8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.1.0 |
Version 0.2.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
14 |
|
|
263 |
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
264 |
|
|
265 |
@subsection Decrypt/Verify Data from the Clipboard |
@subsection Decrypt/Verify Data from the Clipboard |
266 |
|
The most common case is propably that you got a signed email and |
267 |
|
now you want to verify it. For this procedure, you have to copy |
268 |
|
the entire signature in the clipboard. The easiest way is to |
269 |
|
use CTRL+A and CTRL+C, then all available text will be copied. |
270 |
|
WinPT (GnuPG) is smart enough to figure out the signature related |
271 |
|
data. Now go to the taskbar, display the popup menu and select |
272 |
|
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, |
273 |
|
should be available on screen with all information about the |
274 |
|
signature. For example who is the signer, when was it signed |
275 |
|
how much do you try this key and what was signed and most |
276 |
|
important, the status of it (is the signature good or BAD). |
277 |
|
A special case is when you don't have the public key to verify |
278 |
|
the signature, if this happens WinPT offers to download the key |
279 |
|
from the default keyserver. If the key was not found, the procedure |
280 |
|
is aborted because without the key the sig cannot bed checked. |
281 |
|
|
282 |
@subsection Sign the Clipboard |
@subsection Sign the Clipboard |
283 |
|
We assume that text that shall be signed is already in the |
284 |
|
clipboard. If not, select the text you want to sign and copy |
285 |
|
with via CTRL+C in the clipboard. Now go to the taskbar and |
286 |
|
open the peopup menu, Clipboard->Sign. If you just have one |
287 |
|
secret key, the passphrase dialog will be automatically shown. |
288 |
|
All you need is to enter your passphrase and confirm. In case |
289 |
|
of more available secret keys, a list with all keys is shown |
290 |
|
and you can select which key shall be used for signing. |
291 |
|
The output is always a cleartext signature which is in text |
292 |
|
format. Do not try to sign binary clipboard data, the result |
293 |
|
would be unpredictable and not readable by human beings. |
294 |
|
|
295 |
|
@section The Current Window Support |
296 |
|
Compared to the clipboard mode, the CWS mode has some advantages. |
297 |
|
Let us assume that you want to extract text from an editor window. |
298 |
|
With the CWS mode, the program automatically tries to focus the |
299 |
|
window to select the text and to copy it to the clipboard and |
300 |
|
execute the selected command (Sign, Encrypt, Decrypt). |
301 |
|
No manual user interaction is needed. Except this different behaviour, |
302 |
|
it is very likewise to the clipboard mode and thus we do not describe |
303 |
|
each command again. |
304 |
|
|
305 |
@section The Key Manager |
@section The Key Manager |
306 |
|
|
475 |
take a look into the GNU Privacy Handbook. |
take a look into the GNU Privacy Handbook. |
476 |
Just a last work on Key Pairs, they are automatically marked as |
Just a last work on Key Pairs, they are automatically marked as |
477 |
"Ultimate" because the key belongs to you and you trust it implicit. |
"Ultimate" because the key belongs to you and you trust it implicit. |
|
|
|
|
@subsection Glossary |
|
|
keyid The lowest 64-bit of the fingerprint |
|
|
fingerprint Digital fingerprint whic is unique for a key |
|
|
|
|
478 |
@bye |
@bye |