Hello Jarrod, I labeled this message important, and then started to read the tutorial. By the time I got to key revoking in the introduction I realized that I am almost brain dead by 21:30.
So I am going to go back to the url when I am more alert and will read all of it carefully and then generate my private and public keys. If I find my misplaced wallet, I will do a key exchange at the next meeting I attend. But after I learn how to create my private and public keys I will do so even if I do not yet have enough ID to convince others that I am who I say I am. Unfortunately my clug card and my personal identity card are in that wallet. Regards, Michael Walters Jarrod Major wrote: >I figured i should start a separate thread for this as it could be missed in >the other one if only a few people were reading it. > >I am offering tutelage in the setting up and use of GPG Public Key Encryption. >This is open to anyone but subject to MY availability. I am available on IRC >and Skype fairly often. If you want to get a jump on things you should >consult: > >http://www.gnupg.org/gph/en/manual.html > >This is written very plainly and is very easy to follow even for nubes. > >The requirement is having GPG installed on your system. Most of the friendlier >versions of Linux come with it preinstalled and ready for you to use. If it >is not installed, it is not a very big package to install. If you use KDE >then you can manage everything with the very excellent KGpg GUI tool, it can >handle just about everything but also gives you the option of going >command-line to do some of the more involved bits. > >I can't rave about this technology enough. With Shawn's concern over email of >late, it exemplifies the need to use such an excellent tool like this. If you >are able to sign your messages with your GPG key then everyone who has your >public key may verify that it was you that sent the message. This is very >important especially for our Executives who send meeting or special event >notices from time to time. Having the ability to check the validity of a >message is a good thing when you are talking about important information. > >Yes, we are somewhat protected by the fact that our mailing lists are for >subscribers only but it is still possible for someone with malicious intent >to get in and cause trouble. > > >------------------------------------------------------------------------ > >_______________________________________________ >clug-talk mailing list >[email protected] >http://clug.ca/mailman/listinfo/clug-talk_clug.ca >Mailing List Guidelines (http://clug.ca/ml_guidelines.php) >**Please remove these lines when replying > _______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

