All articles
Second Serie | Part 11 : Some details about keys and maths
How many times did I tell you about keys, public, private in those previous articles ?
[…] You still don’t know about it really. Let’s figure it now !
[…] This is a one-way function : …
Full TLS on 22decembre now !
This is precisely for that reason that I did the upgrade.
[…] But I finally got a certificate ! And so did I activate TLS on all my websites. It is actually reuse of my previous configuration, …
Upgrade to OpenBSD 5.7
On friday the 17th, I decided to upgrade to OpenBSD 5.7. If some of you could not reach my website this day, it was because of it !
This article (the French version of course) is a reminder to the …
Second Serie | Part 10 : GPG Conf'
Most people who send me their public key while reading « Part 4 : Create and export your keys » actually sent me a key with a slightly wrong detail : the self-signature is not safe.
For a reminder, I …
The art of Archery
Last wednesday, I made a presentation about archery at the danish school. You can watch it (in danish).
[…] Like Judo and Taekwondo could be said art.
It is about focussing yourself, walking …
Second Serie | Part 9 : Encrypt files
In the previous article, I told you about signing files.
[…] You can read also the first serie or the second one :
[…] I am now going to tell you about encrypting files. The aim is to …
Second Serie | Part 8 : Sign files
First article of this new serie.
You can see the articles of the first serie here and the following here :
[…] I am going to explain how to sign and check files. It is turning a bit technical. …
A small summary
A small summary:
[…] You have read why you should use GPG.
[…] Here, you will find instructions about the softwares to use for encrypted mail:
[…] The part about theory and logic …
Part 7 : Sign keys
This article will be the last one of this serie. You can read again the previous ones there:
[…] I wish you to be able to begin using gpg, so you need as well to sign keys, at least with your …
Part 6 : Read and write encrypted mail
Let’s go further. You will encrypt your mail. It was the first objective of this article series. Yet, there is more to come !
Did you followed the previous steps ?
[…] So, I must have …