GPG has dozens of additional options that fine-tune its available options. For a complete list, plus a guide to careful use of encryption and a deeper explanation of how public-key encryption works, visit
Polecenie gpg
Wykonanie, użycie: The GNU Privacy Guard application allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures. GPG is based on the use of a pair of keys, one public and one private (or "secret"). Data encrypted with one key can only be decrypted with the other. To encrypt a message to you, someone would use your public key to create a message that could only be unlocked with your private key. To sign information, you would lock it with your private key, allowing anyone to verify that it came from you by unlocking it with your public key.
Opcje wykonania gpg
w konsoli
Przykłady gpg działanie w Słownik polecenie G
- Przykład GPG użycie :
- Jak użyć Show the groups that each user belongs to (default user is the owner of the current group). Groups are listed in /etc/passwd and /etc/group co znaczy.
- Przykład GPG użycie :
- Jak użyć files for lines that match a regular expression pattern . Regular expressions are described in Chapter 7 . Exit status is 0 if any lines match, 1 if none match, and 2 for errors. See also egrep and krzyżówka.
- Przykład GPG użycie :
- Jak użyć files (or data read from standard input) with Lempel-Ziv coding (LZ77). Rename compressed file to filename.gz ; keep ownership modes and access/modification times. Ignore symbolic links. Uncompress co to jest.
- Przykład GPG użycie :
- Jak użyć Search the specified database for the specified key. The database may be any one of passwd, group, hosts, services, protocols, ornetworks słownik.
- Przykład GPG użycie :
- Jak użyć administration command. Like pwconv , the grpconv command creates a shadowed group file to keep your encrypted group passwords safe from password-cracking programs. grpconv creates the /etc/gshadow czym jest.