Co robi GPGV użycie. Konsola verify but uses a different keyring, ~/.gnupg/trustedkeys.gpg . Also.

Czy przydatne?

Polecenie gpgv

Wykonanie, użycie: Check the signature of one or more OpenPGP-signed files. This is similar in operation to gpg --verify but uses a different keyring, ~/.gnupg/trustedkeys.gpg. Also, gpgv assumes that the keyring is trusted, and it cannot edit or update it. By contrast, gpg --verify can go to a keyserver to verify signatures that are not in the local keyring, and offers various levels of trust. In both cases, you can use a detached signature file

Opcje wykonania gpgv w konsoli

-h,-?, --help

Display a short help message.

--ignore-time-conflict

Use this flag to ignore incorrect dates on signatures. An incorrect date can be a sign of fraud, but is often just a result of an incorrectly set clock.

-k,--keyring file

Use the specified file as a keyring, in addition to the default ~/.gnupg/trustedkeys.gpg.

--homedir dir

Use the specified directory as the GPG home directory, instead of the default (set in the GNUPGHOME variable, or, if that is unset, ~/.gnupg).

--logger-fd FD

Send log output to the specified file descriptor. By default, log output goes to stderr. Use of file descriptors is described in the DETAILS section of the GPG documentation.

-q,--quiet

Minimal output.

--status-fd FD

Send special status messages to the specified file descriptor.

-v,--verbose

Verbose mode. More informative.

Przykłady gpgv działanie w Słownik polecenie G

Przykład GPGV użycie :
Jak użyć manpages and groff documents. It accepts the option flags from both man and groff . The filespec argument can be a filename or a manpage or section specified in the format man:page or man:section co znaczy.
Przykład GPGV użycie :
Jak użyć administration command. Like pwconv , the grpconv command creates a shadowed group file to keep your encrypted group passwords safe from password-cracking programs. grpconv creates the /etc/gshadow krzyżówka.
Przykład GPGV użycie :
Jak użyć files (or data read from standard input) with Lempel-Ziv coding (LZ77). Rename compressed file to filename.gz ; keep ownership modes and access/modification times. Ignore symbolic links. Uncompress co to jest.
Przykład GPGV użycie :
Jak użyć Search the specified database for the specified key. The database may be any one of passwd, group, hosts, services, protocols, ornetworks słownik.
Przykład GPGV użycie :
Jak użyć The GNU version of awk , a program that does pattern matching, record processing, and other forms of text manipulation. For more information, see Chapter 1 czym jest.