/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Diff of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 245 by twoaday, Thu Jun 29 11:18:27 2006 UTC revision 246 by twoaday, Tue Jul 11 08:55:57 2006 UTC
# Line 22  step manually. Line 22  step manually.
22    
23  You need at least Windows 98/2K/XP, but Windows XP or better is  You need at least Windows 98/2K/XP, but Windows XP or better is
24  recommend. The program also works on NT/95/ME but there is no support  recommend. The program also works on NT/95/ME but there is no support
25  for these OS versions any longer.  for these OS versions any longer. Mainly because the OS vendor also
26    dropped support and no bug fixes will be provided any longer.
27    
28  @section A short Introduction  @section A short Introduction
29    
30  WinPT is a graphical GnuPG front-end which resides in the task bar.  WinPT is a graphical GnuPG front-end which resides in the task bar.
31  It is divided into several, so-called, managers. There is a manager  It is divided into several, so-called, managers. There is a manager
32  for the keyring, for files and for smart cards. The aim of the program  for the keyring, for files and for smart cards. The aim of the program
33  is to secure email communication and to perform file encryption.  is to secure email communication and to perform file encryption and
34    to allow an easy and user friendly way for key management.
35    
36  @subsection What is GnuPG  @subsection What is GnuPG
37  GnuPG is a tool for secure communication and data storage.  GnuPG is a tool for secure communication and data storage.
# Line 83  It is always recommend to use the latest Line 85  It is always recommend to use the latest
85  can download it from http://wald.intevation.org/projects/winpt.  can download it from http://wald.intevation.org/projects/winpt.
86  Download the zip file with the binaries inside and unpack them in  Download the zip file with the binaries inside and unpack them in
87  a folder. All files need to be in the same folder, so if you change  a folder. All files need to be in the same folder, so if you change
88  the folder don't forget to move all files.  the folder do not forget to move all files.
89  You should also download and verify the signature of the packet to  You should also download and verify the signature of the packet to
90  make sure that the release is really authentic.  make sure that the release is really authentic.
91    
# Line 143  the latter case, a folder needs to be ch Line 145  the latter case, a folder needs to be ch
145  @section The First Start  @section The First Start
146    
147  This section is only important for people who never installed  This section is only important for people who never installed
148  and/or used WinPT before.  and/or used WinPT before and thus no keyrings are available.
149    
150  When the program is started the first time, it offers two choices.  When the program is started the first time, it offers two choices.
151  The one is to generate a key pair and the other is to copy  The one is to generate a key pair and the other is to copy
# Line 153  We assume the user will select the first Line 155  We assume the user will select the first
155    
156  Now a new dialog is shown which requests some information from  Now a new dialog is shown which requests some information from
157  the user to allow a meaningful association between the key and  the user to allow a meaningful association between the key and
158  the user. If the user prefer RSA keys, the check box should be marked.  the user. If the user prefer RSA keys, the check box should be marked.
159    But this is a decision of personal taste and does not influence the security
160    or anything else.
161  If the entered data is OK, WinPT then generates a new key pair. As long  If the entered data is OK, WinPT then generates a new key pair. As long
162  as this step takes, a progress dialog is shown to indicate the  as this step takes, a progress dialog is shown to indicate the
163  enduring process. When the generation of the keypair is done, WinPT  enduring process. When the generation of the keypair is done, WinPT
# Line 163  or lost, there is no way to recover the Line 167  or lost, there is no way to recover the
167  why it is also important to store the backup, at least of the  why it is also important to store the backup, at least of the
168  secret keyring, at a @strong{safe} place.  secret keyring, at a @strong{safe} place.
169    
170    @section The Passphrase for the Secret Key
171    First a short explaination what passphrase is. A passphrase is like
172    a password but usually longer, maybe a sentence, which can consists of
173    any 7-bit ASCII characters. It is used to protect your secret key
174    and thus it is very import to chose a secure passphrase. If your
175    computer, and thus the secret key, were stolen and an attacker can
176    guess your passphrase he is able to decrypt all your data and to
177    create signatures in your name! A good passphrase is difficult
178    to guess but easy to remember and should be at least 10 characters long.
179    An easy way to generate a strong passphrase is to use a sentence only
180    you know but you can easily remind and then take the first letter of
181    each word, plus some special characters and maybe even some intentionally
182    made spelling mistakes.
183    
184    Example: Row - row - row your boat, gently down the stream
185    Passphrase: R-r-ryb,gdt
186    
187    Never write down or passphrase or share it among other people!
188    
189  @section Keyserver Access  @section Keyserver Access
190    
191  An easy way to retrieve keys is the keyserver. You can think of  An easy way to retrieve keys is the keyserver. You can think of

Legend:
Removed from v.245  
changed lines
  Added in v.246

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26