proxy代理   soft软件   IT 业界特快   norton 诺顿病毒库   代理列表   search FTP搜索   whois IP地理位置   blog 追求完美  
money理财   life生活   RSS聚合门户   firefox WEB浏览器   免费域名   typeset 假古文   AntiVirus 反病毒   ipcn 站点导航  

« *.ipchina.org 域名超过 2000 | Main | 挑战安全 - ssh2 & chroot »

April 13, 2004

PGP Freeware & PGP Public Key Server

版权声明:可以任意转载,转载时请务必以超链接形式标明文章原始出处和作者信息及本声明。
https://windtear.net/archives/2004/04/13/000309.html

http://www.pgpi.org/products/pgp/versions/freeware/

Freeware PGP versions

Amiga (8)
Atari (6)
BeOS (5)
EPOC (Psion etc.)
MacOS (22)
MS-DOS (9)
Newton
OS/2 (6)
PalmOS (2)
Unix (19)
Windows 2000 (5)
Windows 3.x (2)
Windows 95/98/NT (31)
Windows ME (3)
Windows XP (4)


--------------------------------------------------------------------------------
[ PGPi Home > Products > PGP > Versions > Freeware ]


http://www.pgp.com/products/freeware.html

PGP 8.0.3 Freeware for Windows
http://download.pgp.com/products/desktop/freeware/PGP803-PF-W.zip

http://www.pgpi.org/products/pgp/versions/freeware/unix/2.6.3i/download/linux/
http://www.pgpi.org/cgi/download.cgi?filename=PGPcmdln_6.5.8.Lnx_FW.rpm.tar
http://www.pgpi.org/cgi/download.cgi?filename=PGPcmdln_6.5.8.Lnx_FW.tar.gz


% host pgpkeys.mit.edu
pgpkeys.mit.edu is an alias for CRYPTONOMICON.mit.edu.
CRYPTONOMICON.mit.edu has address 18.7.14.139
% host pgp.mit.edu
pgp.mit.edu is an alias for CRYPTONOMICON.mit.edu.
CRYPTONOMICON.mit.edu has address 18.7.14.139
%

-----> http://pgp.mit.edu/

MIT PGP Public Key Server
Key Server Status: Running normally.
Help: Extracting keys / Submitting keys / Email interface / About this server / FAQ
Related Info: Information about PGP / MIT distribution site for PGP

Extract a key
Search String:
Index: Verbose Index:
Show PGP fingerprints for keys
Only return exact matches

Submit a key
Enter ASCII-armored PGP key here:

Remove a key
Search String:


Please send bug reports or problem reports to
This page is a modified version of the examples provided by
Brian LaMacchia and Marc Horowitz


-----> http://pgp.mit.edu:11371/

OpenPGP Public Key Server Commands
Extract a Key from the Server
Submit a Key to the Server

Extracting a Key
Here is how to extract a key:

Select either the "Index" or "Verbose Index" check box. The "Verbose Index" option also displays all signatures on displayed keys.

Type ID you want to search for in the "Search String" box.

Press the "Do the search!" key.

The server will return a (verbose) list of keys on the server matching the given ID. (The ID can be any valid argument to a pgp -kv(v) command. If you want to look up a key by its hexadecimal KeyID, remember to prefix the ID with "0x" .)

The returned index will have hypertext links for every KeyID, and every bracket-delimited identifier (i.e. < marc@mit.edu >). Clicking on the hypertext link will display an ASCII-armored version of the listed public key.

Index: Verbose Index:

Search String:
Show OpenPGP "fingerprints" for keys
Only return exact matches

Extract caveats:
Currently, hypertext links are only generated for the KeyID and for text found between matching brackets. (It's a common convention to put your e-mail address inside brackets somewhere in the key ID string.)

The search engine is not the same as that used by the gpg(1) or pgp(1) programs. It will return information for all keys which contain all the words in the search string. A "word" in this context is a string of consecutive alphabetic characters. For example, in the string "user@example.com", the words are "user", "example", and "com".

This means that some keys you might not expect will be returned. If there was a key in the database for "User ", this would be returned for by the above query. If you don't want to see all these extra matches, you can select "Only return exact matches", and only keys containing the specified search string will be returned.

This algorithm does not match partial words in any case. So, if you are used to specifying only part of a long name, this will no longer work.


Submitting a new key to the server
Here is how to add a key to the server's keyring:

Cut-and-paste an ASCII-armored version of your public key into the text box.

Press "Submit".

That is it! The keyserver will process your request immediately. If you like, you can check that your key exists using the extract procedure above.


Enter ASCII-armored PGP key here:


Marc Horowitz

-----> http://web.mit.edu/network/pgp.html

Welcome to the MIT Distribution Center for PGP (Pretty Good Privacy)
FLASH: PGP Freeware v6.5.8 is now available for Windows 95/98/NT/2000! and the Macintosh
PGP Freeware v6.5.8 is MacOS 7.6.1+
PGP Command Line Freeware v6.5.8 is now available for AIX/HP-UX/Linux/Solaris!
PGP Certificate Server Freeware v2.5.8 is now available for Windows NT/2000 and Solaris!

PGP® or Pretty Good Privacy® is a powerful cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.
Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling you to encrypt files stored on your computer. Version 6.5.8 also includes PGPnet - a powerful VPN client which enables secure peer-to-peer IP-based network connections - and Self-Decrypting Archives (SDAs) which allow you to exchange information securely even with those who do not have PGP.

MIT distributes PGP Freeware without cost for personal, non-commercial use. This distribution is done in cooperation with Philip Zimmermann, the original author of PGP, PGP Corporation, and with RSA Security, which licenses patents and software for one of the public-key encryption technologies on which PGP utilizes. To see a statement from Phil Zimmermann about the cryptographic integrity of PGP, please click here.

[相关文章]
http://www.smth.edu.cn/pc/pccon.php?id=10&nid=20157&s=all

本blog WWW

Posted by windtear at April 13, 2004 12:25 AM

本站使用中的任何问题,请与 windtear @ windtear.net 联系
Copyright© 1999-2024 Windtear. All rights reserved.