Completion requirements
GPG, also known as GNU privacy guard, is the successor to PGP discussed in the previous section. While watching, determine is GPG uses symmetric or asymmetric cryptography. What is a key pair, and what is the purpose of the passphrase in GPG? You can continue to watch this video to learn how to use GPG in MS Windows.
Source: https://www.youtube.com/watch?v=Fp4xv0YOb6s This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 26 July 2024, 1:40 PM