October 2003 PGP® Desktop for Windows User’s Guide Version Information PGP Desktop for Windows User’s Guide, version 8.0.3. Released October, 2003. Copyright Information Copyright © 1991–2003 by PGP Corporation. All Rights Reserved. No part of this document can be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, with- out the express written permission of PGP Corporation. Trademark Information PGP and Pretty Good Privacy are registered trademarks, and the PGP logo is a trademark, of PGP Corpo- ration in the U.S. and other countries. IDEA is a trademark of Ascom Tech AG. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Licensing and Patent Information The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech AG. The CAST encryption algorithm is licensed from Northern Telecom, Ltd. PGP Corporation may have patents and/or pending patent applications covering subject matter in this software or its documenta- tion; the furnishing of this software or documentation does not give you any license to these patents. Acknowledgments The compression code in PGP Desktop is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. Export Information Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau of Export Administration, United States Department of Commerce, which restrict the export and re-export of certain products and technical data. Limitations The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement provided with the software. The information in this docu- ment is subject to change without notice. PGP Corporation does not warrant that the information meets your requirements or that the information is free of errors. The information may include technical inaccu- racies or typographical errors. Changes may be made to the information and incorporated in new edi- tions of this document, if and when made available by PGP Corporation. About PGP Corporation The recognized worldwide leader in secure messaging and information storage, PGP Corporation devel- ops, markets, and supports products used by a broad installed base of enterprises, businesses, govern- ments, individuals, and cryptography experts to secure proprietary and confidential information. During the past 12 years, PGP technology has built a global reputation for open and trusted security products. PGP solutions are used by thousands of corporate/government users and millions of individual users worldwide, including many of the world’s largest and most security-sensitive enterprises, government agencies, individuals, and cryptography experts. Contact PGP Corporation at www.pgp.com. Table of Contents Introduction . .7 Who should read this User’s Guide . .7 Licensing. .7 This User’s Guide . .9 Recommended readings. .10 Symbols . .12 Chapter 1: PGP Basics. .13 Overview . .13 Conventional and public-key cryptography . .13 So what is PGP really? . .14 This user’s guide. .14 Basic steps for using PGP . .15 Chapter 2: The PGP Interface . .17 Overview . .17 Accessing PGP . .17 PGP Screens. .21 Chapter 3: Making a Keypair and Working with Public Keys . .23 Making your keypair . .23 Putting your public key on a keyserver. .25 Getting someone’s public key from a keyserver . .26 Chapter 4: Securing Email . .27 Encrypting and signing email . .27 Decrypting and verifying email . .34 PGP/MIME . .36 Table of Contents iii PGP Desktop User’s Guide Chapter 5: Securing Files . .37 Securing your files and folders with PGP . .37 Signing and decrypting files with a split key. .39 Permanently erasing files and free disk space . .39 Chapter 6: Wiping . .45 Overview . .45 Using PGP Wipe to permanently delete a file . .45 Using the Wipe Free Space Wizard to clean free disk space . .46 Scheduling folder and free space wiping . .49 Chapter 7: Self-Decrypting Archives . .53 Creating an SDA . .53 Opening an SDA . .54 Chapter 8: Securing ICQ . .55 About ICQ. .55 Exchanging public keys in ICQ . .56 Encrypting ICQ messages . .59 Chapter 9: Using Lotus Notes . .61 Overview . .61 Encrypting and signing . .61 Decrypting and verifying . .62 Chapter 10: Using Smart Cards . .65 Overview . .65 Generating a keypair on a smart card . .65 Examining smart card properties . .67 Copying your public key from a smart card to someone’s keyring. .69 Wiping keys from your smart card . .69 Copying a keypair from your keyring to a smart card . .70 iv Table of Contents User’s Guide PGP Desktop Chapter 11: PGP Disk Basics. .73 What is PGP Disk? . .73 Accessing PGPdisk . .73 Working with PGPdisk in Windows Explorer . .74 Creating a new PGPdisk volume . .75 Mounting a PGPdisk volume . .78 Using a mounted PGPdisk volume . .78 Unmounting a PGPdisk volume . .79 Chapter 12: Using PGP Disk . .81 Working with PGPdisk in a PGPdisk Editor. .81 Maintaining PGPdisk volumes . ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages184 Page
-
File Size-