LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of go… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.
Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.
The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.
There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.
By reading this title readers will be provided with a step by step hands-on guide that includes:
To the Reader
Preface. What Is This?
What Is Cryptography?
What Can Cryptography Do?
Basic Cryptographic Functions
Does “Secret” Mean the Same as “Private”?
What OS Should I Use?
How Do I Do All This Stuff?
Introduction
Chapter 1. Using Gnu Privacy Guard
1.1 Keeping Data Secret, for a Novice GnuPG User
1.2 The Simplest Example: GnuPG Symmetric Encrypting Text
1.3 Decrypting a File (Symmetric Key)
1.4 Encrypting Interactively
1.5 ASCII Armor
1.6 Command Summary and Review
1.7 Review Questions
Chapter 2. Selected FAQs on Using GnuPG
2.1 Why Use GnuPG
2.2 Why Start with the Command Line
2.3 Why Use the Command Line
2.4 Getting to the Command Line
2.5 Is GnuPG Even Installed?
2.6 GnuPG Commands and Options
2.7 Simple Examples
2.8 Options: Getting More Information
2.9 Options: Text or Binary
2.10 Command Summary and Review
2.11 Review Questions
Chapter 3. Public Keys
3.1 Getting Someone’s Public Key
3.2 Generating a Public Key
3.3 Why Two Key Pairs?
3.4 Key Length
3.5 Key Expiration and Key Revocation
3.6 Reasons for Key Revocation
3.7 Generating a Public Key Pair, Completed
3.8 Exporting a Public Key
3.9 Command Summary and Review
3.10 Review Questions
Chapter 4. Public Key Functions
4.1 Decrypting and Verifying
4.2 Web of Trust
4.3 Encrypt and Sign
4.4 Benefits of Digital Signatures
4.5 Command Summary and Review
4.6 Review Questions
Chapter 5. More About Signatures
5.1 “Decrypting” a Digital Signature
5.2 More About Signatures
5.3 Digital Signature Types
5.4 Signing and Verifying, Summarized
5.5 Review Questions
Chapter 6. Working with Public Keys
6.1 Trusting a Public Key
6.2 Using Keyservers
6.3 Review Questions
Chapter 7. Editing and Revoking a Public Key
7.1 Editing Keys
7.2 Revoking a Key
7.3 Command Summary and Review
7.4 Review Questions
Chapter 8. Security Practices and Tips
8.1 Verifying Software Downloads
8.2 Passphrases: Doing Them Right
8.3 Dangers of RAM Cache and Other System Artifacts
8.4 Full Disk Encryption
8.5 Encrypting Your System Hard Drive FAQ
Postscript
PL
Pete Loshin, Independent Consultant