Co robi GPG użycie. Konsola private encryption keys, and use or verify digital signatures. GPG is.

Czy przydatne?

Polecenie gpg

Wykonanie, użycie: The GNU Privacy Guard application allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures. GPG is based on the use of a pair of keys, one public and one private (or "secret"). Data encrypted with one key can only be decrypted with the other. To encrypt a message to you, someone would use your public key to create a message that could only be unlocked with your private key. To sign information, you would lock it with your private key, allowing anyone to verify that it came from you by unlocking it with your public key.

GPG has dozens of additional options that fine-tune its available options. For a complete list, plus a guide to careful use of encryption and a deeper explanation of how public-key encryption works, visit www.gnupg.org

Opcje wykonania gpg w konsoli

Przykłady gpg działanie w Słownik polecenie G

Przykład GPG użycie :
Jak użyć Search the specified database for the specified key. The database may be any one of passwd, group, hosts, services, protocols, ornetworks co znaczy.
Przykład GPG użycie :
Jak użyć manpages and groff documents. It accepts the option flags from both man and groff . The filespec argument can be a filename or a manpage or section specified in the format man:page or man:section krzyżówka.
Przykład GPG użycie :
Jak użyć System administration command. Remove group from system account files. You may still need to find and change permissions on files that belong to the removed group co to jest.
Przykład GPG użycie :
Jak użyć executables. When run, these files automatically uncompress, thus trading time for space. gzexe creates backup files with a tilde at the end (filename ~ ). These backup files can be deleted once you słownik.
Przykład GPG użycie :
Jak użyć Uncompress files compressed by gzip . See gzip for a list of options czym jest.