$ file į: GPG symmetrically encrypted data (AES cipher) You can rename the file to anything you want. gpg extension isn't required, but it does let the user know which decryption tool to use to read the file. Alternatively, if you're going to share the encrypted version, you can rename it before sharing. You should probably remove the original file, file1.txt, so that the encrypted one is the sole source of the information contained in it. gpg extension to the newly encrypted file. MqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqjĮncrypting a file with gpg leaves the original file intact, file1.txt, and adds the telltale. Lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk The quick method for encrypting a file is to issue the gpg command with the -c (create) option: $ echo This is an encryption test > file1.txt The gpg utility has a lot of options, but fortunately for us, encrypting and decrypting are easy to do and only require that you know three options for quick use: Create or encrypt ( -c), decrypt ( -d), and extract and decrypt (no option). gpg features complete key management and all the bells and whistles you would expect from a full OpenPGP implementation. It is a tool to provide digital encryption and signing services using the OpenPGP standard. Gpg is the OpenPGP (Pretty Good Privacy) part of the GNU Privacy Guard (GnuPG). The GNU Privacy Guard (GPG or gpg) tool is a native/baseos security tool for encrypting files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |