Running Pgp Personal Privacy - McAfee OFFICE 3.1 User Manual

Table of Contents

Advertisement

6. Decrypt and verify your email and files.
When someone sends you encrypted data, you can unscramble the
contents and verify any appended signature to make sure that the data
originated with the alleged sender and that it has not been altered.
7. Wipe files.
When you need to permanently delete a file, you can use the Wipe feature
to ensure that the file is unrecoverable. The file is immediately overwritten
so that it cannot be retrieved using disk recovery software.

Running PGP Personal Privacy

PGP works on the data generated by other applications. Therefore the
appropriate PGP functions are designed to be immediately available to you
based on the task you are performing at any given moment.There are four
primary ways to use PGP:
• From the System tray (PGPtray)
• From within supported email applications (PGP email plug-ins)
• From the Windows Explorer File menu
• From the PGPtools toolbar
If your email application is not supported by the plug-ins, you can
perform the appropriate functions from PGPtray. You can also
encrypt and sign files from PGPtools before attaching them to your
email. Encrypting ensures that only you and your intended
recipients can decipher the file's contents; signing ensures that any
tampering will be readily apparent.
If you are using an email application that is supported by the
plug-ins, you can decrypt and verify your messages by selecting the
appropriate options from your application's tool bar.
If your email application is not supported by the plug-ins, you can
copy the message to the clipboard and perform the appropriate
functions from there. If you want to decrypt and verify file
attachments, you can do so from the Windows clipboard. You can
also decrypt encrypted files stored on your computer, and verify
signed files to ensure that they have not been tampered with.
PGP Personal Privacy
User's Guide
191

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents