12-11-2012
Can you please show me the output of 'pgp -h' ?
10 More Discussions You Might Find Interesting
1. Programming
Hi all,
I have written a Java program to generate RSA public and private keys. I am writing the keys to a file and reading from it when required to encryption or decryption. I want to protect the private key file using a passphrase. Can anyone tell me how to do it? :(
Thanks. (2 Replies)
Discussion started by: Treasa
2 Replies
2. UNIX for Dummies Questions & Answers
Hi everyone,
I have a quick/newb question:
I know that a public key is used to encrypt data and a private key is used to decrypt data but who keeps the public/private keys??
Does the Web Server hold both?
Does the Web Server have the public key and does the client have the private key? ... (3 Replies)
Discussion started by: tical00
3 Replies
3. Shell Programming and Scripting
I wish to generate a id_dsa.pub and id_dsa (Public and Private Key) in a common user group. I have checked the .ssh directory and i have already found id_dsa.pub and id_dsa existing.
Is that OK if i create both the keys in my home direcotry, rename it to jjj.pub and jjj and move to Common user... (1 Reply)
Discussion started by: vasuarjula
1 Replies
4. Solaris
I would like to ask if you have a procedure on how to upload multiple private key for multiple users in solaris? I was only able to add one but when I tried to add several key, it fails.
example:
a. user1: user1.ppk
b. user2: user2.ppk
Each with different password on the server. Pls advise (6 Replies)
Discussion started by: lhareigh890
6 Replies
5. UNIX for Dummies Questions & Answers
Hi everyone!
I know you can extract public keys from a keystore using the keytool command.
But what is the process to extract a private key from a jks keystore and import into another jks keystore using keytool?
Any guidance would be greatly appreciated! I can't seem to find anything, I do... (0 Replies)
Discussion started by: Keepcase
0 Replies
6. UNIX for Dummies Questions & Answers
Hello all,
We have unix environment and we would like to use ssh public and private key to move between server using ssh. I do know how to test this and have it up and running on some sandbox...but my question is how would one secure the PRIVATE KEY....we are not using a passphrase...and i know... (1 Reply)
Discussion started by: abdul.irfan2
1 Replies
7. Red Hat
Hello,
Need a suggestion to setup private key passwordless authentication. I am not sure this can done or not :wall:
here is the sincerio
I have two servers, sever1 with a user "user1" and servera with usera
here dataflow: usera from servera, will pull/push files to server1 on user1... (2 Replies)
Discussion started by: bobby320
2 Replies
8. OS X (Apple)
Before you get the wrong idea, I am not looking for how to generate one. I have a key from a server admin but I can't figure out how to use it in OS X.
I have the key, the address and everything I should need but there doesn't seem to be a step by step on how to install the key and use it in... (4 Replies)
Discussion started by: kylebellamy
4 Replies
9. Shell Programming and Scripting
Hi All,
I have a requirement where i need to check if an rsa public key corresponds to a private key and hence return success or failure. Currently i am using the command
diff <( ssh-keygen -y -e -f "$PRIVKEY" ) <( ssh-keygen -y -e -f "$PUBLICKEY" )
and its solving my purpose. This is in... (1 Reply)
Discussion started by: mritusmoi
1 Replies
10. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
LEARN ABOUT DEBIAN
bup-ls
bup-ls(1) General Commands Manual bup-ls(1)
NAME
bup-ls - list the contents of a bup repository
SYNOPSIS
bup ls [-s] [-a]
DESCRIPTION
bup ls lists files and directories in your bup repository using the same directory hierarchy as they would have with bup-fuse(1).
The top level directory contains the branch (corresponding to the -n option in bup save), the next level is the date of the backup, and
subsequent levels correspond to files in the backup.
When bup ls is asked to output on a tty, it formats its output in columns so that it can list as much as possible in as few lines as possi-
ble. However, when bup ls is asked to output to something other than a tty (say you pipe the output to another command, or you redirect it
to a file), it will output one file name per line. This makes the listing easier to parse with external tools.
Note that bup ls doesn't show hidden files by default and one needs to use the -a option to show them. Files are hidden when their name
begins with a dot. For example, on the topmost level, the special directories named .commit and .tag are hidden directories.
Once you have identified the file you want using bup ls, you can view its contents using bup join or git show.
OPTIONS
-s, --hash
show hash for each file/directory.
-a, --all
show hidden files.
EXAMPLE
bup ls /myserver/latest/etc/profile
bup ls -a /
SEE ALSO
bup-join(1), bup-fuse(1), bup-ftp(1), bup-save(1), git-show(1)
BUP
Part of the bup(1) suite.
AUTHORS
Avery Pennarun <apenwarr@gmail.com>.
Bup unknown- bup-ls(1)