10-09-2008
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello guys !
I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course.
Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan.
But when... (3 Replies)
Discussion started by: abidmalik
3 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. Cybersecurity
Hi All,
I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it.
I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box.
I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies
4. AIX
Hi
All,
I have a AIX 5.3. does anybody know how to encrypt a text file?
Thanks,
Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies
5. UNIX for Dummies Questions & Answers
Dear Members,
Can we find if a particular file is encrypted or decrypted.
I need a command by which i should be able to identify if a file is encrypted or decrypted.
How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies
6. Solaris
Hi, does anybody know of any tool that would allow me to have all files store in a folder automatically encrypted? or some similar capability? (2 Replies)
Discussion started by: malky
2 Replies
7. Red Hat
Hello!
I want to know about file encryption in redhat linux.... Please suggest me some gud websites from where i can get detailed information...
Thanks in advance.... (3 Replies)
Discussion started by: aliyaa
3 Replies
8. Shell Programming and Scripting
Folks,
Is there anyone to help on GPG file encryptions here.
I got a public key from third party. I imported the key in server.
I want to encrypt the public key. But without being signed , the key cannot be encrypted.
When I try to sign the key using lsign command,
I am getting the below... (1 Reply)
Discussion started by: dinesh1985
1 Replies
9. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
LEARN ABOUT DEBIAN
gnupg::revoker
GnuPG::Revoker(3pm) User Contributed Perl Documentation GnuPG::Revoker(3pm)
NAME
GnuPG::Revoker - GnuPG Key Revoker Objects
SYNOPSIS
# assumes a GnuPG::PrimaryKey object in $key
my $revokerfpr = $key->revokers->[0]->fingerprint();
DESCRIPTION
GnuPG::Revoker objects are generally not instantiated on their own, but rather as part of GnuPG::Key objects. They represent a statement
that another key is designated to revoke certifications made by the key in question.
OBJECT METHODS
new( %initialization_args )
This methods creates a new object. The optional arguments are initialization of data members.
is_sensitive()
Returns 0 if the revoker information can be freely distributed. If this is non-zero, the information should be treated as "sensitive".
Please see http://tools.ietf.org/html/rfc4880#section-5.2.3.15 for more explanation.
compare( $other, $deep )
Returns non-zero only when this designated revoker is identical to the other GnuPG::Revoker. If $deep is present and non-zero, the
revokers' signatures will also be compared.
OBJECT DATA MEMBERS
fingerprint
A GnuPG::Fingerprint object indicating the fingerprint of the specified revoking key. (Note that this is *not* the fingerprint of the
key whose signatures can be revoked by this revoker).
algo_num
The numeric identifier of the algorithm of the revoker's key.
signatures
A list of GnuPG::Signature objects which cryptographically bind the designated revoker to the primary key. If the material was
instantiated using the *_with_sigs() functions from GnuPG::Interface, then a valid revoker designation should have a valid signature
associated with it from the relevant key doing the designation (not from the revoker's key).
Note that designated revoker certifications are themselves irrevocable, so there is no analogous list of revocations in a
GnuPG::Revoker object.
SEE ALSO
GnuPG::Interface, GnuPG::Fingerprint, GnuPG::Key, GnuPG::Signature, http://tools.ietf.org/html/rfc4880#section-5.2.3.15
<http://tools.ietf.org/html/rfc4880#section-5.2.3.15>
perl v5.12.4 2010-06-07 GnuPG::Revoker(3pm)