亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? pgp startup guide.htm

?? 黑客培訓教程
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
<head><title>PGP Startup Guide</title></head><pre><h1>PGP Startup Guide</h1>- -----BEGIN PGP SIGNED MESSAGE-----  Xenon (an48138@anon.penet.fi) has kindly posted an info sheet on getting  MacPGP 2.3a up and running, encouraging somebody to come along and write the  same thing for the PC version.  Well, hell, here it is.  Questions,  comments, bitches, and e-mail about this kind of stuff in general are  welcome at an50928@anon.penet.fi.  Our public key to verify the document can  be found at the end of this document, and also on keyservers all over the  damn place.================================================================================                       PGP Startup Guide - DOS Version                                     v1.0                                  (93/11/28)                                Out and About                           <an50928@anon.penet.fi>================================================================================Contents========Section 1 - Intro<1.0>  What the hell is this document?<1.1>  What the hell is PGP?Section 2 - Obtaining It<2.1>  BBSs<2.2>  America Online<2.3>  CompuServe<2.4>  InterNet<2.5>  Setting it upSection 3 - Using It<3.1>  Generating a Key<3.2>  Keys & keyrings<3.3>  Keyservers<3.4>  Signing<3.5>  Encrypting<3.6>  Other useful commandsSection 4 - Miscellaneous<4.1>  Legal Issues<4.2>  ViaCrypt<4.3>  Version History<4.4>  Everything Else================================================================================Section 1 - Intro<1.0>  What the hell is this document?  This document is an intro to PGP on MS-DOS machines.  It's designed for a  first-time user of PGP, and will get them through finding the program;  getting the program; and, finally, using the program in a basic way.  In  other words, a good way to get more people using PGP.<1.1>  What the hell is PGP?  PGP is a cryptography system that allows you to send data to other people  with what amounts to excellent security.  The important point about PGP,  though, is that you never have to meet the person you're sending encrypted  information to.  This might not make sense at first, but this capability is  essential to the benefits PGP can provide.  Traditional encryption techniques have one key.  The two people meet first,  and exchange this key; then, afterwards, one encrypts the data with the key,  sends it to the other person, who uses the same key to decrypt it.  Simple,  eh?  Well, PGP can do that, but it can also do something else, called public-key  encryption.  This means that you encrypt a document with somebody's "public  key" - which is freely distributed - and *only they* will be able to decrypt  it, with their corresponding private key.  Nobody else can.  Not even you,  right after you've encrypted it with their public key.  Some people may wonder why PGP is necessary.  Some people probably don't  care.  However, the two of us work remote in a distributed environment - our  modems are our connection to the office, and anytime we're sending sensitive  data through any kind of network, we're risking somebody else grabbing a  copy.  With PGP, that's no longer an issue.  Additionally, we're always sure that documents come from where they were  supposed to, since it's impossible to forge the digital "signatures" that  PGP creates.  For example, nobody knows who the two of us really are - the  anonymous server takes care of that.  However, once you've got our public  key, you'll know that anything verified by that key came from us - without  ever meeting either of us.  Thus, by coupling the anonymity of the InterNet  and the authentication of PGP, we can be anonymous, yet readily - and  reliably - identified.  Cool, eh?  The only potential problems with public-key systems is verifying the public  keys you have; see below, as well as the PGP documentation, for help on  this.Section 2 - Obtaining It<2.1>  BBSs  PGP is probably available on some local BBSs in your area.  If your local  BBS lacks it, here's some info from the PGP docs:================================================================================     The GRAPEVINE BBS in Little Rock Arkansas has set up a special     account for people to download PGP for free.  The SYSOP is Jim Wenzel,     at jim.wenzel@grapevine.lrk.ar.us.  The following phone numbers are     applicable and should be dialed in the order presented (i.e., the     first one is the highest speed line):  (501) 753-6859, (501)     753-8121, (501) 791-0124.  When asked to login use the following     information:               name: PGP USER        ('PGP' is 1st name, 'USER' is 2nd name)         password: PGP           PGP is also widely available on Fidonet, a large informal network of     PC-based bulletin board systems interconnected via modems.  Check     your local bulletin board systems.  It is available on many foreign     and domestic Fidonet BBS sites.           In New Zealand, try this (supposedly free) dial-up BBS system:        Kappa Crucis:  +64 9 817-3714, -3725, -3324, -8424, -3094, -3393           Source and binary distributions of PGP are available from the Canadian     Broadcasting Corporation library, which is open to the public.  It has     branches in Toronto, Montreal, and Vancouver.  Contact Max Allen, at     +1 416 205-6017 if you have questions.           For information on PGP implementations on the Apple Macintosh,     Commodore Amiga, or Atari ST, or any other questions about where to     get PGP for any other platform, contact Hugh Miller at     hmiller@lucpul.it.luc.edu.================================================================================<2.2>  America Online  As of a few days ago, PGP is also available on America Online.  If you have  any specific information on where PGP is available on AOL, please send it to  us; we'll include it in a future version of this document.<2.3>  CompuServe  Officially, it's not available on CompuServe, but try GO IBMFF and use the  File Finder on the keyword PGP; usually some forum still has it sitting  around, despite CIS's management trying their best to get rid of it.<2.4>  InterNet  If you're on the InterNet, the easiest way to dig up a copy of PGP is to ask  an "archie" server for the location.  Borrowing from Xenon's excellent  directions, find yourself an InterNet account, and telnet over to  archie.internic.net.  Log in with a username of "archie", and at the prompt,  type "prog pgp23a.zip".  You'll get a list of sites and directories, a la:================================================================================Host soda.berkeley.edu    (128.32.149.19)Last updated 09:50  4 Nov 1993    Location: /pub/cypherpunks/pgp      FILE    -rw-r--r--  320168 bytes  08:09  3 Jul 1993  pgp23a.zipHost isy.liu.se    (130.236.1.3)Last updated 08:14  3 Nov 1993    Location: /pub/misc/pgp/2.3A      FILE    -rw-r--r--  422851 bytes  10:58 19 Sep 1993  pgp23a.zip================================================================================  Close archie by typing "bye", then ftp to one of the above sites.  Use  "anonymous" for the user name, and your e-mail address as a password.  Type  "cd <dir>", where <dir> is the directory listed in the archie listing for  the site you're ftping to.  Type "binary", which sets the binary mode on.  Then type "get <filename>", where <filename> is the filename listed by  archie.  Finally, type "bye" to get back to your email system.  Get the file from your email system to your PC; this varies so much from  site to site that you'll need somebody local to help.<2.5>  Setting it up  Once you've got it on your PC, unzip PGP into its own directory.  You'll  also need to set two environment variables for PGP to be happy.  One, TZ,  sets the time zone for the system; here are some examples from the PGP docs:  For Amsterdam:    SET TZ=MET-1DST  For Arizona:      SET TZ=MST7     (Arizona never uses daylight savings time)  For Aukland:      SET TZ=NZT-13  For Chicago:      SET TZ=CST6CDT  For Denver:       SET TZ=MST7MDT  For London:       SET TZ=GMT0BST  For Los Angeles:  SET TZ=PST8PDT  For Moscow:       SET TZ=MSK-3MSD  For New York:     SET TZ=EST5EDT  Then set PGPPATH to the location you've unzipped PGP into; for example:  SET PGPPATH=C:\PGP  READ THE DOCS!  What follows from here is a good way to get started, but  there are a number of issues raised in the documentation that *must* be  known for safe and reliable operation!Section 3 - Using It<3.1>  Generating a Key  PGP works on the principle of "public-key" encryption.  This means that  every key has two parts: a secret part you keep close to your heart, and a  public part you scatter to the winds.  The two have some mysterious,  mathematical relationship that Einstein couldn't understand, but for our  purposes all that matters is that the public part can decrypt things  encrypted by the secret part, and vice versa.  Thus, the first step in using  PGP is to generate your key.  Type:  PGP -kg  Select a key length; the bigger, the more secure.  Most people use 1024  bits, and it isn't that much slower.  Following this, PGP will ask you for  your user name.  For example:  Out and About <an50928@anon.penet.fi>  |-----+-----| |----------+----------|        |                  |        |                  +----------+ Email Address, in <> brackets        +-----------------------------+ User Name, plain text  Please follow this pattern; since a lot of people are starting to use their  PGP keyrings with their friend's PGP keys as their email directories,  keeping things relatively constant is a Good Thing.  It'll then ask you for a "pass phrase."  This pass phrase is *very*  important. What PGP does, to insure that your secret key is used only when  authorized, is encrypt the secret key data with this "pass phrase," so that  only if the pass phrase is known will the secret key work.  As with most  kinds of password, this should not be something easily guess.  Differing  from most passwords, though, is that this phrase can pretty much be any text  you want, with long lengths encouraged.  Use random characters interspersed  with text, like hey1me$for*turkeys^clinton.  Don't use famous quotations, or  anything easily guessed, since this pass phrase is what keeps your secret  key secure.  The program will then want some number of random keystrokes. This probably  sounds silly, but it's actually very important.  Computers can generate  pseudorandom numbers, but truly random numbers are impossible - computers  are fancy calculators, and randomness comes hard.  So, PGP wants some  keystrokes - which it times - to derive some truly random numbers for  generating the keys.  Then it generates the key.  Go have lunch while this is happening; it's  probably the most boring interface yet come up with by any programmer,  unless you enjoy periods and plus signs.  A lot.  Especially if you have a  slow machine.  Finally, PGP will beep, and you've got a public and a secret key, stored on,  logically enough, a public and a secret keyring.  Which, of course, brings  us to keyrings.  BUT WAIT!!  Before you touch the next section, execute the following  command:  PGP -ks <id>  Where <id> is some part of your user ID that you typed in above.  You'll  have to type in that damn pass phrase - you did remember it, didn't you? -  and PGP will sign your key with your key.  While this probably sounds  redundant, it actually plays a very important part in assuring that your key  remains unmolested.  Nothing worse than molested keys ...<3.2>  Keys & keyrings  We mentioned keyrings above.  Well, if you've got keys in real life,  keyrings are a good place to put them.  PGP keys aren't any different.  PGP, by default, has two keyrings: public and secret.  Since you've already  generated a key pair, you've got one public and one secret key - the two  matching parts of your key.  These are stored on two keyrings; logically,  there's a public one (stored in PUBRING.PGP), and a secret one (stored in  SECRING.PGP).  The public keyring also will eventually contain keys for your  friends and such; the material on it is desiged for public distribution. The  SECRING.PGP file, on the other hand, is *very* valuable.  With that file and  your pass phrase, anybody can sign documents with your "electronic"  signature, and decrypt things sent to you.  Don't let it out of your sight;  while your pass phrase does protect the contents of the secret ring to a  certain extent, keeping the file secure is just as important as keeping the  pass phrase secret.  Since public keys can be distributed freely, they can be obtained from  keyservers (see below), among many other places. The PGP distribution  includes one called KEYS.ASC, which includes the public keys of the authors  of PGP.  As a first exercise, let's add it to your public keyring with this  command:  PGP -ka KEYS.ASC  PGP will ask if you want to certify any of the keys you've just added.  Say  "no"; certification means you know for sure that the key belongs to a user.  If you later get keys from friends who hand them to you personally, you can  say "yes" when you add their keys, telling PGP you know the keys really  belong to who they claim to.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91麻豆国产自产在线观看| 久久蜜桃av一区二区天堂| 93久久精品日日躁夜夜躁欧美| 韩国av一区二区三区四区| 看片的网站亚洲| 久久99国产精品久久99| 黄一区二区三区| 国产乱对白刺激视频不卡| 国产精品亚洲专一区二区三区 | 亚洲日本va午夜在线影院| 国产精品欧美一级免费| 国产精品久久看| 亚洲伦理在线免费看| 亚洲精品国产精品乱码不99| 亚洲精品综合在线| 午夜亚洲福利老司机| 欧美aⅴ一区二区三区视频| 久久精品国产99久久6| 精品中文av资源站在线观看| 经典一区二区三区| 高清日韩电视剧大全免费| 成人亚洲一区二区一| 99在线精品一区二区三区| 久久久不卡网国产精品一区| 国产视频亚洲色图| 国产精品久久久久久户外露出| 亚洲视频一二三| 亚洲韩国一区二区三区| 麻豆一区二区三区| 国产91在线|亚洲| 在线这里只有精品| 日韩欧美激情四射| 国产欧美一区二区三区沐欲| 亚洲乱码国产乱码精品精98午夜| 亚洲成年人影院| 国产在线视频不卡二| 成人开心网精品视频| 在线观看91精品国产入口| 日韩免费电影网站| 国产精品久久久久久久久免费丝袜 | 一区二区久久久| 石原莉奈在线亚洲二区| 国产激情视频一区二区三区欧美| 色综合久久66| 日韩欧美国产综合| 中文字幕日韩精品一区| 日韩av一区二区三区四区| 国产福利一区在线观看| 色综合久久66| 精品91自产拍在线观看一区| 亚洲蜜臀av乱码久久精品| 麻豆91免费观看| 91丨九色porny丨蝌蚪| 91精品国产黑色紧身裤美女| 国产精品丝袜黑色高跟| 午夜av电影一区| 粉嫩在线一区二区三区视频| 欧美久久久久久久久久| 欧美韩国日本一区| 日本aⅴ免费视频一区二区三区| 成人夜色视频网站在线观看| 制服丝袜日韩国产| 亚洲国产经典视频| 男人操女人的视频在线观看欧美| 97精品视频在线观看自产线路二| 日韩一二在线观看| 亚洲男人的天堂av| 国产精品自拍一区| 69久久夜色精品国产69蝌蚪网| 中文字幕欧美国产| 麻豆成人免费电影| 欧美人与性动xxxx| 亚洲精品第1页| 成人精品视频一区二区三区 | 亚洲精品国产视频| 高清视频一区二区| 26uuu亚洲综合色欧美| 亚洲成av人片一区二区梦乃 | 中文字幕一区二区三区精华液 | 色先锋aa成人| 欧美国产成人在线| 韩国一区二区视频| 日韩视频123| 日韩在线一区二区三区| 欧美午夜精品免费| 亚洲手机成人高清视频| 成人午夜免费视频| 日本一二三四高清不卡| 国产尤物一区二区在线| 欧美v国产在线一区二区三区| 亚洲曰韩产成在线| 94-欧美-setu| 亚洲私人影院在线观看| 99久久婷婷国产综合精品| 欧美激情资源网| 国产.精品.日韩.另类.中文.在线.播放| 欧美一区二区不卡视频| 青娱乐精品在线视频| 91精品国产综合久久久久久久久久 | 国产美女主播视频一区| 日韩精品专区在线影院观看 | 欧美日韩一区久久| 亚洲午夜国产一区99re久久| 91电影在线观看| 一区二区三区免费在线观看| 91黄视频在线| 亚洲小说欧美激情另类| 精品1区2区3区| 亚洲成人动漫精品| 欧美精选午夜久久久乱码6080| 亚洲综合丝袜美腿| 欧美日韩免费一区二区三区视频| 亚洲影院在线观看| 欧美日韩国产精品自在自线| 日韩和欧美一区二区三区| 日韩小视频在线观看专区| 久久97超碰国产精品超碰| 国产亚洲一区二区三区在线观看| 狠狠色丁香久久婷婷综合_中 | 中文字幕欧美一区| 91视频精品在这里| 一区二区三区鲁丝不卡| 欧美日韩亚洲综合在线 | 不卡一二三区首页| 亚洲欧美日韩精品久久久久| 在线视频综合导航| 日产精品久久久久久久性色| 精品欧美一区二区在线观看| 国产成人精品免费网站| 中文字幕一区av| 欧美色老头old∨ideo| 美脚の诱脚舐め脚责91| 欧美极品xxx| 欧美日韩日本视频| 国产一区二区三区最好精华液| 国产欧美一区二区三区沐欲| 欧洲另类一二三四区| 免费成人结看片| 中文字幕在线视频一区| 欧美亚日韩国产aⅴ精品中极品| 青青草原综合久久大伊人精品| 精品va天堂亚洲国产| 99国内精品久久| 日韩精品免费视频人成| 中文字幕国产精品一区二区| 色婷婷狠狠综合| 久久国产欧美日韩精品| 国产精品久久久久aaaa樱花| 欧美日韩亚州综合| 国模冰冰炮一区二区| 亚洲欧美激情插| 日韩三级精品电影久久久 | 欧美性猛交xxxxxx富婆| 精品一区二区av| 亚洲精品老司机| 精品处破学生在线二十三| 欧美最新大片在线看| 国产乱人伦偷精品视频免下载| 亚洲精品日韩专区silk| 久久伊人蜜桃av一区二区| 91国偷自产一区二区三区观看| 国产在线视视频有精品| 亚洲一区在线观看视频| 欧美激情一区二区在线| 91精品国产综合久久久蜜臀粉嫩 | 精品在线亚洲视频| 亚洲黄色小视频| 国产日韩欧美制服另类| 欧美美女一区二区三区| av不卡在线观看| 精品一区二区三区在线播放 | 成人av在线一区二区三区| 日韩av一区二区在线影视| 亚洲欧美一区二区三区极速播放| 精品国产精品网麻豆系列| 欧美午夜精品电影| 大胆亚洲人体视频| 美国三级日本三级久久99| 亚洲18色成人| 亚洲精品亚洲人成人网 | 国产麻豆视频一区| 美女视频一区二区| 亚洲国产成人av网| 亚洲欧美日韩国产成人精品影院| 精品国产精品网麻豆系列| 91精品国产一区二区三区蜜臀| 91黄色免费网站| 91视频在线看| 91亚洲精品久久久蜜桃| 国产成人午夜99999| 精品一区二区国语对白| 奇米精品一区二区三区四区| 亚洲成av人片一区二区梦乃| 一区二区三区在线免费视频| 国产精品色婷婷久久58| 国产欧美中文在线| 国产日产欧美一区| 国产偷国产偷精品高清尤物| 国产无遮挡一区二区三区毛片日本| 欧美精品一区二区蜜臀亚洲|