wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to Encrypt and Decrypt Using GNU PGP

profile
Kiddoneeta
Oct 08, 2017
0 Likes
0 Discussions
629 Reads

Steps for Installing GPG4WiN:

Open gpg4win setup file and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select destination for where it is going to save

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Install button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Click on Yes button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select option "I want to manually reboot later". And click on Finish button

How to Encrypt and Decrypt Using GNU PGP

Now open the software GPA

How to Encrypt and Decrypt Using GNU PGP

Generating private keys:

Click on Generate key now button

How to Encrypt and Decrypt Using GNU PGP

How to Encrypt and Decrypt Using GNU PGP

Enter the name

How to Encrypt and Decrypt Using GNU PGP

Enter Email Address

How to Encrypt and Decrypt Using GNU PGP

Select option "Do it later" and then click on Forward button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Enter password and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Re-Enter the same password and click OK button

How to Encrypt and Decrypt Using GNU PGP

This will generate the key.

Exporting keys:

How to Encrypt and Decrypt Using GNU PGP

Click on Detailed button

How to Encrypt and Decrypt Using GNU PGP

Click on Export tab

How to Encrypt and Decrypt Using GNU PGP

Give name to the file

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

For Encrypt,

Create new text file . Write few text on it like "This is hidden text" and Save it.

How to Encrypt and Decrypt Using GNU PGP

Right Click on that text file. Select "Sign and Encrypt".

How to Encrypt and Decrypt Using GNU PGP

Select the option "Sign and Encrypt (OpenPGP only)" and click Next button

How to Encrypt and Decrypt Using GNU PGP

Select the file and click on ADD button

How to Encrypt and Decrypt Using GNU PGP

Then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on "Sign & Encrypt" button

How to Encrypt and Decrypt Using GNU PGP

Type password as you had given pervious and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP

For Decrypt,

Right Click on extension of file which is gpg . Select "Decrypt and Verify".

How to Encrypt and Decrypt Using GNU PGP

Click on "Decrypt/Verify" button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP          

Comments ()


Sign in

Read Next

Routers

Blog banner

Disk cache

Blog banner

Deadlock and Starvation

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

AI and cyber Security

Blog banner

MySQL

Blog banner

OS ASSIGNMENT

Blog banner

Game Theory in Blockchain

Blog banner

IT Service Continuity Management

Blog banner

Memory Management

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Functions of operating system

Blog banner

Service Operations in ITSM

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

OS assignment 3

Blog banner

Twisted world

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Mumbaicha Dabbawalla

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Fitness regime by Deepesh

Blog banner

INTRANET

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Friendship

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Different types of scam frauds

Blog banner

What are Tenders its various types

Blog banner

Consumer to consumer business mode

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Deadlock and Starvation

Blog banner

Guidelines for a low sodium diet.

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

My favourite food

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Electronic data interchange

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner