There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don’t want to share ...
Jack Wallen shows you how to use the open source gpg to sign documents for a cost-effective way to ensure your clients the files you send them are, in fact, from you. There may be plenty of times and ...
Encrypting files from the command line is simple with gpg. You can use it to encrypt and decrypt files with a password. The command gpg is part of GnuPG. GnuPG stands ...
Before you encrypt, decrypt or sign anything, you need to build your own public and private keyrings; let's start by generating a GnuPG key pair. This is one of the more interactive gpg functions: the ...
Most Linux users know vim as a text editor that descended from vi. It can also function as a tool for encrypting text files. In this post, we examine how this is done and how to reverse the process.