OpenPGP

WinPT

WinPT or Windows Privacy Tray is frontend to the Gnu Privacy Guard (GnuPG) for the Windows platform. Released under GPL, it is compatible with OpenPGP compliant software. WinPT represents a collection of user interface tools designed to ease the use of asymmetric encryption software. Based on GnuPG, and OpenPGP-compatible, WinPT is intended for Windows users to use for everyday message signing, verification, encryption and general key management. If installation defaults are used, WinPT will then reside in the task bar tray, and on the right-click menu within Windows Explorer. A Start menu item includes launchers for a GPG commandline (console), WinPT tray, and documentation. As of January 15, 2013, latest version (1.5.3 Beta) is only compatible with GnuPG 1.4.x and not with the most recent version 2.0.x. WinPT is included in the GnuPT installer (that includes the latest version of GnuPG 1.4.x, WinPT 1.4.3 stable and WinPT latest beta.) (Wikipedia).

WinPT
Video thumbnail

WIN7: Creating and using your own HTA file in winPE

More videos like this on http://www.theurbanpenguin.com : You always have to ask the question "who will be running this at the other end". If it is you then perhaps command line is OK. If you have to rely on others then helping them may be the answer. HTML Applications or, hta files, can

From playlist Windows

Video thumbnail

TypeScript 101 (tutorial)

Introduction to TypeScript. TypeScript is an open-source programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language. Check out Dylan Israel's YouTube channel: https://www.youtube.com/channe

From playlist Tutorials

Video thumbnail

What Is DevOps?

DevOps is a word used a lot these days and reading job ads it seems like it's something one person in a team does. It also looks as if I buy the right tools I'm doing DevOps, but is that it? Björn is a programmer with lots of strong opinions, weakly held. When he's not busy changing his mi

From playlist DevOps

Video thumbnail

WebAssembly: The What, Why and How

WebAssembly is a portable, size, and load-time efficient binary format for the web. It is an emerging standard being developed in the WebAssembly community group, and supported by multiple browser vendors. This talk details what WebAssembly is, the problems it is trying to solve, exciting

From playlist Talks

Video thumbnail

How to Theme Dunst Notifications

Dunst is a notification system that is primarily used for Window Managers. This is how to rice/theme them. Dunst documentation https://dunst-project.org/documentation/#NOTIFY-SEND -----💲💲 Support the Show 💲💲-- http://patreon.com/thelinuxcast github.com/mtwb47 -- Follow us 🐧🐧 -- h

From playlist Linux Tutorials

Video thumbnail

How To Use Netcat In Ethical Hacking | Session 07 | #cybersecurity

Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. ​​Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.

From playlist Netcat In Ethical Hacking

Video thumbnail

Netcat Tutorial - The Swiss Army Knife Of Networking - Reverse Shell

Netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Nmap Tutorial For Beginners - 3 - Aggressive Scanning

Welcome to Nmap for beginners! Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. OS Compatibility: Linux,Windows & Mac( Pre-Installed in Kali linux,BlackArch & parrot OS) Commands used: ----------------------------- nmap --hel

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

How To Use Netcat In Ethical Hacking | Session 04 | #cybersecurity

Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. ​​Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.

From playlist Netcat In Ethical Hacking

Video thumbnail

Set Theory (Part 2): ZFC Axioms

Please feel free to leave comments/questions on the video and practice problems below! In this video, I introduce some common axioms in set theory using the Zermelo-Fraenkel w/ choice (ZFC) system. Five out of nine ZFC axioms are covered and the remaining four will be introduced in their

From playlist Set Theory by Mathoma

Related pages

Gpg4win | OpenPGP | GNU Privacy Guard | Public-key cryptography | Pretty Good Privacy | Cryptography