There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don’t want to share ...
Securing your business website with HTTPS isn't just a good idea, it's a necessity. Google Chrome now marks HTTP payment and login pages and search pages as insecure if they're not using HTTPS.
Encrypting files from the command line is simple with gpg. You can use it to encrypt and decrypt files with a password. The command gpg is part of GnuPG. GnuPG stands ...
Jack Wallen shows you how to use the open source gpg to sign documents for a cost-effective way to ensure your clients the files you send them are, in fact, from you. There may be plenty of times and ...
Most Linux users know vim as a text editor that descended from vi. It can also function as a tool for encrypting text files. In this post, we examine how this is done and how to reverse the process.
Last month I introduced the GNU Privacy Guard, a free but underutilized implementation of the OpenPGP encryption standards. GnuPG is, as you may know, extremely ...
What are Command Line Arguments and why would you use them? Command line arguments are extra commands you can use when launching a program so that the program's functionality will change. Depending on ...