“Security is everybody’s business. Even yours, you
lackadaisical, GUI-dependent, louts! So read carefully and learn
how you can improve your data security at the command line. In a
previous column, we learned how to create the keys for GnuPG, the
free software version of Phil Zimmerman’s Pretty Good Privacy. This
week we’ll learn how to use those GnuPG keys to create and verify
cryptographic signatures. So grab your Secret Decoder rings and
hold on tight, Crypto Kiddies: here we go back to the land of
personal cryptography…!”