Posted on 2014-01-30
Last Modified: 2014-01-30
i Need to know what is PGP, how it works in an organization,

how to install and configure PHP .

is there any material you can recomend so i can go through
Question by:pramod1

Expert Comment

ID: 39821101
PGP IS an encryption product, that was bought by Symantec,  Symantec have re-branded it to

full disk encryption.

PHP is  a web scripting language,

Author Comment

ID: 39821119

how to install and configure PGP .

Author Comment

ID: 39821135
I think the link u gave answers it, am i right
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 35

Expert Comment

ID: 39821151
PGP and GPG (alternative to PGP) are means to encrypt data. To be honest, I'd suggest just reading the Wikipedia articles for these to get an understanding of how they work. Generally speaking, PGP is not a product by itself. There are plenty of tools that implement PGP.

Accepted Solution

BertSublime earned 500 total points
ID: 39821160
i thought that was the case,  

the following will give you a good start on install, and best practices etc.
LVL 33

Expert Comment

by:Dave Howe
ID: 39821274
PGP is of course the product name. OpenPGP is the standard, and GnuPG the open source version :)

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ASA blocks some https sites. 27 63
Top honey pots & reviews of canary 7 53
Video enhancement recommendation 7 73
Rensome / malware protection 9 69
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question