SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
Gnu Privacy Guard
Outline
Why Privacy? 
PGP  is Pretty Good Privacy with IDEA. 
What is Gnu Privacy Guard?
Cryposystems are Mathematical. The Algos used:­
Getting Started with GnuPG.
Exploring the options.
Open PGP Specification – RFC 2440
I need your Public Key, Bob; says Alice.
GPG + Mutt.
Privacy and Security
If Privacy can be outlawed then, only outlaws will have privacy. 
– Phillip Zimmermann          

                                                             “Why I wrote PGP”
Network security problems and privacy is essentially about
 Secrecy

 Authentication

 Non Repudiation

 Integrity Control

What is GnuPrivacy Guard (GPG)?
●

●

●

●

Free Software Replacement of PGP.
It does not use the Patented IDEA Algorithm for encryption (As 
used by PGP)
Supported by German Ministry of Economics and Commerce.  
Free Software available by default under all major distros of 
Linux, FreeBSD,Solaris and other unices.
alice@hermachine$gpg ­v –version
gpg (GnuPG) 1.2.1
Copyright (C) 2002 Free Software Foundation, Inc.  ...
Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA­E, RSA­S, ELG­E, DSA, ELG
Cipher: 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), 
AES192 (S8), AES256 (S9), TWOFISH (S10)
Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3)
The Bottom line 

for any Public Key Cryptography

Public Key is for Others to use when encrypting 
messages to you and when verifying the 
signatures from you.
Private Key is used for creating signatures and for 
decrypting messages to you.
 Getting Started with GnuPG
    Generating a new keypair
        Generating a revocation certificate
    Exchanging keys
        Exporting a public key
        Importing a public key
    Encrypting and decrypting documents
    Making and verifying signatures
        Clearsigned documents
Cocepts of Ciphers
    Symmetric ciphers
●
    Public­key ciphers
●
    Hybrid ciphers
●
    Digital signatures
●
Encryption – Decryption

Plain Text

Encryption

CypherText Decryption

PlainText
Conventional CryptoGraphy
Public Key Cryptography
How GPG Works – Hybrid
Decryption in GPG
Key Management
Managing your own keypair
        Key integrity
        Adding and deleting key components
        Revoking key components
        Updating a key's expiration time
    Validating other keys on your public keyring
        Trust in a key's ownerHa
        Using trust to validate keys
    Distributing keys
A chain is only as strong as its weakest link.
Need for Message Signatures
Authenticity:
                     The From header from an email can be easily       
                      forged.
Integrity:
                     The contents of the Message could have altered    
                     from the original one before you read.
Daily use of GnuPG
    Defining your security needs
        Choosing a key size
        Protecting your private key
        Selecting expiration dates and using subkeys
        Managing your web of trust
    Building your web of trust
    Using GnuPG legally
Alice Requests Bob for Public Key
What will Bob Do?
­Follow these Instructions to generate a Public Key and parcipitate in 
secure communication with Alice.

 bob@hismachine$ gpg –gen­keys
# This will create a KeyPair for Bob, consisting of Public Key 
and his Private Key.
✔
 bob@hismachine$ gpg –list­keys                                                     
   # Just checks if his keys are present.
✔
 bob@hismachine$ gpg –output bob.publickey –armor –export 
✔

bob@hismachine                                                                                
         # Bob Exports his public key to bob.publickey(File) in ascii 
armored form.
Alice Imports Bobs Key and Sends him an Encrypted File
 Alice@hermachine $mutt                                                             
   #opens her favorite MUA, downloads and saves bobs public 
key.

 Alice@hermachine$gpg –import bob.publickey                         
  #Alice Imports the public key of bob in her king rings.

 Alice @hermachine$gpg –list­keys                                              
 #Alice checks for the presence of Bobs Key along with her key 
ring pairs.                                                                                  /* 
Alice has a document gpg.txt which she wants to send it to bob */

 Alice @ hermachine $ gpg –output gpg.txt­encrypt –encrypt 


gpg.txt –recipient bob@hismachine                                             
 # Alice has encrypted the file to gpg.txt­encrypt

Bob Receives and Gets it!
 bob@hismachine $gpg –output gpg.txt –decrypt gpg.txt­
encrypt
●
  This Command likes to verify if Bob is only trying to decrypt it 
and it prompts for his passphrase                                                      
 
●
 Bob Provides his passphrase successfully.                                     
                 
●
The file is decrypted and the original file is obtained.                    
       
●
Hurray! Bob feels delighted                                                             
          
Insecure Memory Warning
On many systems this program should be installed as setuid(root). This is 
necessary to lock memory pages. Locking memory pages prevents the 
operating system from writing them to disk and thereby keeping your 
secret keys really secret. If you get no warning message about insecure 
memory your operating system supports locking without being root. The 
program drops root privileges as soon as locked memory is allocated.
 But running the program as suid root one should be alert to the danger of 
Trojan horses. Since a Trojan horse running as superuser can damage an 
entire system. If for this reason (or any other reason) you choose not run 
GnuPG as root you can switch off the warning by setting no­secmem­
warning in ~/.gnupg/options.
PGP Key Signing Party
For establishing the web of trust and spreading the usage 
of Gnu Privacy Guard, there can be Key Signing Parties.
Steps to Follow.
➔
Each Attendee creates his key pair
➔
Notes down the Fingerprint and KeyID in some sheet 
and brings it along to the key singing party.
➔
Bring some more Identification like Voter Card, Photo 
Bank Card, Passport etc.
➔
Each other member verifies each other and notes down 
the KeyID and Fingerprint.
➔
RFC 2440
OpenPGP Message Format
Popularity of the PGP Software in Secure Communication 
led way to the Internet Draft RFC 2440 establishing 
OpenPGP message Format for Communication in the 
Internet.
GPG (expect for few options) complies with the OpenPGP 
messaging format.
General Functions
Data Element Formats
Packet Syntax,Tags,Types
Public Keys and all other algorithms needed for Secure 
KeyManagement Tools
GPA – Privacy Assistant – Gnome.
●
KGPG – Standard and comes with FC2. 
●
SeaHorse – For Gnome
●
Pgp dump – Paste your ASCII Armored key and Show the 
packets.
●
Keylookup – Utility to fetch keys from keyserver.  
Libraries
●
 Libgcrypt   
●
         A general purpose cryptographic library based on the 
code from GnuPG. It provides functions for all 
cryptographic building blocks: symmetric ciphers, hash 
algorithms, MACs, public key algorithms, large integer 
functions, random numbers and a lot of supporting 
●
References
www.gnupg.org
           FAQ
           HowTos
           Gnu Privacy Handbook
           Mailing Lists
www.pgp.com
www.google.com 
Thats all folks!
Key ID : 4C88D59C
Key Fingerprint:
6C8E 0A4A 64BF 9C70 6034  FD5A 1931 DE09 4C88 D59C
Key Server: gpg.mit.edu 

O.R.Senthil Kumaran 
Senthil_OR@Dell.com                         
 Getting Started with GnuPG
    Generating a new keypair  ­ alice% gpg ­­gen­key
        Generating a revocation certificate 
                     alice% gpg ­­output revoke.asc ­­gen­revoke <mykey>
    Exchanging keys
        Exporting a public key
                     alice% gpg ­­output alice.gpg ­­export alice@cyb.org
        Importing a public key
alice% gpg ­­import blake.gpg
   Encrypting and decrypting documents
alice% gpg ­­output doc.gpg ­­encrypt ­­recipient blake@cyb.org doc
blake% gpg ­­output doc ­­decrypt doc.gpg
    Making and verifying signatures
alice% gpg ­­output doc.sig ­­sign doc
blake% gpg ­­output doc ­­decrypt doc.sig

Contenu connexe

En vedette

En vedette (20)

Gpg Twitter
Gpg TwitterGpg Twitter
Gpg Twitter
 
Installing Gpg
Installing GpgInstalling Gpg
Installing Gpg
 
GPG Signing Git Commits
GPG Signing Git CommitsGPG Signing Git Commits
GPG Signing Git Commits
 
Handson 1 (5/6)
Handson 1 (5/6)Handson 1 (5/6)
Handson 1 (5/6)
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp
PgpPgp
Pgp
 
PGP based social network
PGP based social networkPGP based social network
PGP based social network
 
E mail security
E   mail securityE   mail security
E mail security
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
PGP and Enigmail
PGP and EnigmailPGP and Enigmail
PGP and Enigmail
 
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age""Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
Pgp
PgpPgp
Pgp
 
PGP presentation 2014
PGP presentation 2014PGP presentation 2014
PGP presentation 2014
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Pgp
PgpPgp
Pgp
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 

Similaire à Gnu Privacy Guard - Intro

Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionTanner Lovelace
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxSanjeev Kumar Jaiswal
 
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...Tom Limoncelli
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Network and information security
Network and information securityNetwork and information security
Network and information securityrithika858339
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxikirkton
 
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...Paulo Henrique
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyDmitry Baryshkov
 
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGAnkit Mehta
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Future Insights
 
PGP desk top basis lecture 002
PGP desk top basis lecture 002PGP desk top basis lecture 002
PGP desk top basis lecture 002Qaisar Ayub
 
Facts about pygame
Facts about pygameFacts about pygame
Facts about pygamealamimi983
 

Similaire à Gnu Privacy Guard - Intro (20)

Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
 
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey ManagementIntroduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
Crypto hlug
Crypto hlugCrypto hlug
Crypto hlug
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
gpg4win-for-novices-1.0.0 (1).pdf
gpg4win-for-novices-1.0.0 (1).pdfgpg4win-for-novices-1.0.0 (1).pdf
gpg4win-for-novices-1.0.0 (1).pdf
 
G43053847
G43053847G43053847
G43053847
 
Network and information security
Network and information securityNetwork and information security
Network and information security
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
 
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian Cryptography
 
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPG
 
Gpg Mswl
Gpg MswlGpg Mswl
Gpg Mswl
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
PGP desk top basis lecture 002
PGP desk top basis lecture 002PGP desk top basis lecture 002
PGP desk top basis lecture 002
 
Facts about pygame
Facts about pygameFacts about pygame
Facts about pygame
 

Plus de O. R. Kumaran

Version control with Subversion
Version control with SubversionVersion control with Subversion
Version control with SubversionO. R. Kumaran
 
Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence O. R. Kumaran
 
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on  the talent code-Hrishikesh kulkarni's and madeline wills's powerpoint file on  the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-O. R. Kumaran
 
Hg wells time-machine.
Hg wells time-machine.Hg wells time-machine.
Hg wells time-machine.O. R. Kumaran
 

Plus de O. R. Kumaran (6)

Supervised learning
Supervised learningSupervised learning
Supervised learning
 
Version control with Subversion
Version control with SubversionVersion control with Subversion
Version control with Subversion
 
Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence
 
Understanding gil
Understanding gilUnderstanding gil
Understanding gil
 
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on  the talent code-Hrishikesh kulkarni's and madeline wills's powerpoint file on  the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
 
Hg wells time-machine.
Hg wells time-machine.Hg wells time-machine.
Hg wells time-machine.
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Gnu Privacy Guard - Intro