I usually encrypt files with GPG with symmetric algorithms when I have to transmit files over insecure channel: for example I encrypt backup files stored at my USB stick and I’m sure that if it’s stolen or lost my files are in safety.

Encryption without user intervention can be used when you wish to perform automatic (runs with cron) backup procedure and protect backup files.

To encrypt file /tmp/file.tgz by symmetric AES algorithm (256 is a key lenght) with one command please use the following command:

echo password | gpg --batch -q --passphrase-fd 0 --cipher-algo AES256 -c /tmp/file.tgz

Previous command will create file.tgz.gpg that can be extracted automatically by next one:

echo password | gpg --batch -q -o /tmp/file.tgz --passphrase-fd 0 --decrypt /tmp/file.tgz.gpg

 

22 Comments

 

  1. February 18, 2008  5:35 pm by thehurley Reply

    Thank you, just what I was looking for!

  2. February 4, 2010  1:43 am by Kris Wolters Reply

    Just bookmarked this blog!Glad i found it.

  3. May 25, 2010  2:04 pm by Marko Reply

    Thanks man :) this is great help ~!

  4. January 3, 2011  7:41 am by chapa3 Reply

    Ok so I am not going to be untruthful with you, I just need a backlink. Thanks for understanding!

  5. April 4, 2011  8:34 pm by Eileen Tanweer Reply

    I cant say Im in complete accordance, thanks are in order for taking the time to think of it

  6. April 27, 2011  9:18 pm by battlestar galactica cast crew Reply

    I’ve recently started a site, and the info you provide on this website has helped me a lot. Thanks for all of your time & work.

  7. April 28, 2011  12:23 pm by ghost perfume Reply

    I like what you guys are doing. Such intelligent work and reporting! Carry on with the superb works guys. I have incorporated you guys to my blogroll. I think it will improve the value of my site. :)

  8. April 28, 2011  12:43 pm by casino Reply

    Wow! This can be one of the most beneficial blogs we've ever come across on thesubject. Actually excellent article! I am also an expert in this topic therefore I can understand your hard work.

  9. April 29, 2011  4:53 pm by cheapest car insurace Reply

    Thank you for a very interesting web site. What else could I get that kind of information written in such an ideal manner? I have a mission that I am simply now running on, and I've been on the look out for such information.

  10. May 3, 2011  1:55 am by PayPal Concert Tickets Reply

    Hi there. I found your website by way of Google while looking for a related subject, your website got here up. It seems to be good. I've bookmarked it in my google bookmarks to come back later.

  11. May 8, 2011  12:00 am by 4inkjets promotional code Reply

    You, my pal, ROCK! I found just the information I already searched all over the place and just could not find it. What an ideal web-site.

  12. March 29, 2012  5:01 am by 802.11 adapter Reply

    Good post. I learn something totally new and challenging on sites I stumbleupon on a daily basis. It's always helpful to read through content from other writers and practice a little something from their sites.

  13. March 29, 2012  6:23 pm by fruit mocking party Reply

    Incredible! This blog looks just like my old one! It's on a entirely different topic but it has pretty much the same layout and design. Superb choice of colors!

  14. March 30, 2012  7:32 pm by fruit mocking party Reply

    Hi there! Do you know if they make any plugins to help with Search Engine Optimization? I'm trying to get my blog to rank for some targeted keywords but I'm not seeing very good results. If you know of any please share. Thanks!

  15. June 3, 2012  8:49 pm by softman Reply

    VERY useful! Many thanks.

  16. June 26, 2012  8:39 pm by Alex Reply

    Hi,

    For safety reasons wouldn't you want to advoid using passwords in the clear:
    gpg --output --encrypt --recipient

    http://www.gnupg.org/gph/en/manual.html#AEN111

    • June 26, 2012  8:40 pm by Alex Reply

      wow that blew out some of the text

      Take a look at that link though. You don't have to put the password in the clear.

  17. January 25, 2013  7:07 pm by danil Reply

    big thanks for this post!
    It's helpful for me!

  18. April 11, 2013  12:35 pm by Maine guy Reply

    re: Alex's comment regardiing using the password in the clear.
    The password is only stored locally, not transmitted. The original files are also stored locally. Anyone who has access to the password also has access to the original files that are being backed up. I don't see any security risk as long as the password is only used for backup.

    Excellent article. Thanks.

  19. April 27, 2013  4:26 pm by tory burch ballet flats Reply

    An expert in this specific ghost door less primary that your Mangshan is the time belonging to the pre-Qin ancient ghosts designed! Large forces in the door can not be alike! Not say the ghosting door ancestors still around is tory burch store store four disciples coming from all are back to that imaginary of characters!
    Digest these shocking piece of news I wind quickly feel let this damn door less master soul damaged the idea, after all this occasion and tory burch outlet ghost gate forged a whole lot hatred, but only two folks know, as long as the following little master off, it is no longer tory burch tote we can see! Little Lord came into the human world is tory burch tote covertly actions of one particular person, there are no people know! tory burch tote Had intended to sacrifice secretly in refining that art of Magic. If the in the Kunlun sector a lot of movement, I'm afraid will cause millions of people to kill, even when tory burch tote Shizu are difficult to pay for.

  20. April 27, 2013  4:26 pm by tory burch outlet store Reply

    Jiangdong establishing shook his head, sighed heavily, is not to observe Zhao, and sat down again. The eyes of a few dark, some lost, some restless. Zhao Xin see tory burch flats glance so sad, the hearts of tenderness today and said: Well, tory burch outlet to consider upstairs. From Jiangdong not chatting, the two one following on from the previous one went in the. Jiangdong from the stop with Zhao came to her as well as the common Suhongtu bedroom.

Leave a reply

 

Your email address will not be published.