wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to Encrypt and Decrypt Using GNU PGP

profile
Kiddoneeta
Oct 08, 2017
0 Likes
0 Discussions
629 Reads

Steps for Installing GPG4WiN:

Open gpg4win setup file and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select destination for where it is going to save

How to Encrypt and Decrypt Using GNU PGP

Select all options and then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on Install button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on OK button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Click on Yes button

How to Encrypt and Decrypt Using GNU PGP

Click on Next button

How to Encrypt and Decrypt Using GNU PGP

Select option "I want to manually reboot later". And click on Finish button

How to Encrypt and Decrypt Using GNU PGP

Now open the software GPA

How to Encrypt and Decrypt Using GNU PGP

Generating private keys:

Click on Generate key now button

How to Encrypt and Decrypt Using GNU PGP

How to Encrypt and Decrypt Using GNU PGP

Enter the name

How to Encrypt and Decrypt Using GNU PGP

Enter Email Address

How to Encrypt and Decrypt Using GNU PGP

Select option "Do it later" and then click on Forward button

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

Enter password and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Re-Enter the same password and click OK button

How to Encrypt and Decrypt Using GNU PGP

This will generate the key.

Exporting keys:

How to Encrypt and Decrypt Using GNU PGP

Click on Detailed button

How to Encrypt and Decrypt Using GNU PGP

Click on Export tab

How to Encrypt and Decrypt Using GNU PGP

Give name to the file

How to Encrypt and Decrypt Using GNU PGP How to Encrypt and Decrypt Using GNU PGP

For Encrypt,

Create new text file . Write few text on it like "This is hidden text" and Save it.

How to Encrypt and Decrypt Using GNU PGP

Right Click on that text file. Select "Sign and Encrypt".

How to Encrypt and Decrypt Using GNU PGP

Select the option "Sign and Encrypt (OpenPGP only)" and click Next button

How to Encrypt and Decrypt Using GNU PGP

Select the file and click on ADD button

How to Encrypt and Decrypt Using GNU PGP

Then click on Next button

How to Encrypt and Decrypt Using GNU PGP

Click on "Sign & Encrypt" button

How to Encrypt and Decrypt Using GNU PGP

Type password as you had given pervious and click on OK button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP

For Decrypt,

Right Click on extension of file which is gpg . Select "Decrypt and Verify".

How to Encrypt and Decrypt Using GNU PGP

Click on "Decrypt/Verify" button

How to Encrypt and Decrypt Using GNU PGP

Click on Finish button

How to Encrypt and Decrypt Using GNU PGP          

Comments ()


Sign in

Read Next

Operating Systems

Blog banner

VIRTUAL MACHINES

Blog banner

Security requirements for Safe E-Payments

Blog banner

Importance of Website

Blog banner

Firewall in Computer Network

Blog banner

Short note on expert system

Blog banner

GraphX:- A graph processing tool

Blog banner

How to make Pancakes

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Career v/s Job : Choose your passion

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Deadlock

Blog banner

Operating System

Blog banner

Apple

Blog banner

Women empowerment

Blog banner

PERT Overview

Blog banner

Go Daddy

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Session Hijacking

Blog banner

social media issue

Blog banner

Starvation

Blog banner

Traveling

Blog banner

MySQL

Blog banner

What is a Dumpster Diving Attack?

Blog banner

DIGITAL ECONOMY

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Product Discount Calculator

Blog banner

Operating System Objectives and Functions

Blog banner

I/O Buffering

Blog banner

What is semaphore in operating system?

Blog banner

I/O buffer and its techniques

Blog banner

Information Technology In E- Commerce

Blog banner

Sessions In OS.

Blog banner

Logical and physical address

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Virtual Memory

Blog banner

rupee

Blog banner

Data Lake

Blog banner

Different types of scam frauds

Blog banner