SlideShare uma empresa Scribd logo
1 de 11
Encrypting emails using
Step 1:Installing Kleopatra PGP Step 2: Creating your own certificate
Step 2:Completing personal information
Step 2: Creating your passphrase
Step 3: Exporting your Certificate  and your Secret key
Step 4 : Importing  your recipient certificate from file or server
Step 5: Ataching your secret key and your certificate into email
Step 6 : Encrypting your message
Step 6: Encrypting your message
Step 7 : Sending the email
Encrypting emails using Kleopatra PGP ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Ransomware Resistance
Ransomware ResistanceRansomware Resistance
Ransomware ResistanceFlorian Roth
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptxAjaykumar967485
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Unit 2 Unit Testing
Unit 2   Unit TestingUnit 2   Unit Testing
Unit 2 Unit Testingravikhimani
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect ManagementAjay K
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | EdurekaEdureka!
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testingHadi Fadlallah
 
Unit 3 Control Flow Testing
Unit 3   Control Flow TestingUnit 3   Control Flow Testing
Unit 3 Control Flow Testingravikhimani
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 

Mais procurados (20)

Ransomware Resistance
Ransomware ResistanceRansomware Resistance
Ransomware Resistance
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
steganography
steganographysteganography
steganography
 
Password Attack
Password Attack Password Attack
Password Attack
 
Unit 2 Unit Testing
Unit 2   Unit TestingUnit 2   Unit Testing
Unit 2 Unit Testing
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | Edureka
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
 
Unit 3 Control Flow Testing
Unit 3   Control Flow TestingUnit 3   Control Flow Testing
Unit 3 Control Flow Testing
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
How to use miniedit
How to use minieditHow to use miniedit
How to use miniedit
 
Manual estimation approach for Pre-sale phase of a project
Manual estimation approach for Pre-sale phase of a projectManual estimation approach for Pre-sale phase of a project
Manual estimation approach for Pre-sale phase of a project
 
Computer security
Computer securityComputer security
Computer security
 

Mais de Lupu Cosmin

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftLupu Cosmin
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windowsLupu Cosmin
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuLupu Cosmin
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca MagnifierLupu Cosmin
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs FeedbackLupu Cosmin
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to knowLupu Cosmin
 

Mais de Lupu Cosmin (9)

CoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by MicrosoftCoSign Digital Signature trusted by Microsoft
CoSign Digital Signature trusted by Microsoft
 
lupucosmin
lupucosminlupucosmin
lupucosmin
 
Dia
DiaDia
Dia
 
Romanian keyboard layout in windows
Romanian keyboard layout in windowsRomanian keyboard layout in windows
Romanian keyboard layout in windows
 
Romanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntuRomanian keyboard layout in ubuntu
Romanian keyboard layout in ubuntu
 
Diac in ym
Diac in ymDiac in ym
Diac in ym
 
Gnome Orca Magnifier
Gnome Orca MagnifierGnome Orca Magnifier
Gnome Orca Magnifier
 
Google Docs Feedback
Google Docs FeedbackGoogle Docs Feedback
Google Docs Feedback
 
Cloud Computing -everything you want to know
Cloud Computing -everything you want to knowCloud Computing -everything you want to know
Cloud Computing -everything you want to know
 

Encrypting emails using Kleopatra PGP