KMail In Depth - page 3
Masses Of Features and No Malware
This is the condensed version; we'll cover this in detail in a future article.
WARNING: Never ever share your private key! Only your public keys.
GPG serves two functions: encrypting messages to protect them in transit, and verifying the sender. You may use either of these, or both. You need GnuPG 1.2 or newer and GnuPG Made Easy (GPGME). While you're at it, grab KGpg, a nice graphical KDE utility for managing your keys.
First generate your private/public key pair:
$ gpg --gen-key
When you enter the comment, make it something to help you differentiate this key from any others you might have, such as "default email key." You'll be using the passphrase a lot- longer is better, like a silly sentence "this is my l33t passphrase."
Next, configure KMail. Settings -> Configure KMail -> Security -> Crypto Backends. Hit the "scan" button and KMail will find "OpenGPG (gpg)". Check everything it finds. Then go to the "Warnings" and "Composing" tabs and season to taste. Now go to Settings -> Configure KMail -> Identities, select an identity, and click "Modify." Configure your "Crytography" defaults. This is where your helpful comment pays off in helping you to select the right key. Go ahead and choose keys for both signing and encryption; you will always be able to choose what you want when you compose a message.
Now you can send an encrypted message. Compose a message to yourself, then click on the little padlock at the top of the message to encrypt it, or use the Options menu. When it arrives you'll have to enter your passphrase to read it. KMail remembers the passphrase until you close it down.
Public keys are used to "lock" or encrypt a message. Then the recipient uses their private key to decode the message. So to send someone an encrypted message, you need a copy of their public key. Conversely, anyone who wants to send you an encrypted message needs your public key to encrypt it. Use KGpg for this: Keys -> Export Public Key(s) -> Email. Email it un-encrypted, of course. To import a public key use KGpg, or
$ gpg --import keyfilename
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: RHEL 6.7, BackBox Linux 4.3 and RoboLinux 8.1
- 2Linux Top 3: SLES 11 SP4, Chromixium OS 1.5 and Canonical Licensing
- 3Linux Top 3: VirtualBox 5, Point Linux 3.0 and OpenSUSE Leap 42.x
- 4Linux Top 3: Linux 4.2 rc1, 4MLinux 13 and antiX15
- 5Linux Top 3: Linux Mint Rafaela, OpenMandriva Lx 2014.2 and VectorLinux 7.1