/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Diff of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 224 by twoaday, Sun Jun 4 10:13:20 2006 UTC revision 225 by twoaday, Tue Jun 6 13:37:59 2006 UTC
# Line 25  recommend. The program also works on NT/ Line 25  recommend. The program also works on NT/
25  for these OS versions any longer.  for these OS versions any longer.
26    
27  @section A short Introduction  @section A short Introduction
28    
29  WinPT is a graphical GnuPG front-end which resides in the task bar.  WinPT is a graphical GnuPG front-end which resides in the task bar.
30  It is divided into several, so-called, managers. There is a manager  It is divided into several, so-called, managers. There is a manager
31  for the keyring, for files and for smart cards. The aim of the program  for the keyring, for files and for smart cards. The aim of the program
# Line 94  is very easy to use with an average size Line 95  is very easy to use with an average size
95  speaking users, I recommend the light version because it does not  speaking users, I recommend the light version because it does not
96  contain the 2 German PDF manuals.  contain the 2 German PDF manuals.
97    
98    @subsection Getting the Source of the Program
99    As free software, according to the GNU General Public License,
100    WinPT also offers the source code for the program. It can be used
101    for reviews, to compile your own binary and/or to modify and/or
102    redistribute it or just to learn how it works. The source is available
103    at the same place you downloaded the binary. If not, you should
104    contact the author of the site.
105    The entire program can be build with free software; the default
106    environment is a cross-compiler hosted on a Linux box. All you
107    need is the mingw32 packages, a working autoconf environment
108    and the libs WinPT depends on (currently gpgme and libgpg-error).
109    It is also possible to build the binary with cygwin/mingw32 on
110    Windows but this environment is not actively supported and propably
111    needs adjustment of the source.
112    
113  @subsection Configure the Program  @subsection Configure the Program
114  After the installation not much of the default settings need to  After the installation not much of the default settings need to
115  be changed. If you prefer a special keyserver, it is propably a good  be changed. If you prefer a special keyserver, it is propably a good
# Line 121  the latter case, a folder needs to be ch Line 137  the latter case, a folder needs to be ch
137    
138    
139  @section The First Start  @section The First Start
140    
141  This section is only important for people who never installed  This section is only important for people who never installed
142  and/or used WinPT before.  and/or used WinPT before.
143    
# Line 143  why it is also important to store the ba Line 160  why it is also important to store the ba
160  secret keyring, at a @strong{safe} place.  secret keyring, at a @strong{safe} place.
161    
162  @section Keyserver Access  @section Keyserver Access
163    
164  An easy way to retrieve keys is the keyserver. You can think of  An easy way to retrieve keys is the keyserver. You can think of
165  it like a huge database with a lot of keys as its content. It is  it like a huge database with a lot of keys as its content. It is
166  possible to search keys by a pattern, a keyid or even a fingerprint.  possible to search keys by a pattern, a keyid or even a fingerprint.
# Line 220  to delete them or to add new entries. Ju Line 238  to delete them or to add new entries. Ju
238  item and a popup menu will be shown with ("Edit", "Remove" and "New").  item and a popup menu will be shown with ("Edit", "Remove" and "New").
239    
240  @section Using the Clipboard  @section Using the Clipboard
241    
242  A major aim from the first day was, that the program does not  A major aim from the first day was, that the program does not
243  depend on a special mailer client. For this reason it uses the  depend on a special mailer client. For this reason it uses the
244  clipboard to encrypt and/or sign data.  clipboard to encrypt and/or sign data.
# Line 244  The output should contain a header and a Line 263  The output should contain a header and a
263  @subsection Sign the Clipboard  @subsection Sign the Clipboard
264    
265  @section The Key Manager  @section The Key Manager
266    
267  This part of the program is propably most important for many users.  This part of the program is propably most important for many users.
268  It contains function to manage your keyring and to perform actions  It contains function to manage your keyring and to perform actions
269  which are required and/or useful in the OpenPGP environment.  which are required and/or useful in the OpenPGP environment.
# Line 274  To customize the parameters of the gener Line 294  To customize the parameters of the gener
294  the expert key generation. It allows you to set the public key  the expert key generation. It allows you to set the public key
295  algorithm and/or the size of the key directly.  algorithm and/or the size of the key directly.
296    
297    @item
298    Most of the list view based dialogs allow to use the right
299    mouse button, to show popup menus with available commands.
300    
301  @end itemize  @end itemize
302    
303    @subsection Create a Revocation Certificate
304    
305    It is very important to do this step early as possible. With this
306    certificate, you can revoke your entire key. The reason for this
307    can be for example, that your key is no longer used or even compromised.
308    After you generated the revoc cert, you should move it to a secure place
309    because anybody who gets access to it, can render your key unuseable.
310    
311    Just right-click on your key and select "Revoke Cert". If you do this
312    step directly after key generation, there is no need to change the
313    default values. Just select a file name and enter the passphrase.
314    The program issues a warning which should be read carefully.
315    
316  @subsection Adding a new secondary key  @subsection Adding a new secondary key
317    
318  For most users the existing keys in the key pair are enough  For most users the existing keys in the key pair are enough

Legend:
Removed from v.224  
changed lines
  Added in v.225

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26