/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Annotation of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log


Revision 222 - (hide annotations)
Thu Jun 1 08:30:46 2006 UTC (18 years, 9 months ago) by twoaday
File MIME type: application/x-texinfo
File size: 7638 byte(s)
Applied some more patches.


1 twoaday 222 \input texinfo
2    
3     @setfilename WinPT
4    
5     This file describes the Windows Privacy Tray program and its main functions
6    
7     This file is free under the terms of the GNU General Public License v2.
8    
9     Copyright (C) 2006 Timo Schulz
10    
11     Version 0.0.0
12    
13     @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
15     @section Requirements for WinPT
16    
17     First you need to have a working GnuPG 1.4 installtion on the machine you
18     plan to install WinPT. If you don't have GPG in your machine, please
19     visit http://www.gnupg.org and download the latest GPG version there.
20     It comes with a graphical installer so there is no need to do this
21     step manually.
22    
23     You need at least Windows 98/2K/XP, but Windows XP or better is
24     recommend. The program also works on NT/95/ME but there is no support
25     for these OS versions any longer.
26    
27    
28     @section Installation of the Program
29    
30     It is always recommend to use the latest version of the program. You
31     can download it from http://wald.intevation.org/projects/winpt.
32     Download the zip file with the binaries inside and unpack them in
33     a folder. All files need to be in the same folder, so if you change
34     the folder don't forget to move all files.
35    
36     To activate the program you just need to start WinPT.exe. You should
37     now see a little (golden key) icon in the taskbar which indicates that
38     the program is running. If you want to quit the program, right click
39     on the symbol and select "Exit".
40    
41     Alternative, you may use one of the graphical GPG installers which
42     are available on the internet. I recommend to use Gpg4Win which
43     includes a set of very useful privacy tools, beside WinPT and it
44     is very easy to use with an average size (~4MB). For non-German
45     speaking users, I recommend the light version because it does not
46     contain the 2 German PDF manuals.
47    
48     @subsection Configure the Program
49     After the installation not much of the default settings need to
50     be changed. If you prefer a special keyserver, it is propably a good
51     idea to open the keyserver dialog and to set one of the existing
52     keyservers as the default or create a new entry and mark it as the
53     new default. The default keyserver is subkeys.pgp.net, which is
54     the best choice for most users.
55    
56     @subsection GPG Options
57     For expert users, the GPG preference dialog might contain some
58     interesting options. For example to set the expiration date of
59     a signature and/or to set the signing level for key signing.
60     It also allows to set a default 'encrypt-to' key and to set
61     the comment in ASCII armored files.
62    
63     @subsection Preferences
64     In the WinPT preference dialog, the user can modify and/or disable
65     the default options. For new users it is suggested to leave the
66     default values as they are, except when there are problems related
67     to the hotkeys.
68    
69     To enable keyring backups, the user can either decide to use the
70     GPG home directory as the backup folder or any other folder. In
71     the latter case, a folder needs to be chosen. If the backup should
72     also include the secret keyring, please check the corresponding box.
73    
74    
75     @section The First Start
76     This section is only important for people who never installed
77     and/or used WinPT before.
78    
79     When the program is started the first time, it offers two choices.
80     The one is to generate a key pair and the other is to copy
81     existing GPG keyrings into the current installation.
82    
83     We assume the user will select the first entry.
84    
85     Now a new dialog is shown which requests some information from
86     the user to allow a meaningful association between the key and
87     the user. If the user prefer RSA keys, the check box should be marked.
88     If the entered data is OK, WinPT then generates a new key pair. As long
89     as this step takes, a progress dialog is shown to indicate the
90     enduring process. When the generation of the keypair is done, WinPT
91     offers the chance to backup the existing keyrings. This is definitely
92     an important decision because if the keyring will get corrupted
93     or lost, there is no way to recover the encrypted data. That is
94     why it is also important to store the backup, at least of the
95     secret keyring, at a @strong{safe} place.
96    
97     @section Keyserver Access
98     An easy way to retrieve keys is the keyserver. You can think of
99     it like a huge database with a lot of keys as its content. It is
100     possible to search keys by a pattern, a keyid or even a fingerprint.
101     WinPT allows to access different kind of keyservers. For example
102     LDAP, HKP, Finger and HTTP. But the focus will be set on HKP because
103     this is the common case.
104    
105     In some situations WinPT asks the user whether to retrieve keys
106     automatically. One example is the signature verification when the
107     key that issued the signature was not found in the keyring.
108    
109     The main keyserver dialog allows to fetch one or more keys directly
110     or to search for a given pattern.
111    
112     @subsection Retrieve a key by Key ID
113    
114     @subsection Retrieve a key by its email address
115    
116     @subsection Search for a key by pattern
117     If you want to communicate with a new mail partner and you are
118     not sure about the key ID, it can be useful to search for his
119     email address. This address is considered as quite unique.
120    
121     An example:
122    
123     pattern: twoaday@@freakmail.de
124    
125     [Search]
126    
127     Now a dialog is opened with a list of all keys which matched
128     the search string. If the name @strong{and} the email address
129     is known, the matching key should be selected and "Receive"
130     should be clicked. Then the key will be downloaded and added
131     to your keyring. Now you can encrypt data with this key, for
132     example an email.
133    
134     @section Adding new elements to your key
135    
136     @subsection Adding a new secondary key
137    
138     For most users the existing keys in the key pair are enough
139     and no extra key is needed. But there are some exceptions.
140    
141     @itemize @bullet
142    
143     @item
144     The primary key has no secondary key and the primary key is not
145     able to encrypt data. In this case it can be a good idea to
146     add a secondary encryption key.
147    
148     @item
149     A lot of people use secondary encryption keys with an expiration
150     date. Usually the key is valid for 1-2 years. After the key is expired,
151     a new key is needed in order to encrypt data.
152    
153     @end itemize
154    
155     What kind of public key algorithm should be selected is a matter
156     of taste. RSA and ElGamal are both capable for encryption. For most
157     users it's a good idea to let the program chose the key size (in bits).
158     The default settings should be secure enough for most purposes.
159    
160     @subsection Adding a new user ID
161     If you got a new email account, it's propably a good idea to
162     add these new account to your key also. For example:
163    
164     A new account was registed at gmail.com (john.doo@@gmail.com).
165     Then you should create a new user ID with the following fields:
166    
167     name: John Doo
168    
169     email: john.doo@@gmail.com
170    
171     comment: (optional)
172    
173     Now email programs are able to associate this address with your
174     key when somebody wants to send you a protected mail to this account.
175    
176     @subsection Adding a photographic ID
177     With this function you can add a photo to your public. It will be
178     displayed in the key property dialog.
179    
180     You just need to select a JPEG file which contains the photo and
181     enter your passphrase and confirm with OK. Please read the note
182     in the dialog carefully to make sure the photo has a proper size
183     (file, height and weight).
184    
185     @subsection Adding a new designated revoker
186     If you want to allow another key to revoke your own key, this
187     might be useful if you lost your secret or a simliar situation,
188     you can use this function to add a designated revoker to your key.
189    
190     All you need to do is to select the key you want to add as a desig
191     revoker. But please bear in mind that this procedure cannot be undone
192     and that this person really has the power to make your public key
193     unuseable. You really should trust the selected key, in case it is
194     not a key owned by yourself.
195    
196     @bye

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26