tag:blogger.com,1999:blog-282029052024-03-13T06:43:18.091-07:00il blog di Stefano SpinucciStefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-28202905.post-23401256896989332222012-08-19T18:45:00.001-07:002012-08-28T05:47:37.939-07:00send email through gmail from command line (useful for batch files, windows task manager, remote monitoring)I wrote <b>send-mail-gmail.stex.py</b>, an open source small and simple python script to send mail through gmail from command line, via smtp.gmail.com, using TLS authentication, on port 587.<br />
<br />
Download it from <a href="http://code.google.com/p/infoarch-scripts/downloads/list">http://code.google.com/p/infoarch-scripts/downloads/list</a><br />
<br />
The python script should work in Windows, Linux, Mac and doesn't need any other program/server, etc.<br />
<br />
In the download package you'll find also a batch file to send scheduled mail from the Windows Task Manager (I had problems executing directly from Task Manager the python script with arguments).<br />
<br />
<br />
<br />
Script history :<br />
I tried to use the cygwin "email" program without installing a MTA, with no success, then I searched for a python solution and I found the page <a href="http://www.daniweb.com/software-development/python/code/380881/python-3-and-python-2-send-email-through-gmail">http://www.daniweb.com/software-development/python/code/380881/python-3-and-python-2-send-email-through-gmail</a>, that inspired me to write this script.<br />
<br />
Other solutions to send mail from command line (not tested) :<br />
<ul>
<li>blat (opensource, for windows) <a href="http://www.blat.net/">http://www.blat.net/</a> </li>
<li>mailsend standalone linux/win/osx program <a href="http://www.muquit.com/muquit/software/mailsend/mailsend.html">http://www.muquit.com/muquit/software/mailsend/mailsend.html</a>
</li>
<li>using email program and cygwin
<a href="http://emacsworld.blogspot.it/2012/01/sending-emails-with-attachments-from.html">http://emacsworld.blogspot.it/2012/01/sending-emails-with-attachments-from.html</a></li>
<li>using email and cygwin, again
<a href="http://teknowfile.blogspot.it/2012/01/monitoring-lenovo-thinkserver-with-help.html">http://teknowfile.blogspot.it/2012/01/monitoring-lenovo-thinkserver-with-help.html</a></li>
</ul>
<div>
<br /></div>
Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-77783276743029508662011-09-21T10:54:00.000-07:002011-09-22T08:59:33.410-07:00How to install in multiboot Win XP on a Windows Vista machine hiding partitions between OS and resolving the problem of Win XP Installed on drive DHow to install in multiboot Win XP on a Windows Vista machine (then, installing XP after Vista), hiding partitions and resolving the problem of Windows XP Installed on drive D (tested on an Acer Extensa 5620)<br /><br /><span style="font-style:italic;">Come installare in multiboot Win XP su una macchina Windows Vista (quindi, installando XP dopo Vista), nascondendo le partizioni e risolvendo il problema di Windows XP installato sul drive D (testato su un Acer Extensa 5620)</span><br /><br /><span style="font-weight:bold;">0) backup all your valuable data and read all the istructions before starting.</span> if you aren't a braveheart and want something more simple but less useful (i.e. Win XP 'll be installed in the D drive) follow other tutorials as <a href="http://www.howtogeek.com/howto/windows-vista/install-windows-xp-on-your-pre-installed-windows-vista-computer/">http://www.howtogeek.com/howto/windows-vista/install-windows-xp-on-your-pre-installed-windows-vista-computer/</a><br /><br /><br /><span style="font-weight:bold;">*) boot Windows Vista</span><br /><br /><span style="font-weight:bold;">1) Create free space for Windows XP with GParted</span><br />1.1) download it from <a href="http://gparted.sourceforge.net/download.php">http://gparted.sourceforge.net/download.php</a><br />1.2) create a live usb with Tuxboot <a href="http://gparted.sourceforge.net/liveusb.php#windows-method-a">http://gparted.sourceforge.net/liveusb.php#windows-method-a</a><br />1.3) reboot<br />1.4) run a live usb with GParted<br />1.5) reduce the space of Vista<br />1.6) create a partition for XP (10gb are ok)<br />1.7) format the space for XP as FAT32 (don't worry, the space 'll be reformatted by XP)<br /><br /><span style="font-weight:bold;">*) reboot in Vista</span><br /><br /><span style="font-weight:bold;">2) remaster a Win XP install disk with nLite adding the required drivers</span><br />2.1) download nLite from <a href="http://www.nliteos.com/download.html">http://www.nliteos.com/download.html</a><br />2.2) download the driver AHCI_Intel_v7.5.0.1017_Vista_XP.zip and Chipset_Intel965_v8.2.0.1012_Vista_XP.zip from <a href="ftp://ftp.support.acer-euro.com/notebook/extensa_5620/driver/">ftp://ftp.support.acer-euro.com/notebook/extensa_5620/driver/</a><br />2.3) unzip the AHCI driver, and unpack (not install) it with the command line "setup.exe -a -pc:\"<br />2.4) unzip the Chipset driver, and unpack (not install) it with 7zip<br />2.5) check what controller you have from System Preferences<br />2.6) remaster the Win XP cd adding the two drivers, and create with nLive a new cd<br /><br /><span style="font-weight:bold;">3) update with the last BIOS</span><br />3.1) download it from <a href="http://support.acer-euro.com/drivers/notebook/ex_5620.html">http://support.acer-euro.com/drivers/notebook/ex_5620.html</a><br />3.2) install running the command "CLB-121.EXE" as administrator<br />3.3) reboot and check if the hard drive is in AHCI mode (if not, set it)<br /><br /><span style="font-weight:bold;">4) install Plop Boot Manager</span><br />4.1) Download Plop from <a href="http://download.plop.at/files/bootmngr/plpbt-5.0.13.zip">http://download.plop.at/files/bootmngr/plpbt-5.0.13.zip</a><br />4.2) install it following the instructions "7. Harddisk install using the Windows boot menu (NT, 2K, XP, VISTA, Win7)" ( <a href="http://www.plop.at/en/bootmanager.html#wininst">http://www.plop.at/en/bootmanager.html#wininst</a> ). Following the instructions, to execute the program "InstallToMBR" as Administrator, open CMD as admin (START > cmd + CTRL + SHIFT + ENTER) and then run the program from the command line.<br />4.3) reboot <br />4.4) create in Plop a profile for Windows Vista and XP (hiding Windows XP to Vista and hiding Vista to XP) following the instructions "22. Windows XP and Windows Vista dual boot with hidden (cleared) partitions" ( <a href="http://www.plop.at/en/bootmanager.html#ex1">http://www.plop.at/en/bootmanager.html#ex1</a> )<br />4.5) activate in Plop the Win XP profile<br />4.6) reboot with CTRL + ALT + CANC<br /><br /><span style="font-weight:bold;">5) install Windows XP from cd</span><br /><br /><span style="font-weight:bold;">6) reboot with Windows Vista CD and restore MBR</span><br />6.1) open the command prompt<br />6.2) launch the command "BOOTREC.EXE /FixMbr"<br />6.3) launch the command "BOOTREC.EXE /FixBoot"<br /><br /><span style="font-weight:bold;">7) recover hidden Vista partition with TestDisk</span><br />7.1) run live Ubuntu ( <a href="http://www.ubuntu.com/download/ubuntu/download">http://www.ubuntu.com/download/ubuntu/download</a> ) from an usb key<br />7.2) install the package TestDisk ( <a href="http://www.cgsecurity.org/wiki/TestDisk">http://www.cgsecurity.org/wiki/TestDisk</a> ) : "sudo apt-get install testdisk"<br />7.3) run TestDisk : "sudo testdisk"<br />7.4) recover the partition with the sequence : > Create Log > select the disk > partition type INTEL > ANALYSE > QUICK SEARCH > set active partition with LEFT + ENTER to continue > WRITE<br /><br /><span style="font-weight:bold;">*) boot Vista</span><br /><br /><span style="font-weight:bold;">8) repeat the step 4) from 4.2) to 4.4)</span><br /><br /><span style="font-weight:bold;">9) End, all right, all installed, no damage (maybe ;-) !!!</span>Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-23802124706809291042011-07-11T10:22:00.000-07:002011-09-13T09:52:12.076-07:00Novatel MiFi 2352 firmwareHo scoperto questo fantastico prodotto, acquistato in offerta dalla Vodafone a 29 euro compresi 3 mesi di internet...<br /><br />per acquistare direttamente l'articolo sbrandizzato buttate un occhio sul sito Multiplex Systems ( <a href="http://store.mpxsys.com/">http://store.mpxsys.com/</a> ), che fornisce anche firmware aggiornati ovviamente no brand !!! ( <a href="http://store.mpxsys.com/novatel-wireless-hspa-mifi-faq">http://store.mpxsys.com/novatel-wireless-hspa-mifi-faq</a> ).<br /><br />aggiornare il firmare permette di superare il limite di 3 connessioni simultanee imposto dalla Vodafone, di settare in maniera stabile la connessione in 3G o GPRS, e altro ancora.<br /><br />se volete cercare il firmware in giro su internet, fate attenzione a non scaricare fake o versioni contraffatte, manomesse con virus o altro malware.<br />per vostra info, un firmware valido è quello che si chiama 20418764_MUU_MiFi23x2_FW5.26.2_ML3.00.57_NvtlGeneric_v1.2_pkg.exe e che ha per hash md5 7EFA29BA99F81EC46CA260875E43D9A2 e sha256 D2F66D39A4595E403AB6C146D311774CC4D398A4314670AD32D28293D635550E .<br /><br /><br />buona navigazione !!!Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-14594627782057516172011-04-19T15:35:00.000-07:002011-04-19T15:38:09.295-07:00Appunti crittografati (aka file di testo crittografati, note sicure, notepad - editor di testo crittografato)Vedi post <a href="http://virgo977virgo.blogspot.com/2011/04/appunti-crittografati-aka-encrypted.html">Appunti crittografati (aka file di testo crittografati, note sicure, notepad - editor di testo crittografato)</a>Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-55843786332950441382011-04-17T03:12:00.001-07:002011-04-17T13:08:02.419-07:00Appunti crittografati (aka file di testo crittografati, note sicure, notepad - editor di testo crittografato)Con l'ultima versione dell'editor libero <a href="http://en.wikipedia.org/wiki/Vim_(text_editor)">VIM</a> (per Linux, Windows, OsX), la 7.3, è possibile con facilità e senza bisogno di altri programmi, avere le proprie note crittografate con il potente algoritmo Blowfish (<a href="http://it.wikipedia.org/wiki/Blowfish">http://it.wikipedia.org/wiki/Blowfish</a>).<br /><br />VIM è un programma che funziona da DOS o con una interfaccia grafica. I tasti e le sue logiche di funzionamento sono un po' diverse dal normale (come, ad esempio, succede per Emacs), ma per un power user che vuole crittografare le proprie note questo non è certo un problema...<br /><br />Dopo aver scaricato e installato VIM (vedi links sotto), per avere la propria nota crittografata con Blowfish e non con la crittografia standard di VIM (più fragile, ma di contro più facile da recuperare se si perde la password), la sequenza di comandi è la seguente:<br />0) lanciare VIM (programma gvim.exe)<br />1) digitare ":setlocal cm=blowfish" per impostare la crittografia più sicura<br />2) digitare ":X" e impostare la password utilizzata per i prossimi salvataggi sicuri digitandola due volte<br />3) digitare "i" per iniziare l'inserimento del testo siuro<br />4) premere il tasto ESC per uscire dalla modalità inserimento<br />5) digitare ":w NomeDelVostroFile.txt"<br />6) digitare ":q" per uscire da VIM<br />--- per riaprire il file crittografato<br />0) lanciare VIM (programma gvim.exe)<br />1) digitare ":o NomeDelVostroFile.txt" per aprire il file<br />2) inserire la password per il file<br />3) a questo punto editate liberamente il file, aiutandovi anche con le guide rapide (cheatsheets) per VIM indicate sotto nei links<br /><br /><br />PS<br />il file di testo protetto creato con VIM, se aperto con altri programmi, si mostrerà con un file tipo il seguente, nel quale il testo crittografato non si vede, ma si comprende che si tratta di un file crittografato da VIM, perché i primi caratteri sono "VimCrypt" e di seguito c'è l'indicazione dell'algoritmo di protezione utilizzato, nel nostro caso "~02", che è quello più sicuro, a differenza di quello standard meno sicuro che è indicato con "~01".<br /><br /> VimCrypt~02! ÒÜÓ"üø´Òá…ÇâA x«åôæ|º,¾äï´§ Ù<br /><br /><br />Links<br />* homepage VIM <a href="http://www.vim.org/">http://www.vim.org/</a><br />* download versione per Windows <a href="http://www.vim.org/download.php#pc">http://www.vim.org/download.php#pc</a> . scaricare la versione che si installa automaticamente "Self-installing executable", o la versione portable composta di due files "GUI executable" + "Runtime files" da decomprimere nella stessa directory<br />* alcune cheatsheet (guide rapide ai tasti di VIM) <a href="http://www.viemu.com/vi-vim-cheat-sheet.gif">http://www.viemu.com/vi-vim-cheat-sheet.gif</a> <a href="http://www.gentoo.org/images/vicheat-final.png">http://www.gentoo.org/images/vicheat-final.png</a>Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-20985852665651021402009-09-10T04:03:00.000-07:002011-04-17T13:11:22.254-07:00EasyPG Assistant User's Manual - Emacs 23.1Being difficult to find it online I decided to extract and publish the <i>EasyPG Assistant User's Manual</i> found within the package of Emacs 23.1.<br /><br /><br />References:<br />- <a href="http://epg.sourceforge.jp/">http://epg.sourceforge.jp/</a><br />- <a href="http://www.emacswiki.org/emacs/EasyPG">http://www.emacswiki.org/emacs/EasyPG</a><br />- <a href="http://www.gnu.org/software/emacs/">http://www.gnu.org/software/emacs/</a><br /><br /><br /><a name='more'></a><br /><br />Index:<br /><a href="#Overview">1 Overview</a><br /><a href="#Quickstart">2 Quick start</a><br /><a href="#Commands">3 Commands</a><br /><a href="#Keymanagement">3.1 Key management</a><br /><a href="#Cryptographicoperationsonregions">3.2 Cryptographic operations on regions</a><br /><a href="#Cryptographicoperationsonfiles">3.3 Cryptographic operations on files</a><br /><a href="#Diredintegration">3.4 Dired integration</a><br /><a href="#Mailmodeintegration">3.5 Mail-mode integration</a><br /><a href="#Encryptingdecryptinggpgfiles">3.6 Encrypting/decrypting *.gpg files</a><br /><br /><br />This is ../../info/epa, produced by makeinfo version 4.11 from epa.texi.<br /><br />This file describes EasyPG Assistant 1.0.0.<br /><br /> Copyright (C) 2007, 2008, 2009 Free Software Foundation, Inc.<br /><br /> Permission is granted to copy, distribute and/or modify this<br /> document under the terms of the GNU Free Documentation License,<br /> Version 1.3 or any later version published by the Free Software<br /> Foundation; with no Invariant Sections, with the Front-Cover texts<br /> being "A GNU Manual," and with the Back-Cover Texts as in (a)<br /> below. A copy of the license is included in the section entitled<br /> "GNU Free Documentation License" in the Emacs manual.<br /><br /> (a) The FSF's Back-Cover Text is: "You have the freedom to copy and<br /> modify this GNU manual. Buying copies from the FSF supports it in<br /> developing GNU and promoting software freedom."<br /><br /> This document is part of a collection distributed under the GNU<br /> Free Documentation License. If you want to distribute this<br /> document separately from the collection, you can do so by adding a<br /> copy of the license to the document, as described in section 6 of<br /> the license.<br /><br />INFO-DIR-SECTION Emacs<br />START-INFO-DIR-ENTRY<br />* EasyPG Assistant: (epa). An Emacs user interface to GNU Privacy Guard.<br />END-INFO-DIR-ENTRY<br /><br />File: epa, Node: Top, Next: Overview, Up: (dir)<br /><br />EasyPG Assistant user's manual<br />******************************<br /><br />EasyPG Assistant is an Emacs user interface to GNU Privacy Guard<br />(GnuPG, *note Top: (gnupg)Top.).<br /><br /> EasyPG Assistant is a part of the package called EasyPG, an<br />all-in-one GnuPG interface for Emacs. EasyPG also contains the library<br />interface called EasyPG Library.<br /><br /> This file describes EasyPG Assistant 1.0.0.<br /><br /> Copyright (C) 2007, 2008, 2009 Free Software Foundation, Inc.<br /><br /> Permission is granted to copy, distribute and/or modify this<br /> document under the terms of the GNU Free Documentation License,<br /> Version 1.3 or any later version published by the Free Software<br /> Foundation; with no Invariant Sections, with the Front-Cover texts<br /> being "A GNU Manual," and with the Back-Cover Texts as in (a)<br /> below. A copy of the license is included in the section entitled<br /> "GNU Free Documentation License" in the Emacs manual.<br /><br /> (a) The FSF's Back-Cover Text is: "You have the freedom to copy and<br /> modify this GNU manual. Buying copies from the FSF supports it in<br /> developing GNU and promoting software freedom."<br /><br /> This document is part of a collection distributed under the GNU<br /> Free Documentation License. If you want to distribute this<br /> document separately from the collection, you can do so by adding a<br /> copy of the license to the document, as described in section 6 of<br /> the license.<br /><br />* Menu:<br /><br />* Overview::<br />* Quick start::<br />* Commands::<br /><br />File: epa, Node: Overview, Next: Quick start, Prev: Top, Up: Top<br /><br /><a name="Overview">1 Overview</a> <br />**********<br /><br />EasyPG Assistant provides the following features.<br /><br /> * Key management.<br /><br /> * Cryptographic operations on regions.<br /><br /> * Cryptographic operations on files.<br /><br /> * Dired integration.<br /><br /> * Mail-mode integration.<br /><br /> * Automatic encryption/decryption of *.gpg files.<br /><br />File: epa, Node: Quick start, Next: Commands, Prev: Overview, Up: Top<br /><br /><a name="Quickstart">2 Quick start</a> <br />*************<br /><br />EasyPG Assistant commands are prefixed by `epa-'. For example,<br /><br /> * To browse your keyring, type `M-x epa-list-keys'<br /><br /> * To create a cleartext signature of the region, type `M-x<br /> epa-sign-region'<br /><br /> * To encrypt a file, type `M-x epa-encrypt-file'<br /><br /> EasyPG Assistant provides several cryptographic features which can be<br />integrated into other Emacs functionalities. For example, automatic<br />encryption/decryption of `*.gpg' files.<br /><br /> To install these features, do `C-u 1 M-x epa-mode'. It can also be<br />turned on by customize. Try `M-x customize-variable epa-mode'.<br /><br />File: epa, Node: Commands, Prev: Quick start, Up: Top<br /><br /><a name="Commands">3 Commands</a> <br />**********<br /><br />This chapter introduces various commands for typical use cases.<br /><br />* Menu:<br /><br />* Key management::<br />* Cryptographic operations on regions::<br />* Cryptographic operations on files::<br />* Dired integration::<br />* Mail-mode integration::<br />* Encrypting/decrypting *.gpg files::<br /><br />File: epa, Node: Key management, Next: Cryptographic operations on regions, Up: Commands<br /><br /><a name="Keymanagement">3.1 Key management</a> <br />==================<br /><br />Probably the first step of using EasyPG Assistant is to browse your<br />keyring. `M-x epa-list-keys' is corresponding to `gpg --list-keys'<br />from the command line.<br /><br /> -- Command: epa-list-keys name mode<br /> Show all keys matched with NAME from the public keyring.<br /><br />The output looks as follows.<br /><br /> u A5B6B2D4B15813FE Daiki Ueno <ueno@unixuser.org><br /><br />A character on the leftmost column indicates the trust level of the<br />key. If it is `u', the key is marked as ultimately trusted. The<br />second column is the key ID, and the rest is the user ID.<br /><br /> You can move over entries by <tab>. If you type <ret> or click<br />button1 on an entry, you will see more detailed information about the<br />key you selected.<br /><br /> u Daiki Ueno <ueno@unixuser.org><br /> u A5B6B2D4B15813FE 1024bits DSA<br /> Created: 2001-10-09<br /> Expires: 2007-09-04<br /> Capabilities: sign certify<br /> Fingerprint: 8003 7CD0 0F1A 9400 03CA 50AA A5B6 B2D4 B158 13FE<br /> u 4447461B2A9BEA2D 2048bits ELGAMAL_E<br /> Created: 2001-10-09<br /> Expires: 2007-09-04<br /> Capabilities: encrypt<br /> Fingerprint: 9003 D76B 73B7 4A8A E588 10AF 4447 461B 2A9B EA2D<br /><br />To browse your private keyring, use `M-x epa-list-secret-keys'.<br /><br /> -- Command: epa-list-secret-keys name<br /> Show all keys matched with NAME from the private keyring.<br /><br />In `*Keys*' buffer, several commands are available. The common use<br />case is to export some keys to a file. To do that, type `m' to select<br />keys, type `o', and then supply the filename.<br /><br /> Below are other commands related to key management. Some of them<br />take a file as input/output, and others take the current region.<br /><br /> -- Command: epa-insert-keys keys<br /> Insert selected KEYS after the point. It will let you select keys<br /> before insertion. By default, it will encode keys in the OpenPGP<br /> armor format.<br /><br /> -- Command: epa-import-keys file<br /> Import keys from FILE to your keyring.<br /><br /> -- Command: epa-import-keys-region start end<br /> Import keys from the current region between START and END to your<br /> keyring.<br /><br /> -- Command: epa-import-armor-in-region start end<br /> Import keys in the OpenPGP armor format in the current region<br /> between START and END. The difference from<br /> `epa-import-keys-region' is that `epa-import-armor-in-region'<br /> searches armors in the region and applies `epa-import-keys-region'<br /> to each of them.<br /><br /> -- Command: epa-delete-keys allow-secret<br /> Delete selected keys. If ALLOW-SECRET is non-`nil', it also<br /> delete the secret keys.<br /><br />File: epa, Node: Cryptographic operations on regions, Next: Cryptographic operations on files, Prev: Key management, Up: Commands<br /><br /><a name="Cryptographicoperationsonregions">3.2 Cryptographic operations on regions</a> <br />=======================================<br /><br /> -- Command: epa-decrypt-region start end<br /> Decrypt the current region between START and END. It replaces the<br /> region with the decrypted text.<br /><br /> -- Command: epa-decrypt-armor-in-region start end<br /> Decrypt OpenPGP armors in the current region between START and<br /> END. The difference from `epa-decrypt-region' is that<br /> `epa-decrypt-armor-in-region' searches armors in the region and<br /> applies `epa-decrypt-region' to each of them. That is, this<br /> command does not alter the original text around armors.<br /><br /> -- Command: epa-verify-region start end<br /> Verify the current region between START and END. It sends the<br /> verification result to the minibuffer or a popup window. It<br /> replaces the region with the signed text.<br /><br /> -- Command: epa-verify-cleartext-in-region<br /> Verify OpenPGP cleartext blocks in the current region between<br /> START and END. The difference from `epa-verify-region' is that<br /> `epa-verify-cleartext-in-region' searches OpenPGP cleartext blocks<br /> in the region and applies `epa-verify-region' to each of them.<br /> That is, this command does not alter the original text around<br /> OpenPGP cleartext blocks.<br /><br /> -- Command: epa-sign-region start end signers type<br /> Sign the current region between START and END. By default, it<br /> creates a cleartext signature. If a prefix argument is given, it<br /> will let you select signing keys, and then a signature type.<br /><br /> -- Command: epa-encrypt-region start end recipients sign signers<br /> Encrypt the current region between START and END. It will let you<br /> select recipients. If a prefix argument is given, it will also<br /> ask you whether or not to sign the text before encryption and if<br /> you answered yes, it will let you select the signing keys.<br /><br />File: epa, Node: Cryptographic operations on files, Next: Dired integration, Prev: Cryptographic operations on regions, Up: Commands<br /><br /><a name="Cryptographicoperationsonfiles">3.3 Cryptographic operations on files</a> <br />=====================================<br /><br /> -- Command: epa-decrypt-file file<br /> Decrypt FILE.<br /><br /> -- Command: epa-verify-file file<br /> Verify FILE.<br /><br /> -- Command: epa-sign-file file signers type<br /> Sign FILE. If a prefix argument is given, it will let you select<br /> signing keys, and then a signature type.<br /><br /> -- Command: epa-encrypt-file file recipients<br /> Encrypt FILE. It will let you select recipients.<br /><br />File: epa, Node: Dired integration, Next: Mail-mode integration, Prev: Cryptographic operations on files, Up: Commands<br /><br /><a name="Diredintegration">3.4 Dired integration</a> <br />=====================<br /><br />EasyPG Assistant extends Dired Mode for GNU Emacs to allow users to<br />easily do cryptographic operations on files. For example,<br /><br /> M-x dired<br /> (mark some files)<br /> : e (or M-x epa-dired-do-encrypt)<br /> (select recipients by 'm' and click [OK])<br /><br />The following keys are assigned.<br /><br />`: d'<br /> Decrypt marked files.<br /><br />`: v'<br /> Verify marked files.<br /><br />`: s'<br /> Sign marked files.<br /><br />`: e'<br /> Encrypt marked files.<br /><br /><br />File: epa, Node: Mail-mode integration, Next: Encrypting/decrypting *.gpg files, Prev: Dired integration, Up: Commands<br /><br /><a name="Mailmodeintegration">3.5 Mail-mode integration</a> <br />=========================<br /><br />EasyPG Assistant provides a minor mode to help user compose inline PGP<br />messages. Inline PGP is sending the OpenPGP blobs directly inside a<br />mail message and it is not recommended and you should consider to use<br />PGP/MIME. See Mm'kay?.<br /><br />The following keys are assigned.<br /><br />`C-c C-e d'<br /> Decrypt OpenPGP armors in the current buffer.<br /><br />`C-c C-e v'<br /> Verify OpenPGP cleartext signed messages in the current buffer.<br /><br />`C-c C-e s'<br /> Compose a signed message from the current buffer.<br /><br />`C-c C-e e'<br /> Compose an encrypted message from the current buffer. By default<br /> it tries to build the recipient list from `to', `cc', and `bcc'<br /> fields of the mail header. To include your key in the recipient<br /> list, use `encrypt-to' option in `~/.gnupg/gpg.conf'.<br /><br /><br />File: epa, Node: Encrypting/decrypting *.gpg files, Prev: Mail-mode integration, Up: Commands<br /><br /><a name="Encryptingdecryptinggpgfiles">3.6 Encrypting/decrypting *.gpg files</a> <br />=====================================<br /><br />Once `epa-setup' is loaded, every file whose extension is `.gpg' will<br />be treated as encrypted. That is, when you attempt to open such a file<br />which already exists, the decrypted text is inserted in the buffer<br />rather than encrypted one. On the other hand, when you attempt to save<br />the buffer to a file whose extension is `.gpg', encrypted data is<br />written.<br /><br /> If you want to temporarily disable this behavior, use `M-x<br />epa-file-disable', and then to enable this behavior use `M-x<br />epa-file-enable'.<br /><br /> -- Command: epa-file-disable<br /> Disable automatic encryption/decryption of *.gpg files.<br /><br /> -- Command: epa-file-enable<br /> Enable automatic encryption/decryption of *.gpg files.<br /><br />`epa-file' will let you select recipients. If you want to suppress<br />this question, it might be a good idea to put the following line on the<br />first line of the text being encrypted. <br /><br /> ;; -*- epa-file-encrypt-to: ("ueno@unixuser.org") -*-<br /><br /> The file name extension of encrypted files can be controlled by<br />EPA-FILE-NAME-REGEXP.<br /><br /> -- Variable: epa-file-name-regexp<br /> Regexp which matches filenames treated as encrypted.<br /><br /> Other variables which control the automatic encryption/decryption<br />behavior are below.<br /><br /> -- Variable: epa-file-cache-passphrase-for-symmetric-encryption<br /> If non-`nil', cache passphrase for symmetric encryption. The<br /> default value is `nil'.<br /><br /> -- Variable: epa-file-inhibit-auto-save<br /> If non-`nil', disable auto-saving when opening an encrypted file.<br /> The default value is `t'.<br /><br /><br />Tag Table:<br />Node: Top 1293<br />Node: Overview 2813<br />Node: Quick start 3173<br />Node: Commands 3856<br />Node: Key management 4197<br />Node: Cryptographic operations on regions 6818<br />Node: Cryptographic operations on files 8806<br />Node: Dired integration 9396<br />Node: Mail-mode integration 9987<br />Node: Encrypting/decrypting *.gpg files 10932<br />End Tag Table<br /></ueno@unixuser.org></ret></tab></ueno@unixuser.org>Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0tag:blogger.com,1999:blog-28202905.post-1147783398295604542008-09-17T18:53:00.000-07:002009-09-10T04:14:28.085-07:00Press Release: Carlo Ruta condannato per "stampa clandestina"<span style="font-size:85%;">Pubblico di seguito una <em>Press Release</em> inviatami dallo storico Carlo Ruta sulla sentenza che lo ha condannato per "stampa clandestina" (</span><a href="http://www.leinchieste.com/"><span style="font-size:85%;">http://www.leinchieste.com/</span></a><span style="font-size:85%;">).<br /><br />Vi prego di dare la massima diffusione a questa notizia in Italia e all'estero, in quanto tale sentenza è un attacco senza precedenti alla libertà dell'informazione e della rete nel nostro paese.</span><br /><br /><br /><br /><div align="center">Press release</div><div align="center"><br /><strong>Information on the Web. An Italian obscurantist sentence </strong></div><div align="center"><br />An Italian blogger and historian, Carlo Ruta, has been condemned for “clandestine press” with justifications that do not belong to the contexts of a democratic country. This is the first case in Europe. It could be the beginning of the end of information on the Web. </div><div align="center"><span style="font-size:85%;"><br />An Italian judge, Patricia Di Marco, for the first time in Italy and in Europe has condemned a blogger to a financial sanction for “clandestine press”. This court decision has been formulated on the 8th of May 2008 in Sicily, by Modica’s law court. The justifications of the sentence have been published in August. This is a most serious fact that legitimate the worry and the protest that have been raised in Italy, with firm standing points of parliamentarians, historians, journalists, blogger, lawyers, associations. In such sentence, the judge has written that the tried site, </span><a href="http://www.accadeinsicilia.net/"><span style="font-size:85%;">http://www.accadeinsicilia.net/</span></a><span style="font-size:85%;">, a normal blog, was to be considered a daily newspaper, lead clandestinely. </span></div><div align="center"><span style="font-size:85%;"><br />Such fact happens in a difficult context. Some strong powers in Sicily are making whatever is possible in order to hush up Carlo Ruta, who is now the author of </span><a href="http://www.leinchieste.com/"><span style="font-size:85%;">http://www.leinchieste.com/</span></a><span style="font-size:85%;"> and of numerous inquiries on the Mafia, politics, the illicit transactions of the finance. In recent months, three Italian law courts have passed judgment four sentences, the historian has been inflicted to pecuniary sanctions and huge compensations. </span></div><div align="center"><span style="font-size:85%;"><br />Far from the reasons of a true democracy, but close to logics that are in force in Tehran and Beijing, the Sicilian sentence make in fact a dangerous breach, offering to governments and to the economic and financial powers, which are more and more afraid of the freedom on the web, a way of hit against uncomfortable bloggers, the sites that publish free information, documentation, inquiries. It is therefore important that the civil mobilization, already imposing in Italy, is extended to all the European countries. </span></div><div align="center"><span style="font-size:85%;"><br />Giovanna Corradini (editor, Italy); Nikos Klitsikas (historian, Greece); Paolo Fior (journalist, Italy); Nello Lo Monaco (geologist, Italy); Vincenzo Gerace (chancellor, Italy); Riccardo Orioles (iournalist, Italy ); Roberto S. Rossi (journalist, Italy); Carlo Gubitosa (journalist writer, Italy); Carla Cau (teacher, Italy ); Serena Minicuci (journalist, Italy); Vincenzo Rossi (journalist, Italy); Teodoro Criscione (student, Italy); Antonella Serafini (journalist, Italy ); Angelo Genovese (student, Italy); Giuseppe Virzì (blogger, Italy); Luisa La Terra (employee, Italy); Marco Benanti (journalist, Italy); Andrea Mangano (student, Italy); Pietro Lo Monaco (student, Italy); Luisa La Terra (employee, Italy) </span></div><div align="center"><span style="font-size:85%;"><br />Please publish. Thank you. </span></div><span style="font-size:85%;"><div align="center"><br />For information:</span></div><div align="center"><a href="mailto:accadeinsicilia@tiscali.it"><span style="font-size:85%;">accadeinsicilia@tiscali.it</span></a></div><div align="center"><a href="http://www.giornalisti.info/vocilibere"><span style="font-size:85%;">www.giornalisti.info/vocilibere</span></a></div><div align="center"><a href="http://www.leinchieste.com/"><span style="font-size:85%;">http://www.leinchieste.com/</span></a></div><div align="center"><a href="mailto:carlo.ruta@tin.it"><span style="font-size:85%;">carlo.ruta@tin.it</span></a><span style="font-size:85%;"><br /></div></span><div align="center"><span style="font-size:85%;"></div></span><div align="center"><span style="font-size:85%;"></div></span><br /><br /><div align="center"><strong><br />Freedom emergency in Italy </strong></div><br /><br /><div align="center"><span style="font-size:85%;">The Sicilian sentence that has condemned information on the net, regarding it as crime, is provoking protests and alarms on the web and in every “responsible” corner of the country. The reasons are heavy as stones. The principles that have made the history of the democratic thought have been attacked: the same ones for which, in our country, men like the Rosselli’s brothers, Piero Gobetti, Antonio Gramsci, Eugenio Curiel, Giovanni Amendola, have spoilt their engagement and gave their life. The principle of the free expression has been particularly attacked, this principle is representative for all freedoms, it constitutes a hinge of the republican Constitution. </span></div><br /><br /><div align="center"><span style="font-size:85%;">The current Italian government, than is connoting itself more and more in an illiberal sense, cannot avoid the moral duty of answering these days’ protests. Enough with infringes. The wave of indignation will not stop soon, and we are committed to continue as long as possible. The last frontier of democracy, in its most open and advanced form, represented by free expression in the Internet, by the communication that breaks in and bursts out in all directions, that makes citizens protagonists in a new way, is at stake. The Italian Constitution which, as Piero Calamandrei has remembered us, was not born in the parlours neither in the rooms of the power, but on mountains, beside the bodies of the victims of the war, between fires of the cities in revolt, is at stake. </span></div><br /><br /><div align="center"><span style="font-size:85%;">A law is quickly necessary, a law distant from every possibility of misinterpretation, in order to stop the censor and repressive wefts of the strong powers of the country, illiberal and anti-democratic for vocation, in a definitive way. It is also necessary that the legislator understands that the information on the web cannot have principle limitations. The net is a hinge of our time, in which the democracy, with the exercise of confrontation, gets body and voice. It cannot be therefore annihilated, as it happens in Iran and Birmania.<br /></div></span><br /><br /><div align="center"><span style="font-size:85%;">Appeal is then made to the web, to the communication on all levels, to the civil and responsible country, so that the mobilization will continue endlessly, with strong initiatives. The Sicilian sentence, as a blogger has written, could be one of last “pearls” of a necklace that, day after day, is changing in an oxbow. It is about doing whatever possible to avoid this happening. It is necessary to prevent that Italy becomes the pyre of free expression, still remembering that the pyres of ideas may a preparatory stage of open scene regimes.<br /></div></span><br /><br /><div align="center"><span style="font-size:85%;">Carlo Ruta (historian journalist, Ragusa); Letizia Battaglia (photographer, Palermo); Alfio Caruso (writer and journalist, Milan), Paul Barnard (journalist, Rome); Carmine Colacino (research university, Potenza); Nikos klitsikas (historian and writer, Athens); Joseph Casarrubea (historian, Partinico); Pino Nicotri (journalist, Rome); Rocco Sciarrone (Sociology professor, University of Turin); Antonino Monteleone (journalist and blogger, Reggio Calabria); Paola Vallatta (Journalist, Paris); Diana Cimino (student, Palermo), Marisa Conte (Ragusa); Barbara Grimaudo (trainer, Palermo); Invisible Citizens (Association, Palermo), Alessio Di Florio (activist, Pescara); Fabrizio Occhipinti (student, Ragusa); Simona Taschetti (Fiumefreddo of Sicily); Flora Nicole Blasi ( student, Busto Arsizio), Lucio Lanza (Sant'alessio Siculo, Messina); Bruno Chiazzo, used, Florence); Gian Joseph Morici (blogger journalist, Agrigento); Cinzia Montoneri (graphics advertising and blogger, Ragusa); Athos Gualazzi (journalist and blogger, Rome); Joseph Sanarico (used, Turin); Sara Catanese (student, Rosolini); Roberto Copparoni (teacher and journalist, provincial referent of the Greens of Cagliari); Ugo Albano (blogger); Pasquale Incantalupo (Sesto San Giovanni, Milan), Andrea Giompaolo (student, Ragusa), Marco Di Martino (lawyer, Ragusa); PRF federation of Ragusa; Gemma Marino (bank officer retired, Caltagirone); Paul Fior (journalist, Milan); Nello Lo Monaco (geologist, Ragusa); Stefano Moncherini (RAI journalist, Roma), Vincenzo Gerace (Francavilla, Messina); Roberto S. Rossi (journalist, Catania); Editor of "The clandestine" (newspaper, Modica); Riccardo Orioles (journalist, Catania); Giulia Manzini (journalist, Gazzetta di Modena); Carlo Gubitosa (journalist writer, Taranto); Carla Cau (teacher, Ragusa); Serena Minicuci (official Region Calabria, Catanzaro); Vincenzo Rossi (journalist, Catania); Teodoro Criscione (student, Ragusa); Antonella Serafini (journalist, Rome); Patrizia Bellocci (university professor, Florence); Angelo Genovese (student, Ragusa); Joseph Virzì (blogger, Milan); Luisa La Terra (Ragusa); Marco Benanti (journalist, Catania); Andrea Mangano (student, Ragusa); Pippo Gurrieri (journalist, Ragusa); Victor Ciuffa (publisher and Director of Economic Mirror, Rome); Pietro Lo Monaco (student, Ragusa); Luisa La Terra (Ragusa); John Iacono (metodologo, Ragusa); Christmas Salvo (bloggers, Trapani); Supplizi Franca (sociologist, Ragusa) ; Piero Lo Monaco (student, Ragusa); Agnese Knee (cantautrice, Caserta); Daniela Pappalardo (Monterosso Almo, RG), Peter Campoli (Russians, RA); Roberto Ballabeni (Paris); Francis Cyril (journalist, Calabria); Elio Copetti (artist, Venzone, Udine); Aldo Zanchetta (engineer, Gragnano); William Trupia (photographer, Milan), Marco Billeci (student university, Milan). Joseph Crapisi (journalist blogger, Corleone); Pippo Palazzolo (law and economics professor, Ragusa); Nicola Lo Bianco (teacher, Palermo); Luigi Zoppoli (journalist, Turin); Antonio Pavolini (Employee, Roma), Salvatore Gioncardi (actor, Palermo); Piero Paolino (teacher, Modica), A New Perspective (political movement, Modica); Mario Nanni "Maralai" (blogger); Laura Incantalupo (used, Sesto San Giovanni); John Arata (blogger, Turin); Pier Luigi Zanata (journalist, Capoterra, CA); Viviana Salerno (free trader, Comiso); Enrico Natoli (photographer, Rome); contrast (association Antimafia, Roma), Francesco Balistreri (engineering student, Pietraperzia); Giuliano Ottaviano (Professor of Science, Ragusa); Luca Grimaldi (journalist blogger, Salerno); Antonio Giaimo (journalist, Bolivia); Sandra Cangemi (journalist, Milan); Baldassare Criscenzo (free trader, Rome); Mary Virgillito (journalist blogger, Catania).<br /><br />For adhesion to this appeal (please indicate name, surname, activity, city):</span></div><div align="center"><a href="mailto:accadeinsicilia@tiscali.it"><span style="font-size:85%;">accadeinsicilia@tiscali.it</span></a><span style="font-size:85%;">. </span></div><span style="font-size:85%;"><div align="center"><br />For news and information:</div><div align="center"></span><a href="http://www.giornalismi.info/vocilibere"><span style="font-size:85%;">www.giornalismi.info/vocilibere</span></a></div><div align="center"><span style="font-size:85%;"><a href="http://www.leinchieste.com/">http://www.leinchieste.com/</a></span></div><div align="center"><span style="font-size:85%;"><a href="mailto:carlo.ruta@tin.it">carlo.ruta@tin.it</a> </span></div><span style="font-size:85%;"><div align="center"><br />Please publish and spread.</span></div><a href="http://www.leinchieste.com/"></a><a href="http://www.leinchieste.com/"></a>Stefano Spinuccihttp://www.blogger.com/profile/03117483756966317938noreply@blogger.com0