22 |
|
|
23 |
You need at least Windows 98/2K/XP, but Windows XP or better is |
You need at least Windows 98/2K/XP, but Windows XP or better is |
24 |
recommend. The program also works on NT/95/ME but there is no support |
recommend. The program also works on NT/95/ME but there is no support |
25 |
for these OS versions any longer. |
for these OS versions any longer. Mainly because the OS vendor also |
26 |
|
dropped support and no bug fixes will be provided any longer. |
27 |
|
|
28 |
@section A short Introduction |
@section A short Introduction |
29 |
|
|
30 |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
31 |
It is divided into several, so-called, managers. There is a manager |
It is divided into several, so-called, managers. There is a manager |
32 |
for the keyring, for files and for smart cards. The aim of the program |
for the keyring, for files and for smart cards. The aim of the program |
33 |
is to secure email communication and to perform file encryption. |
is to secure email communication and to perform file encryption and |
34 |
|
to allow an easy and user friendly way for key management. |
35 |
|
|
36 |
@subsection What is GnuPG |
@subsection What is GnuPG |
37 |
GnuPG is a tool for secure communication and data storage. |
GnuPG is a tool for secure communication and data storage. |
85 |
can download it from http://wald.intevation.org/projects/winpt. |
can download it from http://wald.intevation.org/projects/winpt. |
86 |
Download the zip file with the binaries inside and unpack them in |
Download the zip file with the binaries inside and unpack them in |
87 |
a folder. All files need to be in the same folder, so if you change |
a folder. All files need to be in the same folder, so if you change |
88 |
the folder don't forget to move all files. |
the folder do not forget to move all files. |
89 |
You should also download and verify the signature of the packet to |
You should also download and verify the signature of the packet to |
90 |
make sure that the release is really authentic. |
make sure that the release is really authentic. |
91 |
|
|
145 |
@section The First Start |
@section The First Start |
146 |
|
|
147 |
This section is only important for people who never installed |
This section is only important for people who never installed |
148 |
and/or used WinPT before. |
and/or used WinPT before and thus no keyrings are available. |
149 |
|
|
150 |
When the program is started the first time, it offers two choices. |
When the program is started the first time, it offers two choices. |
151 |
The one is to generate a key pair and the other is to copy |
The one is to generate a key pair and the other is to copy |
155 |
|
|
156 |
Now a new dialog is shown which requests some information from |
Now a new dialog is shown which requests some information from |
157 |
the user to allow a meaningful association between the key and |
the user to allow a meaningful association between the key and |
158 |
the user. If the user prefer RSA keys, the check box should be marked. |
the user. If the user prefer RSA keys, the check box should be marked. |
159 |
|
But this is a decision of personal taste and does not influence the security |
160 |
|
or anything else. |
161 |
If the entered data is OK, WinPT then generates a new key pair. As long |
If the entered data is OK, WinPT then generates a new key pair. As long |
162 |
as this step takes, a progress dialog is shown to indicate the |
as this step takes, a progress dialog is shown to indicate the |
163 |
enduring process. When the generation of the keypair is done, WinPT |
enduring process. When the generation of the keypair is done, WinPT |
167 |
why it is also important to store the backup, at least of the |
why it is also important to store the backup, at least of the |
168 |
secret keyring, at a @strong{safe} place. |
secret keyring, at a @strong{safe} place. |
169 |
|
|
170 |
|
@section The Passphrase for the Secret Key |
171 |
|
First a short explaination what passphrase is. A passphrase is like |
172 |
|
a password but usually longer, maybe a sentence, which can consists of |
173 |
|
any 7-bit ASCII characters. It is used to protect your secret key |
174 |
|
and thus it is very import to chose a secure passphrase. If your |
175 |
|
computer, and thus the secret key, were stolen and an attacker can |
176 |
|
guess your passphrase he is able to decrypt all your data and to |
177 |
|
create signatures in your name! A good passphrase is difficult |
178 |
|
to guess but easy to remember and should be at least 10 characters long. |
179 |
|
An easy way to generate a strong passphrase is to use a sentence only |
180 |
|
you know but you can easily remind and then take the first letter of |
181 |
|
each word, plus some special characters and maybe even some intentionally |
182 |
|
made spelling mistakes. |
183 |
|
|
184 |
|
Example: Row - row - row your boat, gently down the stream |
185 |
|
Passphrase: R-r-ryb,gdt |
186 |
|
|
187 |
|
Never write down or passphrase or share it among other people! |
188 |
|
|
189 |
@section Keyserver Access |
@section Keyserver Access |
190 |
|
|
191 |
An easy way to retrieve keys is the keyserver. You can think of |
An easy way to retrieve keys is the keyserver. You can think of |