Chapter 19. Software -Securities/Management & Limitation

Table of Contents

1. Linux GnuPG
2. Often used Commands
3. Importing keys
3.1. Key signing
4. Encrypt and decrypt
4.1. Exporting your public key

Encryption of data sources is an invaluable feature that gives us a high degree of confidentiality for our work. A tool like GnuPG does much more than just encryption of mail messages. It can be used for all kinds of data encryptions, and its utilization can only be stopped by the imagination. GnuPG RPM package comes already installed on you computer, but this version is not up to date and it is recommended to install the latest release available to fit our needs and CPU architecture.