Quit MacPGP.  • Quit  AppleEvent. which can be initiated from another program by sending an appropriate or backslashes. This feature also provides a scripting facility for MacPGP specifications for files should be separated by colons rather than slashes and use of the more obscure and arcane PGP features. Folder 'path' command lines, one command per line. This allows batch-mode operations prompts for a text file which you have previously created containing such such a command line to be typed into the dialog window. "Run Command File" style command lines. " Run Command Line" brings up a dialog asking for allow "hard-core" PGP aficionados to run MacPGP via Unix/MSDOS These are specialized commands for the MacPGP version of the package that  • Run Command File... • Run Command Line...  Macbinarized file when prompted. "Open/Decrypt" option under the Key menu and supply the filename of the to be verified, for example. After 'MacBinarizing' the file choose the allows the signature on the official distribution of the MacPGP application entire Macintosh file and all its separate components listed above. This Using this option it is possible to verify signatures associated with an  included here for convenience. popular programs support the "MacBinary" format; the feature is a raw data file suitable for transmission and later reconstruction. Other associated icon, data and resource forks, timestamps and attributes) into the user to convert a Macintosh-finder-format file (which has an This command is unique to the MacPGP version of the package. It allows  • MacBinarize...  on Radix-64 format see the "ASCII Output" flag under the Options menu. Radix-64 format suitable for text transmissions. For more information This command converts an arbitrary data file (text or binary) into  • ASCIIfy...  pass phrase to conventionally decrypt it. public key cryptography, PGP recognizes this and prompts you for the if necessary. If the ciphertext file was conventionally encrypted without except that you will be prompted for your password for your secret key already present on your key rings, no user intervention is required, your public key ring to check the signature. If all the right keys are in the nested signature to automatically find the appropriate public key on key ring. If there is a nested signature, PGP then uses the key ID prefix automatically find the appropriate secret decryption key on your secret encrypted, or both. PGP uses the key ID prefix in the ciphertext file to automatic, regardless of whether the ciphertext file is just signed, just In other words, the "unwrapping" of the ciphertext file is completely  formats. signatures, ASCII encoding, and public- vs. private-key encryption integrity of a signed file. PGP automatically handles files with or without Use this commandt to decrypt an encrypted file or to check the signature  • Open/Decrypt...  signature is independent. such as a legal contract, without nesting signatures. Each person's infection. It is also useful if more than one party must sign a document of an executable program is also useful for detecting a subsequent virus signature certificate in a separate certificate log. A detached signature A detached signature certificate is useful if you want to keep the  PGP properly check the signature integrity. signature and prompts the user for the filename of the text. Only then can signature file, PGP notices that there is no text in the same file with the check the signature integrity. When the recipient attempts to process the original text file to the recipient. The recipient must have both files to After creating the signature certificate file , send it along with the  command to do this. signature certificates that are detached from the text they sign. Use this separately from the messages they sign. It is possible to generate desirable in some circumstances to have signature certificates stored sign. This makes it convenient in simple cases to check signatures. It is Normally, signature certificates are physically attached to the text they  contents of the signed file are not appended to the signature certificate. in a file, by checking the detached signature box, in which case the This command can also be used to produce an isolated signature certificate  Detached Signatures  and optionally authenticated by PGP users. plaintext is not a concern or the file is to be readable by non-PGP users without encrypting it. This is useful when the secrecy of the exposed This command allows you to attach your verifiable signature to a file  • Sign only...  be "wiped" using the wipe file checkbox. you used the same pass phrase every time. Note that the original file can PGP will not encrypt the same plaintext the same way twice, even if  the plaintext before encrypting it. use to protect your own secret key. Note that PGP attempts to compress need not be (and, indeed, SHOULD not be) the same pass phrase that you phrase to use as a conventional key to encipher the file. This pass phrase key rings, user IDs, or any of that stuff. It prompts you for a pass file with the extension ".pgp", without using public key cryptography, This command encrypts the plaintext file specified, producing a ciphertext  file, public key cryptography is not really necessary. else. Since the same person that encrypted the file will also decrypt the protecting archive files that will be stored but will not be sent to anyone conventional single-key cryptography. This approach is useful for Sometimes you just need to encrypt a file the old-fashioned way, with  • Conventional Encrypt...  of the data using special disk recovery hardware. determined and sophisticated effort to recover the faint magnetic traces conventional disk recovery efforts, but not enough to withstand a both. Also, it overwrites the file only once, which is enough to thwart running PGP. Most word processors create backup files, scratch files, or have created on the disk while you were editing the message before not wipe out any fragments of plaintext that your word processor might Obviously, you should be careful with this option. Also note that this will  sensitive information that you don't want to keep around. block scanning utility. This is useful if the plaintext file contains of plaintext on the disk so that no one can recover it later using a disk automatically overwrite the plaintext file and delete it, leaving no trace After PGP makes a ciphertext file for you, you can have PGP  recovery after an encryption. after producing the ciphertext file. The plaintext file is destroyed beyond Use the "wipe file" checkbox to irreversably wipe out the plaintext file  Wiping Files