Tags » GPG

Creating a GPG Keypair for Public-Key Encryption

GPG may be used to encrypt data and protect it from prying eyes. To use the public-key encryption method, we first need to generate a private-public keypair. 1,194 more words

Best Practices

Using GPG for Symmetric Cryptography

GPG may be used to encrypt data and protect it from prying eyes. We may either use symmetric-ciphers or the public-key cryptography method to protect our data. 416 more words

Best Practices

Stay in your lane

Having then gifts differing according to the grace that is given to us, whether prophecy, let us prophesy according to the proportion of faith; or ministry, let us wait on our ministering; or he that teacheth on teaching; or he that exhorteth, on exhortation: he that giveth, let him do it with simplicity; he that ruleth, with diligence; he that showeth mercy, with cheerful– Romans 12:6-8… 114 more words

Plug In

Abide in me, and I in you. As the branch cannot bear fruit of itself, except it abide in the vine; no more can ye, except be ye abide in me– John 15:4… 71 more words

GPG School Prayer

Father God, cover & saturate our children with the blood of Jesus. Father God place a hedge of protection over every daycare, headstart, elementary school, middle school  junior high school, high school & college in Jesus name.   237 more words

GPG Forgiveness Prayer

Take a moment and go over the list, you may want to add or modify a prayer entry. Pray over the forgiveness list. 

Ask God to forgive you for: 615 more words

How to encrypt data in Linux using gpg and open SSL

1 Introduction

Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation of our’s, encryption of our data is one of the most required tools. 2,066 more words

Home