25 |
for these OS versions any longer. |
for these OS versions any longer. |
26 |
|
|
27 |
@section A short Introduction |
@section A short Introduction |
28 |
|
|
29 |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
30 |
It is divided into several, so-called, managers. There is a manager |
It is divided into several, so-called, managers. There is a manager |
31 |
for the keyring, for files and for smart cards. The aim of the program |
for the keyring, for files and for smart cards. The aim of the program |
95 |
speaking users, I recommend the light version because it does not |
speaking users, I recommend the light version because it does not |
96 |
contain the 2 German PDF manuals. |
contain the 2 German PDF manuals. |
97 |
|
|
98 |
|
@subsection Getting the Source of the Program |
99 |
|
As free software, according to the GNU General Public License, |
100 |
|
WinPT also offers the source code for the program. It can be used |
101 |
|
for reviews, to compile your own binary and/or to modify and/or |
102 |
|
redistribute it or just to learn how it works. The source is available |
103 |
|
at the same place you downloaded the binary. If not, you should |
104 |
|
contact the author of the site. |
105 |
|
The entire program can be build with free software; the default |
106 |
|
environment is a cross-compiler hosted on a Linux box. All you |
107 |
|
need is the mingw32 packages, a working autoconf environment |
108 |
|
and the libs WinPT depends on (currently gpgme and libgpg-error). |
109 |
|
It is also possible to build the binary with cygwin/mingw32 on |
110 |
|
Windows but this environment is not actively supported and propably |
111 |
|
needs adjustment of the source. |
112 |
|
|
113 |
@subsection Configure the Program |
@subsection Configure the Program |
114 |
After the installation not much of the default settings need to |
After the installation not much of the default settings need to |
115 |
be changed. If you prefer a special keyserver, it is propably a good |
be changed. If you prefer a special keyserver, it is propably a good |
137 |
|
|
138 |
|
|
139 |
@section The First Start |
@section The First Start |
140 |
|
|
141 |
This section is only important for people who never installed |
This section is only important for people who never installed |
142 |
and/or used WinPT before. |
and/or used WinPT before. |
143 |
|
|
160 |
secret keyring, at a @strong{safe} place. |
secret keyring, at a @strong{safe} place. |
161 |
|
|
162 |
@section Keyserver Access |
@section Keyserver Access |
163 |
|
|
164 |
An easy way to retrieve keys is the keyserver. You can think of |
An easy way to retrieve keys is the keyserver. You can think of |
165 |
it like a huge database with a lot of keys as its content. It is |
it like a huge database with a lot of keys as its content. It is |
166 |
possible to search keys by a pattern, a keyid or even a fingerprint. |
possible to search keys by a pattern, a keyid or even a fingerprint. |
238 |
item and a popup menu will be shown with ("Edit", "Remove" and "New"). |
item and a popup menu will be shown with ("Edit", "Remove" and "New"). |
239 |
|
|
240 |
@section Using the Clipboard |
@section Using the Clipboard |
241 |
|
|
242 |
A major aim from the first day was, that the program does not |
A major aim from the first day was, that the program does not |
243 |
depend on a special mailer client. For this reason it uses the |
depend on a special mailer client. For this reason it uses the |
244 |
clipboard to encrypt and/or sign data. |
clipboard to encrypt and/or sign data. |
263 |
@subsection Sign the Clipboard |
@subsection Sign the Clipboard |
264 |
|
|
265 |
@section The Key Manager |
@section The Key Manager |
266 |
|
|
267 |
This part of the program is propably most important for many users. |
This part of the program is propably most important for many users. |
268 |
It contains function to manage your keyring and to perform actions |
It contains function to manage your keyring and to perform actions |
269 |
which are required and/or useful in the OpenPGP environment. |
which are required and/or useful in the OpenPGP environment. |
294 |
the expert key generation. It allows you to set the public key |
the expert key generation. It allows you to set the public key |
295 |
algorithm and/or the size of the key directly. |
algorithm and/or the size of the key directly. |
296 |
|
|
297 |
|
@item |
298 |
|
Most of the list view based dialogs allow to use the right |
299 |
|
mouse button, to show popup menus with available commands. |
300 |
|
|
301 |
@end itemize |
@end itemize |
302 |
|
|
303 |
|
@subsection Create a Revocation Certificate |
304 |
|
|
305 |
|
It is very important to do this step early as possible. With this |
306 |
|
certificate, you can revoke your entire key. The reason for this |
307 |
|
can be for example, that your key is no longer used or even compromised. |
308 |
|
After you generated the revoc cert, you should move it to a secure place |
309 |
|
because anybody who gets access to it, can render your key unuseable. |
310 |
|
|
311 |
|
Just right-click on your key and select "Revoke Cert". If you do this |
312 |
|
step directly after key generation, there is no need to change the |
313 |
|
default values. Just select a file name and enter the passphrase. |
314 |
|
The program issues a warning which should be read carefully. |
315 |
|
|
316 |
@subsection Adding a new secondary key |
@subsection Adding a new secondary key |
317 |
|
|
318 |
For most users the existing keys in the key pair are enough |
For most users the existing keys in the key pair are enough |