod permission 400.
Is this the best option?
Hi all,
Last question :)
By default, gpg will refuse to write to a file (myfile.gpg) that already
exists. Is there a way to change this behaviour?
I am running gpg on batch mode on a server to encrypt a database before
downloading. So I need to temporarily store the encrypted file on the
ser
Alphax wrote:
You haven't specified that the key is trusted in the local trustdb.
Thanks! That did it. For some reason my gpg on the server didn't like
the --trust-model option ("invalid option") either on the command line
or in gpg.conf. But I updated the trustdb and that worked.
Cheers,
D
On Fri, 2006-03-17 at 07:09 -0800, Robert Wohleb wrote:
> This morning I was
> surprised to find my download and upload speed higher than normal. Hell,
> a 2.8GB download i supposed to complete in 12 hours. That hasn't
> happened for a while on Cox. Hopefully this isn't a fluke. I'll report
> back
20 matches
Mail list logo