Having difficulty finding the Windows installation of GPG

Posted on 2007-10-16
Medium Priority
Last Modified: 2008-11-18
I have finally decided to give GPG a test but can not find an explicit link for a Windows instal program.  I just end up in directories with dozens of zipped and tarred programs.  And I don't want to get the wrong one.

Could someone post a single link to an executable that I can use for Windows?

Question by:newbieweb
  • 3
LVL 32

Accepted Solution

r-k earned 1000 total points
ID: 20090269
Go to:


(click "cancel" if it asks for a password)

and get the last file on that page: GPGee-1.3.1.zip

Unzip the contents to any temp folder (there with two files, one of them named GPGeeSetup-1.3.1.exe)

The installer is the GPGeeSetup-1.3.1.exe file.

I haven't installed it but the above should work.

Assisted Solution

gtkfreak earned 1000 total points
ID: 20091026
You can try to download GPG4WIN. This contains all the associated files to setup GPG on your computer. The following are included with it.
GnuPG 1.4.7    GNU PG
GnuPG2 2.0.7  GNU PG 2
WinPT 1.2.0      
GPA 0.7.6
GPGol 0.9.92    Outlook Express Integration
GPGee 1.3.1    Windows Explorer Menu Integration
Claws Mail 3.0.0-rc2  Claws Mail email Client
Gpg4win for Novices 1.0.0  GPG4WIN manual for novices

Expert Comment

ID: 20091032
All above available at one place at http://www.gpg4win.org

Expert Comment

ID: 20091045
All avaialble there in one EXE file gpg4win-1.1.3.exe

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question