Thank you. That handbook was exactly what I needed. On Friday 09 July 2004 11:20 am, Matt Brodeur wrote: > On Fri, Jul 09, 2004 at 10:51:54AM -0400, Michael Cortes wrote: > > I understand, that to verify the signature, or unencrypt an encrypted > > file, the receiver must have my key and/or I must have the key for an > > email/file I receive. > > I would recommend some quality time with the GNU Privacy Handbook: > http://www.gnupg.org/gph/en/manual.html > > The short answers to your questions would be: > 1. Anyone who wants to check your signature needs a copy of your > PUBLIC key. The easiest way to do this is by publishing your key to a > keyserver. As an example: > $ gpg --keyserver keyserver.kjsl.com --send-key F6AE2889 > > 2. You will need public keys for those whose signatures you want to > check, or whomever you want to encrypt messages to. To get the public > key to check, for example, this message's signature: > $ gpg --keyserver keyserver.kjsl.com --recv-keys 2cfe18a3 > > > The GPH covers all of this and much more. There are also mailing > lists specific to GPG and PGP, if you're really interested. > > -- > Matt Brodeur RHCE > MBrodeur@xxxxxxxxxxxx http://www.NextTime.com > > Don't you wish that all the people who sincerely want to help you > could agree with each other? -- Michael Cortes Fort LeBoeuf School District 34 East Ninth Street PO Box 810 Waterford PA 16441-0810 814.796.4795 AIM: cortesm67