亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? pgp startup guide.htm

?? 黑客培訓教程
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
<head><title>PGP Startup Guide</title></head><pre><h1>PGP Startup Guide</h1>- -----BEGIN PGP SIGNED MESSAGE-----  Xenon (an48138@anon.penet.fi) has kindly posted an info sheet on getting  MacPGP 2.3a up and running, encouraging somebody to come along and write the  same thing for the PC version.  Well, hell, here it is.  Questions,  comments, bitches, and e-mail about this kind of stuff in general are  welcome at an50928@anon.penet.fi.  Our public key to verify the document can  be found at the end of this document, and also on keyservers all over the  damn place.================================================================================                       PGP Startup Guide - DOS Version                                     v1.0                                  (93/11/28)                                Out and About                           <an50928@anon.penet.fi>================================================================================Contents========Section 1 - Intro<1.0>  What the hell is this document?<1.1>  What the hell is PGP?Section 2 - Obtaining It<2.1>  BBSs<2.2>  America Online<2.3>  CompuServe<2.4>  InterNet<2.5>  Setting it upSection 3 - Using It<3.1>  Generating a Key<3.2>  Keys & keyrings<3.3>  Keyservers<3.4>  Signing<3.5>  Encrypting<3.6>  Other useful commandsSection 4 - Miscellaneous<4.1>  Legal Issues<4.2>  ViaCrypt<4.3>  Version History<4.4>  Everything Else================================================================================Section 1 - Intro<1.0>  What the hell is this document?  This document is an intro to PGP on MS-DOS machines.  It's designed for a  first-time user of PGP, and will get them through finding the program;  getting the program; and, finally, using the program in a basic way.  In  other words, a good way to get more people using PGP.<1.1>  What the hell is PGP?  PGP is a cryptography system that allows you to send data to other people  with what amounts to excellent security.  The important point about PGP,  though, is that you never have to meet the person you're sending encrypted  information to.  This might not make sense at first, but this capability is  essential to the benefits PGP can provide.  Traditional encryption techniques have one key.  The two people meet first,  and exchange this key; then, afterwards, one encrypts the data with the key,  sends it to the other person, who uses the same key to decrypt it.  Simple,  eh?  Well, PGP can do that, but it can also do something else, called public-key  encryption.  This means that you encrypt a document with somebody's "public  key" - which is freely distributed - and *only they* will be able to decrypt  it, with their corresponding private key.  Nobody else can.  Not even you,  right after you've encrypted it with their public key.  Some people may wonder why PGP is necessary.  Some people probably don't  care.  However, the two of us work remote in a distributed environment - our  modems are our connection to the office, and anytime we're sending sensitive  data through any kind of network, we're risking somebody else grabbing a  copy.  With PGP, that's no longer an issue.  Additionally, we're always sure that documents come from where they were  supposed to, since it's impossible to forge the digital "signatures" that  PGP creates.  For example, nobody knows who the two of us really are - the  anonymous server takes care of that.  However, once you've got our public  key, you'll know that anything verified by that key came from us - without  ever meeting either of us.  Thus, by coupling the anonymity of the InterNet  and the authentication of PGP, we can be anonymous, yet readily - and  reliably - identified.  Cool, eh?  The only potential problems with public-key systems is verifying the public  keys you have; see below, as well as the PGP documentation, for help on  this.Section 2 - Obtaining It<2.1>  BBSs  PGP is probably available on some local BBSs in your area.  If your local  BBS lacks it, here's some info from the PGP docs:================================================================================     The GRAPEVINE BBS in Little Rock Arkansas has set up a special     account for people to download PGP for free.  The SYSOP is Jim Wenzel,     at jim.wenzel@grapevine.lrk.ar.us.  The following phone numbers are     applicable and should be dialed in the order presented (i.e., the     first one is the highest speed line):  (501) 753-6859, (501)     753-8121, (501) 791-0124.  When asked to login use the following     information:               name: PGP USER        ('PGP' is 1st name, 'USER' is 2nd name)         password: PGP           PGP is also widely available on Fidonet, a large informal network of     PC-based bulletin board systems interconnected via modems.  Check     your local bulletin board systems.  It is available on many foreign     and domestic Fidonet BBS sites.           In New Zealand, try this (supposedly free) dial-up BBS system:        Kappa Crucis:  +64 9 817-3714, -3725, -3324, -8424, -3094, -3393           Source and binary distributions of PGP are available from the Canadian     Broadcasting Corporation library, which is open to the public.  It has     branches in Toronto, Montreal, and Vancouver.  Contact Max Allen, at     +1 416 205-6017 if you have questions.           For information on PGP implementations on the Apple Macintosh,     Commodore Amiga, or Atari ST, or any other questions about where to     get PGP for any other platform, contact Hugh Miller at     hmiller@lucpul.it.luc.edu.================================================================================<2.2>  America Online  As of a few days ago, PGP is also available on America Online.  If you have  any specific information on where PGP is available on AOL, please send it to  us; we'll include it in a future version of this document.<2.3>  CompuServe  Officially, it's not available on CompuServe, but try GO IBMFF and use the  File Finder on the keyword PGP; usually some forum still has it sitting  around, despite CIS's management trying their best to get rid of it.<2.4>  InterNet  If you're on the InterNet, the easiest way to dig up a copy of PGP is to ask  an "archie" server for the location.  Borrowing from Xenon's excellent  directions, find yourself an InterNet account, and telnet over to  archie.internic.net.  Log in with a username of "archie", and at the prompt,  type "prog pgp23a.zip".  You'll get a list of sites and directories, a la:================================================================================Host soda.berkeley.edu    (128.32.149.19)Last updated 09:50  4 Nov 1993    Location: /pub/cypherpunks/pgp      FILE    -rw-r--r--  320168 bytes  08:09  3 Jul 1993  pgp23a.zipHost isy.liu.se    (130.236.1.3)Last updated 08:14  3 Nov 1993    Location: /pub/misc/pgp/2.3A      FILE    -rw-r--r--  422851 bytes  10:58 19 Sep 1993  pgp23a.zip================================================================================  Close archie by typing "bye", then ftp to one of the above sites.  Use  "anonymous" for the user name, and your e-mail address as a password.  Type  "cd <dir>", where <dir> is the directory listed in the archie listing for  the site you're ftping to.  Type "binary", which sets the binary mode on.  Then type "get <filename>", where <filename> is the filename listed by  archie.  Finally, type "bye" to get back to your email system.  Get the file from your email system to your PC; this varies so much from  site to site that you'll need somebody local to help.<2.5>  Setting it up  Once you've got it on your PC, unzip PGP into its own directory.  You'll  also need to set two environment variables for PGP to be happy.  One, TZ,  sets the time zone for the system; here are some examples from the PGP docs:  For Amsterdam:    SET TZ=MET-1DST  For Arizona:      SET TZ=MST7     (Arizona never uses daylight savings time)  For Aukland:      SET TZ=NZT-13  For Chicago:      SET TZ=CST6CDT  For Denver:       SET TZ=MST7MDT  For London:       SET TZ=GMT0BST  For Los Angeles:  SET TZ=PST8PDT  For Moscow:       SET TZ=MSK-3MSD  For New York:     SET TZ=EST5EDT  Then set PGPPATH to the location you've unzipped PGP into; for example:  SET PGPPATH=C:\PGP  READ THE DOCS!  What follows from here is a good way to get started, but  there are a number of issues raised in the documentation that *must* be  known for safe and reliable operation!Section 3 - Using It<3.1>  Generating a Key  PGP works on the principle of "public-key" encryption.  This means that  every key has two parts: a secret part you keep close to your heart, and a  public part you scatter to the winds.  The two have some mysterious,  mathematical relationship that Einstein couldn't understand, but for our  purposes all that matters is that the public part can decrypt things  encrypted by the secret part, and vice versa.  Thus, the first step in using  PGP is to generate your key.  Type:  PGP -kg  Select a key length; the bigger, the more secure.  Most people use 1024  bits, and it isn't that much slower.  Following this, PGP will ask you for  your user name.  For example:  Out and About <an50928@anon.penet.fi>  |-----+-----| |----------+----------|        |                  |        |                  +----------+ Email Address, in <> brackets        +-----------------------------+ User Name, plain text  Please follow this pattern; since a lot of people are starting to use their  PGP keyrings with their friend's PGP keys as their email directories,  keeping things relatively constant is a Good Thing.  It'll then ask you for a "pass phrase."  This pass phrase is *very*  important. What PGP does, to insure that your secret key is used only when  authorized, is encrypt the secret key data with this "pass phrase," so that  only if the pass phrase is known will the secret key work.  As with most  kinds of password, this should not be something easily guess.  Differing  from most passwords, though, is that this phrase can pretty much be any text  you want, with long lengths encouraged.  Use random characters interspersed  with text, like hey1me$for*turkeys^clinton.  Don't use famous quotations, or  anything easily guessed, since this pass phrase is what keeps your secret  key secure.  The program will then want some number of random keystrokes. This probably  sounds silly, but it's actually very important.  Computers can generate  pseudorandom numbers, but truly random numbers are impossible - computers  are fancy calculators, and randomness comes hard.  So, PGP wants some  keystrokes - which it times - to derive some truly random numbers for  generating the keys.  Then it generates the key.  Go have lunch while this is happening; it's  probably the most boring interface yet come up with by any programmer,  unless you enjoy periods and plus signs.  A lot.  Especially if you have a  slow machine.  Finally, PGP will beep, and you've got a public and a secret key, stored on,  logically enough, a public and a secret keyring.  Which, of course, brings  us to keyrings.  BUT WAIT!!  Before you touch the next section, execute the following  command:  PGP -ks <id>  Where <id> is some part of your user ID that you typed in above.  You'll  have to type in that damn pass phrase - you did remember it, didn't you? -  and PGP will sign your key with your key.  While this probably sounds  redundant, it actually plays a very important part in assuring that your key  remains unmolested.  Nothing worse than molested keys ...<3.2>  Keys & keyrings  We mentioned keyrings above.  Well, if you've got keys in real life,  keyrings are a good place to put them.  PGP keys aren't any different.  PGP, by default, has two keyrings: public and secret.  Since you've already  generated a key pair, you've got one public and one secret key - the two  matching parts of your key.  These are stored on two keyrings; logically,  there's a public one (stored in PUBRING.PGP), and a secret one (stored in  SECRING.PGP).  The public keyring also will eventually contain keys for your  friends and such; the material on it is desiged for public distribution. The  SECRING.PGP file, on the other hand, is *very* valuable.  With that file and  your pass phrase, anybody can sign documents with your "electronic"  signature, and decrypt things sent to you.  Don't let it out of your sight;  while your pass phrase does protect the contents of the secret ring to a  certain extent, keeping the file secure is just as important as keeping the  pass phrase secret.  Since public keys can be distributed freely, they can be obtained from  keyservers (see below), among many other places. The PGP distribution  includes one called KEYS.ASC, which includes the public keys of the authors  of PGP.  As a first exercise, let's add it to your public keyring with this  command:  PGP -ka KEYS.ASC  PGP will ask if you want to certify any of the keys you've just added.  Say  "no"; certification means you know for sure that the key belongs to a user.  If you later get keys from friends who hand them to you personally, you can  say "yes" when you add their keys, telling PGP you know the keys really  belong to who they claim to.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色国产精品一区在线观看| 欧美韩日一区二区三区| 欧美综合久久久| 一本到不卡免费一区二区| 91美女蜜桃在线| 色综合天天综合在线视频| 97超碰欧美中文字幕| 97精品电影院| 91国偷自产一区二区三区成为亚洲经典 | 中文子幕无线码一区tr| 国产日韩欧美一区二区三区综合| 精品福利在线导航| 26uuu国产一区二区三区| 久久久青草青青国产亚洲免观| 久久久久久久久久久久久久久99 | 欧美精品日韩一区| 在线播放91灌醉迷j高跟美女 | 91欧美一区二区| 色哟哟一区二区在线观看| 在线观看欧美精品| 欧美日韩国产综合一区二区 | 日日噜噜夜夜狠狠视频欧美人| 午夜精品福利久久久| 日本不卡1234视频| 国产一区二三区| eeuss鲁片一区二区三区在线观看| 91在线视频免费91| 欧美偷拍一区二区| 精品乱码亚洲一区二区不卡| 久久色成人在线| 中文字幕亚洲一区二区va在线| 一区二区在线观看av| 婷婷夜色潮精品综合在线| 蜜臀久久99精品久久久画质超高清 | 午夜欧美大尺度福利影院在线看| 香蕉乱码成人久久天堂爱免费| 久久精品国产99国产| 成av人片一区二区| 欧美日韩小视频| 久久精品欧美日韩| 亚洲一区二区三区视频在线播放| 美女任你摸久久| 99久久免费国产| 日韩亚洲欧美一区| 国产精品网曝门| 婷婷国产v国产偷v亚洲高清| 国产福利一区二区三区视频| 91国产精品成人| 精品国产1区2区3区| 伊人色综合久久天天人手人婷| 裸体健美xxxx欧美裸体表演| 99久久精品免费精品国产| 69p69国产精品| 国产精品久久久久7777按摩| 日韩和的一区二区| www.欧美.com| 精品国产污污免费网站入口| 亚洲女与黑人做爰| 国产精品伊人色| 欧美在线观看视频一区二区三区| 精品国产91九色蝌蚪| 亚洲国产综合91精品麻豆| 国产69精品久久99不卡| 91麻豆精品久久久久蜜臀| 亚洲色图制服丝袜| 国产在线精品国自产拍免费| 欧美日韩美女一区二区| 国产欧美视频一区二区| 美女在线视频一区| 欧美视频一区二区在线观看| 国产无人区一区二区三区| 无吗不卡中文字幕| 一道本成人在线| 国产欧美日韩一区二区三区在线观看 | 亚洲免费观看高清完整版在线观看| 狠狠色综合播放一区二区| 欧美高清视频在线高清观看mv色露露十八| 中文字幕av一区二区三区高| 久久99精品网久久| 制服丝袜av成人在线看| 亚洲免费在线电影| 成人黄色免费短视频| 久久久久久99久久久精品网站| 日韩精品一级二级| 在线影视一区二区三区| 亚洲天堂成人在线观看| 高清久久久久久| 亚洲精品在线免费观看视频| 日韩高清在线不卡| 欧美性猛交xxxx乱大交退制版 | 九九久久精品视频| 欧美精品色一区二区三区| 一区二区三区在线看| av中文字幕亚洲| 亚洲国产激情av| 精品久久久久久久久久久久包黑料 | 国产精品麻豆欧美日韩ww| 国产jizzjizz一区二区| 久久久久88色偷偷免费| 黑人精品欧美一区二区蜜桃| 日韩欧美一区中文| 老司机精品视频导航| 欧美一区二区三区视频免费| 天天操天天干天天综合网| 欧美性生活大片视频| 亚洲午夜在线视频| 欧美日韩精品免费观看视频| 亚洲成av人片www| 欧美精品久久99| 麻豆精品视频在线观看视频| 91精品国产综合久久香蕉麻豆| 丝袜诱惑制服诱惑色一区在线观看| 欧美日韩和欧美的一区二区| 日韩成人免费电影| 精品国产露脸精彩对白| 国产自产v一区二区三区c| 国产日韩高清在线| 成人av电影在线观看| 中文字幕日韩一区| 欧美性猛片xxxx免费看久爱 | 欧美精品少妇一区二区三区 | 日韩一区二区精品在线观看| 久久99精品久久久久婷婷| 日韩免费看的电影| 国产91精品露脸国语对白| 中文字幕日韩av资源站| 欧美主播一区二区三区美女| 日韩精品亚洲专区| 久久久久国产免费免费| 99久久99久久精品免费看蜜桃| 一区二区三区在线观看欧美| 欧美精品一二三区| 国产高清亚洲一区| 一区二区在线免费| 日韩精品一区二区三区中文精品| 国产成人av资源| 亚洲激情网站免费观看| 在线成人小视频| 国产精品99久久久久久宅男| 亚洲日本va午夜在线影院| 欧美精品第1页| 国产成人精品一区二区三区网站观看 | 亚洲色图20p| 91精品国产综合久久久久久漫画| 国产高清在线精品| 亚洲国产成人av| 久久久99精品免费观看| 色视频欧美一区二区三区| 日本vs亚洲vs韩国一区三区二区 | 欧美久久久久久久久久| 国产毛片一区二区| 亚洲图片有声小说| 久久久久久久久久久久久女国产乱| 91福利视频在线| 国产精品自在在线| 亚洲国产欧美一区二区三区丁香婷| 精品噜噜噜噜久久久久久久久试看| 欧美国产精品中文字幕| 精品视频1区2区| 成人av免费在线观看| 麻豆精品一区二区三区| 亚洲日本免费电影| 久久久久久一二三区| 欧美日韩1234| 91丨porny丨户外露出| 狠狠狠色丁香婷婷综合久久五月| 亚洲综合在线电影| 日本一区二区三区在线观看| 欧美另类久久久品| 91污片在线观看| 国产一二精品视频| 日精品一区二区三区| 亚洲品质自拍视频网站| 国产夜色精品一区二区av| 欧美一级日韩一级| 色综合久久久久综合体| 国产99一区视频免费| 久久成人精品无人区| 午夜精品久久久久久| 一区二区三区不卡视频 | 国产一区999| 亚洲va韩国va欧美va| 亚洲欧美偷拍卡通变态| 国产亚洲一二三区| 精品国产自在久精品国产| 欧美日韩aaa| 欧美视频在线观看一区二区| 99视频精品在线| 国产成人在线免费观看| 精品亚洲国内自在自线福利| 午夜在线电影亚洲一区| 亚洲一区二区三区在线| 综合欧美一区二区三区| 欧美国产精品v| 国产亚洲女人久久久久毛片| 精品播放一区二区| 精品国产免费久久| 日韩欧美色电影| 日韩精品自拍偷拍| 日韩亚洲欧美在线|