-----BEGIN PGP SIGNED MESSAGE----- >>> Everything above this line is not part of the original message <<< Here a 'reference card' for PGP 2.6.x. I thought this was missing in the documentation. Also some of the features were missing in the documentation, such as '-km' that displays the "web of trust". I think a lot of questions in alt.security.pgp could be answered by this. Kurt Huwig (khuwig@cs.uni-sb.de) History: Oct 6th 1995 v1.0 Modifiers: a: ASCII armor file, create a radix-64 armored file with CRC b: generate separate signature-file f: filter mode, get data from stdin and put data to stdout i: VMS only: same as 't' l: verbose output, same as +VERBOSE=2 m: encrypt: 'for you eyes only' decrypt: display file using 'more' and ask for save o: specify outputfile '-o outputfile' p: preserve filenames, restore original filename when encrypted with '-a' t: use textmode for output u: specify userid '-u userid' z: specify a password '-z password' on the command line Commands: ?: display help c: conventional encryption, with IDEA d: decrypt only, leaves signatures in the plaintext e: encrypt file h: display help k: display help for key-commands ka: add keyfile to ring kc: key check, check signatures and backup rings kd: disable/revoke key ke: edit key kg: generate a key km: maitenance pass, display web-of-trust kr: remove keys/signatures ks: sign key kv: display matching keys kvv: display matching keys and their signatures kx: extract key s: sign file w: wipe file, file is filled with 0 and then deleted works also as a modifier when encrypting, then the plaintext file is deleted Long options: b: accepts ON/OFF c: command line only n: accepts a number s: accepts a string b ARMOR: same as '-a' n ARMORLINES: limit for files, splits files when longer 0=disable split s BAKRING: filename of keyring backup, used for '-kc' bc BATCHMODE: do not ask for anything n CERT_DEPTH: how deep introducers may be nested (0-8) s CHARSET: select character set b CLEARSIG: leave signed messages as clear text s COMMENT: add a comment to all pgp files n COMPLETES_NEEDED: number of completely trusted signatures to trust a new key (1-4) b COMPRESS: compress output file if possible b ENCRYPTTOSELF: allow decryption of encrypted file by yourself also bc FORCE: force "Yes" as answer to all questions b INTERACTIVE: ask for configmation for key adds b KEEPBINARY: keep binary ciphertext files after decrypting s LANGUAGE: select language n LEGAL_KLUDGE: enable/disable compatibility to pgp-version before 2.6 bc MAKERANDOM: generate new randseed-file n MARGINALS_NEEDED: number of marginally trusted signatures to trust a new key (1-...) s MYNAME: select default userid for signatures bc NOMANUAL: generate keys without the manual installed s PAGER: pager for plaintext displaying s PUBRING: specify public key ring s RANDSEED: filename for random number seed s SECRING: specify secret key ring b SHOWPASS: display password when entered b TEXTMODE: same as '-t' s TMP: specify directory for temporary files n TZFIX: adjust timezone n VERBOSE: verbose output (0=quiet, 1=not quiet, 2=verbose) - --------------------------------------------------------------------------- I think I made myself perfectly clear: Step 1: Find plan! PGP-key on keyserver, Step 2: Save world! or finger Step 3: Get out of my house! khuwig@supercrypt.cs.uni-sb.de Let's get crackin'! pub 512/22777A49 1994/05/05 Kurt Huwig jun. Key fingerprint = BE F0 6F 36 B5 3F 78 33 1B 22 ED 08 CF 79 AF 68 pub 1024/F5780045 1994/08/19 Kurt Huwig jun. Key fingerprint = CE 1C 53 DE 56 60 DB E6 4E 2D 88 55 F0 4E 24 78 -----BEGIN PGP SIGNATURE----- Version: 2.6.2i iQCVAgUBMHSSWCmV3Zn1eABFAQHVkgP/als9SGha4XFJveNVNUre4jRDw2Nb4Tb+ Nwm/o2UXnIQGeFhrTVl0LqdXINL2eHDi1unl2FVYBa1dz3E76KtTXz+LsIofOC4M 7BV0AxK5LZf9/iqkjm0d5ZjB8MbNhPGDqMXkrLEtoo/3hvfa05FaLOpPak3SkGSu H7rHMWHx0H0= =KCGd -----END PGP SIGNATURE----- .