Monday, February 16, 2015

Netiquette IQ Blog Of The Day - The Simplest Combination Of Programs For Email Encryption. A Great Read!


================================================================
Email privacy is a very hot topic in today's Internet community. Although the some may wish to use encryption for unsavory purposes, the vast majority of netizens have legitimate messages and data they wish to protect. This article below offers all basic users an opportunity to understand and deploy encryption for legitimate purposes.
===============================================
from stumbleupon - biotele



Step 1: The Programs Needed

This is the simplest combination of programs for encryption.


You will need windows, a Firefox browser and a Gmail account as well as GPG4Win and FireGPG.

GPG4Win does the encryption on a windows machine.
FireGPG adds encryption functionality in Gmail.
Step 2: How Encryption Works
 
Encryption is really very simple, but many people try to make it sound complicated.

Every person have a pair of keys.

Each key is a number that fits in an equation.

One key is shared with everyone, and is called the "public key".

One key is private and you hide it on your computer or on your flash disk and this is called a "private key".

The e-mail cannot be opened without using both keys.

The person sending you an encrypt e-mail must know your public key in order to encrypt it. The e-mail cannot be opened except with your private key which you only have.
Step 3: Sending Encrypted e-mail
 
If Bond wants to send Q an encrypted message he needs Q's public key.

There are three ways for Bond to get Q's public key:

1. Q can give his public key to Bond physically, like, say, on a flash disk or some other physical media. This the safest most secure method of communication. Because anybody that tries to decrypt need to know the two keys.

2. Q can e-mail his public key to bond. This is slightly less secure.

3.Q can post his public key on a server, like a keyserver or his website or even Instructables. Now one key is known to the public but the other key is unkown. This exactly half as secure as method 1.

I will post Q's public key here. It also available on the keyserver http://subkeys.pgp.net.

Q's e-mail is quartermaster007@gmail.com.

You can send me encrypted messages as practice.
 ===============================================
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki
=================================================
============================================
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================