When using the yum installation package of the Red Hat system, one option is the gpgcheck option. When I first started learning, I disabled this option by default, recently, I finally understood how gpg uses gpg as a user's personal encryption and
Main content: GPG encryption and decryption of the basic operation and a small number of applications.
Brief introduction
Installation
Generate key Operation procedure
Some operations on keys
View Key
Export
/*************************************** ******************************* Author: Samson* Date: 04/04/2014* Test platform:* Linux ubuntu 3.2.0-58-generic-pae* GNU bash, version 4.2.39**************************************** ***************************
Modify the user ID and comments of an existing gpg key.
/********************************************************************* * Author : Samson * Date : 03/18/2015 * Test platform: * gcc (Ubuntu 4.8.2-19ubuntu1) 4.8.2 *
Modify the user ID and comment of an existing gpg key
What should I do if I want to modify the user name and comment information of a generated gpg key pair?Regenerate the key?
Modify the generated key?
It is easy to regenerate the key, but this
Modify the user ID and comment of an existing GPG key
What should I do if I want to modify the user name and comment information of a generated GPG key pair?
Regenerate the key?Modify the generated key?
It is easy to regenerate the key, but this
What is a digital signature?
Digital signature, is only the sender of information can produce a number of people can not forge a digital string, which is also the sender of information to send information authenticity of a valid proof.
Digital
Create a local YUM source in CentOS 7
The "Local YUM source" in this article includes three types: one is to directly use the CentOS CD as the local yum source, the advantage is simple and convenient, the disadvantage is that the CD software package
Referenced from: http://blog.chinaunix.net/u/19895/showart_232861.html
Linux on file encryption two ways and detailed:
First, use GnuPG to encrypt files.
GnuPG software package (Gnu privacy Guard,gnu privacy bodyguard), the name of the package is
How to Use centos6 Yum source classification for 32-bit rhel6: Linux basics 325 people read comments (0) collect reports
How to Use centos6 Yum source for 32-bit rhel6)
Http://blog.chinaunix.net/uid-24501667-id-3059325.html
(Note: When installing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.