Jan 122013
 

Today i return to the topic of encryption and security and in particular I’ll show how to simply encrypt a file with GnuPG, this can be really usefull to encrypt a single file where you have your passwords or some personal information that you want to keep safer.

GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis’ Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems.

This software is frequently integrated with mail client so it can sign, crypt or do both actions on the mail you send and receive, and now we’ll see how to use it on the command line to encrypt a file.

Continue reading »

Flattr this!

Oct 292010
 

lock2Original article by Maurizio Antonelli

In the previous article we presented some basic concepts of encryption and made some examples of symmetrical and asymmetrical keys, we concluded by saying that a good way to get a certificate with an asymmetric key  is GnuPG.

GnuPG is open-source and multiplatform. It uses native command line in a shell or from MS-DOS prompt.

There are also graphical interface:

Enigmail it’s an extension for Mozilla thunderbird. And contains a graphical tool for keys management.

Continue reading »

Flattr this!

Oct 262010
 

crypto2

Or email safely

Original article by Maurizio Antonelli

As well as documentation for those interested, I sincerely hope that it can raise awareness of the non-security of “electronic mail” and help users to take the appropriate implementation tools.

Let’s start with this basic idea: “Email is not a secure media for transmitting information.”

In fact, almost all e-mail when traveling in the network are in clear text, without any form of encryption. As you know, an e-mail message, from the time he leave the sender PC since it arrive to the destination PC, it’s crossing different networked machines, each of which deals with “forward” it in the right direction. Whoever is at the controls of any of these machines can then view (sniff) this message, at great risk to the privacy of the sender and recipient.

Continue reading »

Flattr this!