How to use GPG
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=_DSa9n08_bg
Lecture Overview • In this lecture we will cover using GPG to encrypt and decrypt files using symmetric encryption followed by asymmetric encryption. Next we will add verification by digital signing a file using our private key. I will cover a number of important commands including: • Encrypting with symmetric keys - (1:02) • Decrypting with symmetric keys - (4:02) • Encrypting with asymmetric keys - (6:47) • Decrypting with asymmetric keys - (11:17) • Creating a digital signature - (12:33) • Verifying a digital signature - (14:50) • Encrypting and Signing a file - (18:37) • Decrypt and verify a signed file - (22:03) • NOTE: It is important that you follow along, that is, duplicate, what I'm while watching the video. When I demonstrate a command, you should have your Linux running, and do what I do. You can pause the video and restart it when you are ready to progress.
#############################