/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Diff of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 227 by twoaday, Wed Jun 14 06:57:57 2006 UTC revision 246 by twoaday, Tue Jul 11 08:55:57 2006 UTC
# Line 8  This file is free under the terms of the Line 8  This file is free under the terms of the
8    
9  Copyright (C) 2006 Timo Schulz  Copyright (C) 2006 Timo Schulz
10    
11  Version 0.1.0  Version 0.2.0
12    
13  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
# Line 22  step manually. Line 22  step manually.
22    
23  You need at least Windows 98/2K/XP, but Windows XP or better is  You need at least Windows 98/2K/XP, but Windows XP or better is
24  recommend. The program also works on NT/95/ME but there is no support  recommend. The program also works on NT/95/ME but there is no support
25  for these OS versions any longer.  for these OS versions any longer. Mainly because the OS vendor also
26    dropped support and no bug fixes will be provided any longer.
27    
28  @section A short Introduction  @section A short Introduction
29    
30  WinPT is a graphical GnuPG front-end which resides in the task bar.  WinPT is a graphical GnuPG front-end which resides in the task bar.
31  It is divided into several, so-called, managers. There is a manager  It is divided into several, so-called, managers. There is a manager
32  for the keyring, for files and for smart cards. The aim of the program  for the keyring, for files and for smart cards. The aim of the program
33  is to secure email communication and to perform file encryption.  is to secure email communication and to perform file encryption and
34    to allow an easy and user friendly way for key management.
35    
36  @subsection What is GnuPG  @subsection What is GnuPG
37  GnuPG is a tool for secure communication and data storage.  GnuPG is a tool for secure communication and data storage.
# Line 69  recommend to sign keys without doing thi Line 71  recommend to sign keys without doing thi
71  The fingerprint of the key is hexadecial (160-bit) sequence divided  The fingerprint of the key is hexadecial (160-bit) sequence divided
72  into 10 groups of 4 hex digits. You can get the fingerprint of a key  into 10 groups of 4 hex digits. You can get the fingerprint of a key
73  by opening the key property dialog. There you can mark the fingerprint  by opening the key property dialog. There you can mark the fingerprint
74  and copy it to the clipboard.  and copy it to the clipboard. The fingerprint of a key can be compared
75    to human fingerprints, it is unique for each key.
76    
77  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
78    
# Line 82  It is always recommend to use the latest Line 85  It is always recommend to use the latest
85  can download it from http://wald.intevation.org/projects/winpt.  can download it from http://wald.intevation.org/projects/winpt.
86  Download the zip file with the binaries inside and unpack them in  Download the zip file with the binaries inside and unpack them in
87  a folder. All files need to be in the same folder, so if you change  a folder. All files need to be in the same folder, so if you change
88  the folder don't forget to move all files.  the folder do not forget to move all files.
89  You should also download and verify the signature of the packet to  You should also download and verify the signature of the packet to
90  make sure that the release is really authentic.  make sure that the release is really authentic.
91    
# Line 142  the latter case, a folder needs to be ch Line 145  the latter case, a folder needs to be ch
145  @section The First Start  @section The First Start
146    
147  This section is only important for people who never installed  This section is only important for people who never installed
148  and/or used WinPT before.  and/or used WinPT before and thus no keyrings are available.
149    
150  When the program is started the first time, it offers two choices.  When the program is started the first time, it offers two choices.
151  The one is to generate a key pair and the other is to copy  The one is to generate a key pair and the other is to copy
# Line 152  We assume the user will select the first Line 155  We assume the user will select the first
155    
156  Now a new dialog is shown which requests some information from  Now a new dialog is shown which requests some information from
157  the user to allow a meaningful association between the key and  the user to allow a meaningful association between the key and
158  the user. If the user prefer RSA keys, the check box should be marked.  the user. If the user prefer RSA keys, the check box should be marked.
159    But this is a decision of personal taste and does not influence the security
160    or anything else.
161  If the entered data is OK, WinPT then generates a new key pair. As long  If the entered data is OK, WinPT then generates a new key pair. As long
162  as this step takes, a progress dialog is shown to indicate the  as this step takes, a progress dialog is shown to indicate the
163  enduring process. When the generation of the keypair is done, WinPT  enduring process. When the generation of the keypair is done, WinPT
# Line 162  or lost, there is no way to recover the Line 167  or lost, there is no way to recover the
167  why it is also important to store the backup, at least of the  why it is also important to store the backup, at least of the
168  secret keyring, at a @strong{safe} place.  secret keyring, at a @strong{safe} place.
169    
170    @section The Passphrase for the Secret Key
171    First a short explaination what passphrase is. A passphrase is like
172    a password but usually longer, maybe a sentence, which can consists of
173    any 7-bit ASCII characters. It is used to protect your secret key
174    and thus it is very import to chose a secure passphrase. If your
175    computer, and thus the secret key, were stolen and an attacker can
176    guess your passphrase he is able to decrypt all your data and to
177    create signatures in your name! A good passphrase is difficult
178    to guess but easy to remember and should be at least 10 characters long.
179    An easy way to generate a strong passphrase is to use a sentence only
180    you know but you can easily remind and then take the first letter of
181    each word, plus some special characters and maybe even some intentionally
182    made spelling mistakes.
183    
184    Example: Row - row - row your boat, gently down the stream
185    Passphrase: R-r-ryb,gdt
186    
187    Never write down or passphrase or share it among other people!
188    
189  @section Keyserver Access  @section Keyserver Access
190    
191  An easy way to retrieve keys is the keyserver. You can think of  An easy way to retrieve keys is the keyserver. You can think of
# Line 262  The output should contain a header and a Line 286  The output should contain a header and a
286  "BEGIN PGP MESSAGE" and "END PGP MESSAGE.  "BEGIN PGP MESSAGE" and "END PGP MESSAGE.
287    
288  @subsection Decrypt/Verify Data from the Clipboard  @subsection Decrypt/Verify Data from the Clipboard
289    The most common case is propably that you got a signed email and
290    now you want to verify it. For this procedure, you have to copy
291    the entire signature in the clipboard. The easiest way is to
292    use CTRL+A and CTRL+C, then all available text will be copied.
293    WinPT (GnuPG) is smart enough to figure out the signature related
294    data. Now go to the taskbar, display the popup menu and select
295    Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog,
296    should be available on screen with all information about the
297    signature. For example who is the signer, when was it signed
298    how much do you try this key and what was signed and most
299    important, the status of it (is the signature good or BAD).
300    A special case is when you don't have the public key to verify
301    the signature, if this happens WinPT offers to download the key
302    from the default keyserver. If the key was not found, the procedure
303    is aborted because without the key the sig cannot bed checked.
304    
305  @subsection Sign the Clipboard  @subsection Sign the Clipboard
306    We assume that text that shall be signed is already in the
307    clipboard. If not, select the text you want to sign and copy
308    with via CTRL+C in the clipboard. Now go to the taskbar and
309    open the peopup menu, Clipboard->Sign. If you just have one
310    secret key, the passphrase dialog will be automatically shown.
311    All you need is to enter your passphrase and confirm. In case
312    of more available secret keys, a list with all keys is shown
313    and you can select which key shall be used for signing.
314    The output is always a cleartext signature which is in text
315    format. Do not try to sign binary clipboard data, the result
316    would be unpredictable and not readable by human beings.
317    
318    @section The Current Window Support
319    Compared to the clipboard mode, the CWS mode has some advantages.
320    Let us assume that you want to extract text from an editor window.
321    With the CWS mode, the program automatically tries to focus the
322    window to select the text and to copy it to the clipboard and
323    execute the selected command (Sign, Encrypt, Decrypt).
324    No manual user interaction is needed. Except this different behaviour,
325    it is very likewise to the clipboard mode and thus we do not describe
326    each command again.
327    
328  @section The Key Manager  @section The Key Manager
329    
# Line 439  take a look into the GNU Privacy Handboo Line 499  take a look into the GNU Privacy Handboo
499  Just a last work on Key Pairs, they are automatically marked as  Just a last work on Key Pairs, they are automatically marked as
500  "Ultimate" because the key belongs to you and you trust it implicit.  "Ultimate" because the key belongs to you and you trust it implicit.
501    
502    @section The File Manager
503    
504    @subsection Introduction
505    The File Manager is no replacement for an Explorer Extension.
506    If you secure your files frequently and you want to do this
507    fast and easy, I suggest to install GPGee. It is a program
508    which integrates itself into the explorer and provide menu
509    entries in the context menu of files and directory. But the
510    File Manager can be very useful if you just want to decrypt
511    and/or encrypt some files without additional programs. You
512    can find the File Manager via the symbol in the taskbar,
513    right click and then "File Manager".
514    
515    @subsection An Overview of the GUI
516    First there are different ways to add (open) files in the
517    Key Manager. The easiest way is to use drag and drop to
518    add files into the File Manager. Just drag a file from the
519    explorer and drop it into the File Manager window. The second
520    way is to use File->Open. A dialog opens which is common for
521    all "File Open" operations in most Windows application. Now
522    you can select one or more files and confirm. The files will
523    be automatically added to the File Manager window. The main
524    window consists of a listview with three rows.
525    
526    The first row is the status of the file. It can be "ENCRYPTED",
527    "SIGNED", "PUBKEY", "SECKEY", "SIG" or "UNKNOWN". Dependent on
528    the file status, the File Manager offers different choices. For example
529    "SIG" enables the verify options in the (popup) menu. "UNKNOWN" is
530    the default for all plaintext files.
531    The second row is the file name. And the last row is the status of
532    the operation. It can be either "", "SUCCESS" or "FAILED". An empty status
533    means no operation was started yet. FAILED indicates that the
534    GnuPG operation failed. In this case an error message was issued before.
535    
536    Now it follows an example:
537    We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt".
538    Drag the file from the Explorer and drop it into the open File
539    Manager, the main window. The file will be added and recognized
540    as "UNKNOWN". Now we select the file and right click, a popup
541    menu is shown and we select "Encrypt". An new dialog is opened
542    which looks similar to the Clipboard Encryption dialog. Just
543    select the recipients and confirm. In contrast to clipboard encryption,
544    file encryption offers some more extra options. They are described
545    later. And hour glass will be shown as long as GnuPG takes to encrypt
546    the file. When the procedure is done, the third row should be change
547    to "SUCCESS" and the first row to "ENCRYPTED".
548    
549    @subsection General Options
550    Now we describe the general options which are possible in some
551    File Manager dialogs.
552    
553    @itemize
554    
555    @item Text Output
556    When this option is checked, the output will be encoded in ASCII armor.
557    This can be useful if the file should be transfered via email. The
558    size of the output file is larger than the usual binary output.
559    
560    @item Wipe Original
561    If this option is checked, the original file will be deleted after
562    successfull encryption. This can be useful if data should not be
563    available in plaintext any longer on a machine.
564    
565    @end itemize
566    
567  @bye  @bye

Legend:
Removed from v.227  
changed lines
  Added in v.246

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26