Sponsored Content
Full Discussion: unix file encryption
Operating Systems AIX unix file encryption Post 302245193 by shockneck on Thursday 9th of October 2008 03:03:01 PM
Old 10-09-2008
I'd recommend GnuPG: The GNU Privacy Guard - GnuPG.org
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

2. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

3. Cybersecurity

How to use PGP File Encryption

Hi All, I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it. I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box. I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies

4. AIX

file encryption in aix

Hi All, I have a AIX 5.3. does anybody know how to encrypt a text file? Thanks, Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies

5. UNIX for Dummies Questions & Answers

Identify a file for encryption or decryption

Dear Members, Can we find if a particular file is encrypted or decrypted. I need a command by which i should be able to identify if a file is encrypted or decrypted. How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies

6. Solaris

Folder / file encryption

Hi, does anybody know of any tool that would allow me to have all files store in a folder automatically encrypted? or some similar capability? (2 Replies)
Discussion started by: malky
2 Replies

7. Red Hat

file encryption

Hello! I want to know about file encryption in redhat linux.... Please suggest me some gud websites from where i can get detailed information... Thanks in advance.... (3 Replies)
Discussion started by: aliyaa
3 Replies

8. Shell Programming and Scripting

Need help on File Encryption using gpg

Folks, Is there anyone to help on GPG file encryptions here. I got a public key from third party. I imported the key in server. I want to encrypt the public key. But without being signed , the key cannot be encrypted. When I try to sign the key using lsign command, I am getting the below... (1 Reply)
Discussion started by: dinesh1985
1 Replies

9. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
GnuPG::Revoker(3pm)					User Contributed Perl Documentation				       GnuPG::Revoker(3pm)

NAME
GnuPG::Revoker - GnuPG Key Revoker Objects SYNOPSIS
# assumes a GnuPG::PrimaryKey object in $key my $revokerfpr = $key->revokers->[0]->fingerprint(); DESCRIPTION
GnuPG::Revoker objects are generally not instantiated on their own, but rather as part of GnuPG::Key objects. They represent a statement that another key is designated to revoke certifications made by the key in question. OBJECT METHODS
new( %initialization_args ) This methods creates a new object. The optional arguments are initialization of data members. is_sensitive() Returns 0 if the revoker information can be freely distributed. If this is non-zero, the information should be treated as "sensitive". Please see http://tools.ietf.org/html/rfc4880#section-5.2.3.15 for more explanation. compare( $other, $deep ) Returns non-zero only when this designated revoker is identical to the other GnuPG::Revoker. If $deep is present and non-zero, the revokers' signatures will also be compared. OBJECT DATA MEMBERS
fingerprint A GnuPG::Fingerprint object indicating the fingerprint of the specified revoking key. (Note that this is *not* the fingerprint of the key whose signatures can be revoked by this revoker). algo_num The numeric identifier of the algorithm of the revoker's key. signatures A list of GnuPG::Signature objects which cryptographically bind the designated revoker to the primary key. If the material was instantiated using the *_with_sigs() functions from GnuPG::Interface, then a valid revoker designation should have a valid signature associated with it from the relevant key doing the designation (not from the revoker's key). Note that designated revoker certifications are themselves irrevocable, so there is no analogous list of revocations in a GnuPG::Revoker object. SEE ALSO
GnuPG::Interface, GnuPG::Fingerprint, GnuPG::Key, GnuPG::Signature, http://tools.ietf.org/html/rfc4880#section-5.2.3.15 <http://tools.ietf.org/html/rfc4880#section-5.2.3.15> perl v5.12.4 2010-06-07 GnuPG::Revoker(3pm)
All times are GMT -4. The time now is 05:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy