One Hat Cyber Team
Your IP :
216.73.216.115
Server IP :
194.44.31.54
Server :
Linux zen.imath.kiev.ua 4.18.0-553.77.1.el8_10.x86_64 #1 SMP Fri Oct 3 14:30:23 UTC 2025 x86_64
Server Software :
Apache/2.4.37 (Rocky Linux) OpenSSL/1.1.1k
PHP Version :
5.6.40
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
doc
/
mutt
/
Edit File:
pgp2.rc
# -*-muttrc-*- # # PGP command formats for PGP 2. # # $Id$ # # # Note: In order to be able to read your own messages, you'll have # the +encrypttoself command line parameter to the pgp_encrypt_only_command # and pgp_encrypt_sign_command variables. # # decode application/pgp set pgp_decode_command="%?p?PGPPASSFD=0; export PGPPASSFD;? cat %?p?-? %f | pgp +language=mutt +verbose=0 +batchmode -f" # verify a pgp/mime signature set pgp_verify_command="pgp +language=mutt +verbose=0 +batchmode -t %s %f" # decrypt a pgp/mime attachment set pgp_decrypt_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -f" # don't check for GnuPG decryption status codes unset pgp_check_gpg_decrypt_status_fd # create a pgp/mime signed attachment set pgp_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -abfst %?a? -u %a?" # create a pgp/mime encrypted attachment set pgp_encrypt_only_command="pgp +language=mutt +verbose=0 +batchmode -aeft %r < %f" # create a pgp/mime encrypted and signed attachment set pgp_encrypt_sign_command="PGPPASSFD=0; export PGPPASSFD; cat - %f | pgp +language=mutt +verbose=0 +batchmode -aefts %?a?-u %a? %r" # import a key into the public key ring set pgp_import_command="pgp -ka %f +language=mutt" # export a key from the public key ring set pgp_export_command="pgp -kxaf +language=mutt %r" # verify a key set pgp_verify_key_command="pgp -kcc +language=mutt %r" # read in the public key ring set pgp_list_pubring_command="mutt_pgpring -2 %r" # read in the secret key ring set pgp_list_secring_command="mutt_pgpring -s -2 %r" # pattern for good signature set pgp_good_sign="Good signature"
Simpan