Hello Jarrod,

I labeled this message important, and then started to read the tutorial.
By the time I got to key revoking in the introduction I realized that I
am almost brain dead by 21:30.

So I am going to go back to the url when I am more alert and will read
all of it carefully and then generate my private and public keys.

If I find my misplaced wallet, I will do a key exchange at the next
meeting I attend. But after I learn how to create my private and public
keys I will do so even if I do not yet have enough ID to convince others
that I am who I say I am. Unfortunately my clug card and my personal
identity card are in that wallet.

Regards,

Michael Walters

Jarrod Major wrote:

>I figured i should start a separate thread for this as it could be missed in 
>the other one if only a few people were reading it.
>
>I am offering tutelage in the setting up and use of GPG Public Key Encryption. 
>This is open to anyone but subject to MY availability. I am available on IRC 
>and Skype fairly often. If you want to get a jump on things you should 
>consult:
>
>http://www.gnupg.org/gph/en/manual.html
>
>This is written very plainly and is very easy to follow even for nubes.
>
>The requirement is having GPG installed on your system. Most of the friendlier 
>versions of Linux come with it preinstalled and ready for you to use. If it 
>is not installed, it is not a very big package to install. If you use KDE 
>then you can manage everything with the very excellent KGpg GUI tool, it can 
>handle just about everything but also gives you the option of going 
>command-line to do some of the more involved bits.
>
>I can't rave about this technology enough. With Shawn's concern over email of 
>late, it exemplifies the need to use such an excellent tool like this. If you 
>are able to sign your messages with your GPG key then everyone who has your 
>public key may verify that it was you that sent the message. This is very 
>important especially for our Executives who send meeting or special event 
>notices from time to time. Having the ability to check the validity of a 
>message is a good thing when you are talking about important information.
>
>Yes, we are somewhat protected by the fact that our mailing lists are for 
>subscribers only but it is still possible for someone with malicious intent 
>to get in and cause trouble.
>  
>
>------------------------------------------------------------------------
>
>_______________________________________________
>clug-talk mailing list
>[email protected]
>http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
>**Please remove these lines when replying
>


_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to