Privacy and encryption go together like peanut butter and jelly. At the very heart of most encryption strategies is a set of keys and a key exchange. Most of you have probably already heard of PGP (Pretty Good Privacy) and are confused about GPG.
Generate a strong 4096 bit key
gpg --full-generate-key
List generated keys
gpg --list-secret-keys
Upload key to default servers
gpg --send-keys
All posts in Linux
Installation:
sudo pacman -S docker docker-compose
Add yourself to the docker group:
sudo gpasswd -a
Installing a package
sudo pacman -S
Most modern distributions still ship with Bash as the default shell. While there is absolutely nothing wrong with Bash in the slightest there is another popular kid on the block called ZSH. ZSH can do most if not all the things Bash can do but with a ton of extra features to boot. It is completely modular and can be installed and configured for low-end systems while also being able to be completely tricked out if performance is of no concern. Let's install and configure this amazing shell! sud…
If you've been wanting to try out Arch Linux on your machine but can't seem to figure out the right steps to install then this is the perfect post for you!