About 371,000 results
Open links in new tab
  1. The GNU Privacy Guard

    GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; …

  2. GNU Privacy Guard - Wikipedia

    GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec 's cryptographic software suite PGP. The software is compliant with the now obsoleted [2] RFC …

  3. GPG Encryption: A Comprehensive Guide to Securing Data

    Dec 7, 2024 · This is where tools like GPG (GNU Privacy Guard) shine. In this detailed guide, we’ll delve into the underlying concepts of GPG, its connection with asymmetric encryption, …

  4. What is GPG / PGP and how do I use it? - Privex

    What is GPG / PGP and how do I use it? GnuPG (more commonly known as GPG) is an implementation of a standard known as PGP (Pretty Good Privacy). It uses a system of …

  5. GPG File - What is a .gpg file and how do I open it? - FileInfo.com

    Feb 6, 2023 · What is a GPG file? A GPG file is a file that has been encrypted by GNU Privacy Guard, also known as GnuPG or gpg. It contains a document, image, video, or other file a user …

  6. How to Use the Command 'gpg' (with Examples)

    Dec 17, 2024 · GNU Privacy Guard (GPG) is a powerful cryptographic tool that allows users to encrypt and sign data and communications. It is often used for securing emails, files, and …

  7. What Is GPG? The Complete Guide to Open-Source Encryption

    Jun 8, 2025 · A .gpg file is typically a file that has been encrypted or signed using GNU Privacy Guard. It’s essentially the original data, but scrambled in a way that only someone with the …

  8. Using GPG to Encrypt and Decrypt Files on Linux [Hands-on for Beginners]

    Jul 23, 2024 · GPG keys work by using two files, a private key and a public key. These two keys are tied to each other, and are both needed to use all of GPG’s functionality, notably …

  9. How to use GPG to encrypt and decrypt files - TechTarget

    3 days ago · Learn how GPG encryption protects your data through authenticity, integrity and nonrepudiation. This guide covers installation and symmetric and asymmetric cryptography …

  10. GPG Encryption Guide: Setup, Commands & Troubleshooting for …

    May 6, 2025 · Learn how to generate GPG keys, encrypt and decrypt files, and fix issues like missing pinentry or broken gpg-agent on Linux. A complete GPG troubleshooting and usage …