WinPT or Windows Privacy Tray is frontend to the Gnu Privacy Guard (GnuPG) for the Windows platform. Released under GPL, it is compatible with OpenPGP compliant software. WinPT represents a collection of user interface tools designed to ease the use of asymmetric encryption software. Based on GnuPG, and OpenPGP-compatible, WinPT is intended for Windows users to use for everyday message signing, verification, encryption and general key management. If installation defaults are used, WinPT will then reside in the task bar tray, and on the right-click menu within Windows Explorer. A Start menu item includes launchers for a GPG commandline (console), WinPT tray, and documentation. As of January 15, 2013, latest version (1.5.3 Beta) is only compatible with GnuPG 1.4.x and not with the most recent version 2.0.x. WinPT is included in the GnuPT installer (that includes the latest version of GnuPG 1.4.x, WinPT 1.4.3 stable and WinPT latest beta.) (Wikipedia).
WIN7: Creating and using your own HTA file in winPE
More videos like this on http://www.theurbanpenguin.com : You always have to ask the question "who will be running this at the other end". If it is you then perhaps command line is OK. If you have to rely on others then helping them may be the answer. HTML Applications or, hta files, can
From playlist Windows
Introduction to TypeScript. TypeScript is an open-source programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language. Check out Dylan Israel's YouTube channel: https://www.youtube.com/channe
From playlist Tutorials
DevOps is a word used a lot these days and reading job ads it seems like it's something one person in a team does. It also looks as if I buy the right tools I'm doing DevOps, but is that it? Björn is a programmer with lots of strong opinions, weakly held. When he's not busy changing his mi
From playlist DevOps
WebAssembly: The What, Why and How
WebAssembly is a portable, size, and load-time efficient binary format for the web. It is an emerging standard being developed in the WebAssembly community group, and supported by multiple browser vendors. This talk details what WebAssembly is, the problems it is trying to solve, exciting
From playlist Talks
How to Theme Dunst Notifications
Dunst is a notification system that is primarily used for Window Managers. This is how to rice/theme them. Dunst documentation https://dunst-project.org/documentation/#NOTIFY-SEND -----💲💲 Support the Show 💲💲-- http://patreon.com/thelinuxcast github.com/mtwb47 -- Follow us 🐧🐧 -- h
From playlist Linux Tutorials
How To Use Netcat In Ethical Hacking | Session 07 | #cybersecurity
Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.
From playlist Netcat In Ethical Hacking
Netcat Tutorial - The Swiss Army Knife Of Networking - Reverse Shell
Netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature
From playlist Ethical Hacking & Penetration Testing - Complete Course
Nmap Tutorial For Beginners - 3 - Aggressive Scanning
Welcome to Nmap for beginners! Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. OS Compatibility: Linux,Windows & Mac( Pre-Installed in Kali linux,BlackArch & parrot OS) Commands used: ----------------------------- nmap --hel
From playlist Ethical Hacking & Penetration Testing - Complete Course
How To Use Netcat In Ethical Hacking | Session 04 | #cybersecurity
Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.
From playlist Netcat In Ethical Hacking
Set Theory (Part 2): ZFC Axioms
Please feel free to leave comments/questions on the video and practice problems below! In this video, I introduce some common axioms in set theory using the Zermelo-Fraenkel w/ choice (ZFC) system. Five out of nine ZFC axioms are covered and the remaining four will be introduced in their
From playlist Set Theory by Mathoma