Using GnuPG keys (What/Why-TO)

Most articles on the topic start off by showing you HowTo-CREATE keys, and this is usually followed by some examples on HowTo-USE keys. The result for those of us that ain’t so clever, is utter bewilderment. Hopefully this short explanation will alleviate a little of that confusion. This article will cover the basics of GnuPG…

Creating GPG keys with YubiKey (HOWTO)

This is a LINUX version guide, based 99.99% on “Dr. Duh’s outstanding post on the topic”. I have read many such HowTo’s, and this one is, by far, the best I’ve seen (for my needs/preferences). The screens in his article contain the actual screens you’ll see when you run the commands needed. For me, that…

PGP and SSH keys (What/Why-TO)

The content below is an almost exact copy of this (brilliant) article/tutorial by Eric Severance. In hindsite, it feels like the steps followed are obvious. As a n00b13 it was confusing, since I did not grasp the underlying foundation adequately. I can/will not add anything to it – I will only change the layout to…

Password Managers

Unless you think it would be wise to actually create a TXT file that lists all of your logins/usernames/passwords, and post it on a public forum or social media site like FB, you really SHOULD be using a password manager. For a brief moment (back then), I actually believed that the slight scramble on my…