Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

nasty(1) [debian man page]

NASTY(1)							   User Commands							  NASTY(1)

NAME
nasty - A tool which helps you to recover your GPG passphrase SYNOPSIS
nasty [OPTIONS] DESCRIPTION
nasty is a program that helps you to recover the passphrase of your PGP or GPG-key in case you forget or lost it. OPTIONS
-a x set minimum length of passphrase -b x set maximum length -m x set guessing mode: incremental: try them all random: try at random file: read phrases from file (use -i) -i x file to read the passphrases from -f x file to write the found passphrase to -c x... charset, one or more from the following: a: a-z A: A-Z 0: 0-9 .: all ascii values (32...126) +: 32...255 (default(!)) -h show command options ISSUES
Nasty will not work if you try it with a gpg-agent running in your system. For obvious reasons the agent will ask you the passphrase to access your private key - which you probably don't record, right? :) AUTHOR
This manual page was written by Tiago Bortoletto Vaz <tiago@debian.org> for the Debian GNU/Linux system (but may be used by others). nasty September 2009 NASTY(1)

Check Out this Related Man Page

GPG-PRESET-PASSPHRASE(1)					 GNU Privacy Guard					  GPG-PRESET-PASSPHRASE(1)

NAME
gpg-preset-passphrase - Put a passphrase into gpg-agent's cache SYNOPSIS
gpg-preset-passphrase [options] [command] cache-id DESCRIPTION
The gpg-preset-passphrase is a utility to seed the internal cache of a running gpg-agent with passphrases. It is mainly useful for unat- tended machines, where the usual pinentry tool may not be used and the passphrases for the to be used keys are given at machine startup. Passphrases set with this utility don't expire unless the --forget option is used to explicitly clear them from the cache --- or gpg-agent is either restarted or reloaded (by sending a SIGHUP to it). It is necessary to allow this passphrase presetting by starting gpg-agent with the --allow-preset-passphrase. gpg-preset-passphrase is invoked this way: gpg-preset-passphrase [options] [command] cacheid cacheid is either a 40 character keygrip of hexadecimal characters identifying the key for which the passphrase should be set or cleared. The keygrip is listed along with the key when running the command: gpgsm --dump-secret-keys. Alternatively an arbitrary string may be used to identify a passphrase; it is suggested that such a string is prefixed with the name of the application (e.g foo:12346). One of the following command options must be given: --preset Preset a passphrase. This is what you usually will use. gpg-preset-passphrase will then read the passphrase from stdin. --forget Flush the passphrase for the given cache ID from the cache. The following additional options may be used: -v --verbose Output additional information while running. -P string --passphrase string Instead of reading the passphrase from stdin, use the supplied string as passphrase. Note that this makes the passphrase visible for other users. SEE ALSO
gpg(1), gpgsm(1), gpg-agent(1), scdaemon(1) The full documentation for this tool is maintained as a Texinfo manual. If GnuPG and the info program are properly installed at your site, the command info gnupg should give you access to the complete manual including a menu structure and an index. GnuPG 2.0.15 2010-07-05 GPG-PRESET-PASSPHRASE(1)
Man Page

We Also Found This Discussion For You

1. Shell Programming and Scripting

nasty string extraction problem

Hello, if I have a file containing a chunk of HTML and I want to extract always the string beginning http://www.xxx.com/v/ that ends just before "> (i.e. and including the bit BqqtJpfZElQ&hl will change randomly) Any ideas??? # cat randomfeature.html <object width="160"... (3 Replies)
Discussion started by: kevinyeandel1
3 Replies