wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to Encrypt and Decrypt Using GNU PGP

profile
Kiddoneeta
Oct 08, 2017
0 Likes
0 Discussions
629 Reads

Steps for Installing GPG4WiN:

Open gpg4win setup file and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select destination for where it is going to save

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Install button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Click on Yes button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select option "I want to manually reboot later". And click on Finish button

How to Encrypt and Decrypt Using GNU PGP

Now open the software GPA

How to Encrypt and Decrypt Using GNU PGP

Generating private keys:

Click on Generate key now button

How to Encrypt and Decrypt Using GNU PGP

How to Encrypt and Decrypt Using GNU PGP

Enter the name

How to Encrypt and Decrypt Using GNU PGP

Enter Email Address

How to Encrypt and Decrypt Using GNU PGP

Select option "Do it later" and then click on Forward button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Enter password and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Re-Enter the same password and click OK button

How to Encrypt and Decrypt Using GNU PGP

This will generate the key.

Exporting keys:

How to Encrypt and Decrypt Using GNU PGP

Click on Detailed button

How to Encrypt and Decrypt Using GNU PGP

Click on Export tab

How to Encrypt and Decrypt Using GNU PGP

Give name to the file

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

For Encrypt,

Create new text file . Write few text on it like "This is hidden text" and Save it.

How to Encrypt and Decrypt Using GNU PGP

Right Click on that text file. Select "Sign and Encrypt".

How to Encrypt and Decrypt Using GNU PGP

Select the option "Sign and Encrypt (OpenPGP only)" and click Next button

How to Encrypt and Decrypt Using GNU PGP

Select the file and click on ADD button

How to Encrypt and Decrypt Using GNU PGP

Then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on "Sign & Encrypt" button

How to Encrypt and Decrypt Using GNU PGP

Type password as you had given pervious and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP

For Decrypt,

Right Click on extension of file which is gpg . Select "Decrypt and Verify".

How to Encrypt and Decrypt Using GNU PGP

Click on "Decrypt/Verify" button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP          

Comments ()


Sign in

Read Next

Modern Operating System - Khush bagaria

Blog banner

Security in Operating Systems

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Cyber Security Standards

Blog banner

Excel records

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Spotify

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Photography

Blog banner

VIRTUAL MACHINES

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

The functions of operating system

Blog banner

IP ADDRESS

Blog banner

Ethical Hacking

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

Strengthening Active Directory Security

Blog banner

To-Do List In LISP

Blog banner

Mumbai Metro 3

Blog banner

Modern Operating Systems.

Blog banner

Virtual Machine

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Memory Management

Blog banner

Interrupts in operating system.

Blog banner

Why we should do reading

Blog banner

ODOO

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Jira service Management

Blog banner

All you need to know about “On-page SEO”

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Modern Operating system

Blog banner

Memory management

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Information Technology In E- Commerce

Blog banner

WINDOWS I/ O

Blog banner

Rapido

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Health and fitness in technology

Blog banner