wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to Encrypt and Decrypt Using GNU PGP

profile
Kiddoneeta
Oct 08, 2017
0 Likes
0 Discussions
629 Reads

Steps for Installing GPG4WiN:

Open gpg4win setup file and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select destination for where it is going to save

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Install button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Click on Yes button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select option "I want to manually reboot later". And click on Finish button

How to Encrypt and Decrypt Using GNU PGP

Now open the software GPA

How to Encrypt and Decrypt Using GNU PGP

Generating private keys:

Click on Generate key now button

How to Encrypt and Decrypt Using GNU PGP

How to Encrypt and Decrypt Using GNU PGP

Enter the name

How to Encrypt and Decrypt Using GNU PGP

Enter Email Address

How to Encrypt and Decrypt Using GNU PGP

Select option "Do it later" and then click on Forward button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Enter password and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Re-Enter the same password and click OK button

How to Encrypt and Decrypt Using GNU PGP

This will generate the key.

Exporting keys:

How to Encrypt and Decrypt Using GNU PGP

Click on Detailed button

How to Encrypt and Decrypt Using GNU PGP

Click on Export tab

How to Encrypt and Decrypt Using GNU PGP

Give name to the file

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

For Encrypt,

Create new text file . Write few text on it like "This is hidden text" and Save it.

How to Encrypt and Decrypt Using GNU PGP

Right Click on that text file. Select "Sign and Encrypt".

How to Encrypt and Decrypt Using GNU PGP

Select the option "Sign and Encrypt (OpenPGP only)" and click Next button

How to Encrypt and Decrypt Using GNU PGP

Select the file and click on ADD button

How to Encrypt and Decrypt Using GNU PGP

Then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on "Sign & Encrypt" button

How to Encrypt and Decrypt Using GNU PGP

Type password as you had given pervious and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP

For Decrypt,

Right Click on extension of file which is gpg . Select "Decrypt and Verify".

How to Encrypt and Decrypt Using GNU PGP

Click on "Decrypt/Verify" button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP          

Comments ()


Sign in

Read Next

AI and cyber Security

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Memory hierarchy

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Virtual memory

Blog banner

SPAM

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Deadlock and Starvation

Blog banner

DELIRIUM

Blog banner

BASICS OF SHARE MARKET

Blog banner

RAID and It's Levels

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Decoding Confusion Matrix

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Ambiguous

Blog banner

How secured are you online ?

Blog banner

Cache memory

Blog banner

Memory Management

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Virtual memory in Operating System

Blog banner

Dr. Venkadavarahan

Blog banner

Threats To Computer System

Blog banner

BENIFITS OF YOGA

Blog banner

Measuring IT Risk

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

E-learning in today's world

Blog banner

GIS in Disaster Management

Blog banner

Virtual memory

Blog banner

Deadlock

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Modern Operating System

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Photorec - media recovery tool

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

I/O Buffering

Blog banner

A Short History of GIS

Blog banner

Ethical Hacking

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

The Right way of cooking

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner