home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Freaks Macintosh Archive
/
Freaks Macintosh Archive.bin
/
Freaks Macintosh Archives
/
Crypto⁄Encryption
/
PGP
/
PowerMac604 PGP 2.6.3i.sit
/
PowerMac604 PGP 2.6.3i
/
PowerMac PGP 2.6.3iC15_604.rsrc
/
STR#_208.txt
< prev
next >
Wrap
Text File
|
1997-03-06
|
7KB
|
273 lines
Quit MacPGP.
• Quit
AppleEvent.
which can be initiated from another program by sending an appropriate
or backslashes. This feature also provides a scripting facility for MacPGP
specifications for files should be separated by colons rather than slashes
and use of the more obscure and arcane PGP features. Folder 'path'
command lines, one command per line. This allows batch-mode operations
prompts for a text file which you have previously created containing such
such a command line to be typed into the dialog window. "Run Command File"
style command lines. " Run Command Line" brings up a dialog asking for
allow "hard-core" PGP aficionados to run MacPGP via Unix/MSDOS
These are specialized commands for the MacPGP version of the package that
• Run Command File...
• Run Command Line...
Macbinarized file when prompted.
"Open/Decrypt" option under the Key menu and supply the filename of the
to be verified, for example. After 'MacBinarizing' the file choose the
allows the signature on the official distribution of the MacPGP application
entire Macintosh file and all its separate components listed above. This
Using this option it is possible to verify signatures associated with an
included here for convenience.
popular programs support the "MacBinary" format; the feature is
a raw data file suitable for transmission and later reconstruction. Other
associated icon, data and resource forks, timestamps and attributes) into
the user to convert a Macintosh-finder-format file (which has an
This command is unique to the MacPGP version of the package. It allows
• MacBinarize...
on Radix-64 format see the "ASCII Output" flag under the Options menu.
Radix-64 format suitable for text transmissions. For more information
This command converts an arbitrary data file (text or binary) into
• ASCIIfy...
pass phrase to conventionally decrypt it.
public key cryptography, PGP recognizes this and prompts you for the
if necessary. If the ciphertext file was conventionally encrypted without
except that you will be prompted for your password for your secret key
already present on your key rings, no user intervention is required,
your public key ring to check the signature. If all the right keys are
in the nested signature to automatically find the appropriate public key on
key ring. If there is a nested signature, PGP then uses the key ID prefix
automatically find the appropriate secret decryption key on your secret
encrypted, or both. PGP uses the key ID prefix in the ciphertext file to
automatic, regardless of whether the ciphertext file is just signed, just
In other words, the "unwrapping" of the ciphertext file is completely
formats.
signatures, ASCII encoding, and public- vs. private-key encryption
integrity of a signed file. PGP automatically handles files with or without
Use this commandt to decrypt an encrypted file or to check the signature
• Open/Decrypt...
signature is independent.
such as a legal contract, without nesting signatures. Each person's
infection. It is also useful if more than one party must sign a document
of an executable program is also useful for detecting a subsequent virus
signature certificate in a separate certificate log. A detached signature
A detached signature certificate is useful if you want to keep the
PGP properly check the signature integrity.
signature and prompts the user for the filename of the text. Only then can
signature file, PGP notices that there is no text in the same file with the
check the signature integrity. When the recipient attempts to process the
original text file to the recipient. The recipient must have both files to
After creating the signature certificate file , send it along with the
command to do this.
signature certificates that are detached from the text they sign. Use this
separately from the messages they sign. It is possible to generate
desirable in some circumstances to have signature certificates stored
sign. This makes it convenient in simple cases to check signatures. It is
Normally, signature certificates are physically attached to the text they
contents of the signed file are not appended to the signature certificate.
in a file, by checking the detached signature box, in which case the
This command can also be used to produce an isolated signature certificate
Detached Signatures
and optionally authenticated by PGP users.
plaintext is not a concern or the file is to be readable by non-PGP users
without encrypting it. This is useful when the secrecy of the exposed
This command allows you to attach your verifiable signature to a file
• Sign only...
be "wiped" using the wipe file checkbox.
you used the same pass phrase every time. Note that the original file can
PGP will not encrypt the same plaintext the same way twice, even if
the plaintext before encrypting it.
use to protect your own secret key. Note that PGP attempts to compress
need not be (and, indeed, SHOULD not be) the same pass phrase that you
phrase to use as a conventional key to encipher the file. This pass phrase
key rings, user IDs, or any of that stuff. It prompts you for a pass
file with the extension ".pgp", without using public key cryptography,
This command encrypts the plaintext file specified, producing a ciphertext
file, public key cryptography is not really necessary.
else. Since the same person that encrypted the file will also decrypt the
protecting archive files that will be stored but will not be sent to anyone
conventional single-key cryptography. This approach is useful for
Sometimes you just need to encrypt a file the old-fashioned way, with
• Conventional Encrypt...
of the data using special disk recovery hardware.
determined and sophisticated effort to recover the faint magnetic traces
conventional disk recovery efforts, but not enough to withstand a
both. Also, it overwrites the file only once, which is enough to thwart
running PGP. Most word processors create backup files, scratch files, or
have created on the disk while you were editing the message before
not wipe out any fragments of plaintext that your word processor might
Obviously, you should be careful with this option. Also note that this will
sensitive information that you don't want to keep around.
block scanning utility. This is useful if the plaintext file contains
of plaintext on the disk so that no one can recover it later using a disk
automatically overwrite the plaintext file and delete it, leaving no trace
After PGP makes a ciphertext file for you, you can have PGP
recovery after an encryption.
after producing the ciphertext file. The plaintext file is destroyed beyond
Use the "wipe file" checkbox to irreversably wipe out the plaintext file
Wiping Files