How to Encrypt GnuPG / GPG / PGP Message With Gnu Privacy Assistant

How to encrypt text with GPA In order to encrypt text, you need to first copy and paste the unencrypted text to GPA’s Clipboard. Then select Encrypt from File menu or from icon ribbon. In the dialog, select public keys which can decrypt the encrypted text. You can select multiple keys although every select key …

How To Export and Import OpenPGP Keys with Kleopatra and GPA

Exporting public keys OpenPGP public keys are as name suggests – public. You can post them in your website or include it in your email signature – although the signature might be little long after that. Exporting public key with Kleopatra Select your certificate in Kleopatra and select File > Export Certificates or Ctrl+E. Exporting …

Creating OpenPGP keys with GPA (Gnu Privacy Assistant)

When you launch the GPA first time you get the prompt suggesting key generation. If you have already made the keys, GPA opens in to the clipboard mode. You can create new keys in keyring manager (Windows > Keyring Manager). Fill out the details as requested. It is recommended to create backup of the. If …

Creating OpenPGP keys with Kleopatra

Launch the Kleopatra from start menu and select New Certificate from File menu. Next you need to choose the certificate format. OpenPGP key is compatible with Symantec (original) PGP, OpenPGP and GnuPG. In enterprise environment where there is Certificate authority servers (CA’s) and Public Key Infrastructure (PKI) there is possible to create X.509 compatible key …

How to install GnuPG / GPG (Email Encryption)

Download GnuPG client for your platform from GnuPG website. You can download GnuPG source code where you can compile the program from the source code or you can download binary release. GnuPG (GPG for short) web site has download links of binary releases for many popular operating systems. In this tutorial we are going to …

Secure Communications With Encryption

Securing modern communications in the internet require encryption. Existing electronic communication systems can be eavesdropped by a variety of parties. Examples of those parties are employers, ISPs, law enforcement agencies and national security agencies. Many of the communication systems (email, instant messaging) communicate in the internet without using any encryption or user cannot affect the …

Brute Force Dictionary Attack Against BitLocker

First of all, brute forcing BitLocker drive with adequate password is definitely a no go. Modern CPU / GPU based attack vectors will take stellar amount of time to break the encryption. But if you still want to hit your head to the wall, be my quest!

Inspecting BitLocker encrypted drive in Kali Linux

In this blog post we are inspecting the BitLocker encrypted drive we encrypted in part 2 using Kali Linux. In this tutorial we have booted the Kali Linux in Live CD/USB mode without persistent storage. We are going to use the Dislocker tool to inspect the encrypted BitLocker drive/partition. Installing the Dislocker tool Although Kali …