There are several options available for encrypting. Pgp -encrypt "Joe's file.txt" -recipient "PGP Joe" -output "Joe's test file.txt"
Pgp -encrypt "C:\Documents and Settings\PGP_Joe\Desktop\Joe's file.txt" -recipient "PGP Joe"Įxample 3 The following example will show you how to encrypt a file to a specified user, changing the name of the encrypted file using the (options) feature. Pgp -encrypt "Joe's file.txt" -recipient "PGP Joe"Įxample 2 The following example will show you how to encrypt a file located in a different directory, to a specified user. PGP Command Line will respond as follows: 0x12345678:encrypt(input).txt:encrypt Please review the following examples: Example 1 The following example will show you how to encrypt a file to a specified user. If you want to encrypt to yourself, you will need to specify your key as a recipient. Note: PGP Command Line, by default, does not encrypt to the default key. Additional modifications can be used when encrypting a file, and these will be referred to as (options) in this document. You will also need to specify a recipient, which will be referred to in this document as (user).
The file to be encrypted will be referred to in this document as (input).
Repeat for other users, computers, or groups.įor any other concerns, don't hesitate to get back to us.The file you intend to encrypt may be located in the current directory you have changed to in the command prompt, or you may specify the directory together with the file you want to encrypt. In the Name list box, select the user, computer, or group you want to configure, and then use the fields in the Permissions area to allow or deny permissions. This is useful if you type names in manually and want to make sure they're available. Name This column shows the available accounts of the currently selected domain or resource.Īdd This button adds selected names to the selection list.Ĭheck Names This button validates the user, contact, and group names entered into the selection list. SelectĮntire Directory to view all the account names in the folder. Click Look In to see a list of the current domain, trusted domains, and other resources that you can access. Look In This drop-down list box allows you to access account names from other domains. You can use the fields of this dialog box as follows: Use the Select Users, Computers, Or Groups dialog box to select the users, computers, or groups for which you want to set access permissions. This displays the Select Users, Computers, Or Groups dialog box shown in Figure 13-13.įigure 13-12: Use the Security tab to configure basic permissions for the file or folder. To set access permissions for additional users, contacts, computers, or groups, click Add. If you want to override an inherited permission, select the opposite permission. Use the Permissions list box to grant or deny access permissions. Select the user or group you want to change. You can change permissions for these users and groups by doing the following: Users or groups that already have access to the file or folder are listed in the Name list box.
In Windows Explorer, right-click the file or folder you want to work with.įrom the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab, shown in Figure 13-12. To set permissions for files and folders, follow these steps: When adding a new user or group, by default, this user or group will have Read & Execute, List Folder Contents, and Read permissions. Or if the Remove button is unavailable, the file or folder has inherited permissions from the parent folder. If the check boxes under Permissions for are shaded
Groups or users that are granted Full Control permission for a folder can delete files and subfolders within that folder, regardless of the permissions that protect the files and subfolders.