In the previous program we explained how to use the command line tools to generate encryption keys. This time we look at the GUI clients that some people may prefer. Using KGpg as an example, we can see that it does all the things we did last time on the command line.
CommentsSubscribe to the comments RSS feed.
Note to Verbose Commenters
If you can't fit everything you want to say in the comment below then you really should record a response show instead.
Note to Spammers
All comments are moderated. All links are checked by humans. We strip out all html. Feel free to record a show about yourself, or your industry, or any other topic we may find interesting. We also check shows for spam :).