After lot of thought, I bought the Sony CP-AD2 charger for my Sony Xperia ZR phone. The biggest worry was the 2.1 Ampere rating of the charger and it’s compatibility, as the default in-box charger was of 1.5 Ampere.
Fortunately, the 2.1 Ampere charger worked very well. In fact, it the phone charges to 100% . . . → Read More: Sony CP-AD2 high speed charger for Sony Xperia ZR Phone
Breathe new life into an old Android device. Look for Cyanogen Mod 11 firmware and make it as good as new. Also, in bargain, you get to remove old vulnerabilities, upgrade to a compatible, later version of the Android Operating System flavour and enjoy the newer programs that release on Google Play Store. And most . . . → Read More: Install Cyanogen Mod 11 on Samsung Galaxy Tab GT-P3110
Telegram is an application for Android phones just like WhatsApp. The key advantages of Telegram are that it assures users that their data is not used by any 3rd party, users have more control over it, with the ability to send secret messages, self-destruct messages and complete removal if a user exits the service.
If . . . → Read More: How to install telegram pidgin plugin in Ubuntu Linux
My objective was to create an image map of a slide I created using LibreOffice Impress. See this link for the result. Here is how I went about it:
Create a presentation or flow diagram with the shapes you want, in LibreOffice Impress. Save the presentation as an ODP file, which is the default LibreOffice . . . → Read More: How to create image map using LibreOffice Impress for use on a web page
I have an instance of my own of WordPress installed on my web site. In some posts, I need to use images to illustrate and explain certain topics. To do this, the image has to be uploaded to a folder within wp-content and then use the name of the image file to display on the . . . → Read More: How to use uploaded image with WordPress post if you cannot use “Upload Media” button
Okay… on this blog, we explained the finer details of GNU Privacy Guard or GPG or GnuPG or PGP. Activities that are required to be performed were explained in detail with the commands to perform them.
However, you would still not be able to connect the dots, without this grand overview of GNU Privacy Guard . . . → Read More: How to use GNU Privacy Guard / GnuPG / GPG / PGP to encrypt email and data
If your Gnu Privacy Guard or GPG or GnuPG key has been compromised or something has gone wrong, you can revoke your key. Make sure that you generated a revocation certificate and stored in a safe place to do so.
To revoke a key, open a terminal in Linux, and enter the following command: $ . . . → Read More: How to revoke a GnuPG / GPG key in Linux
We saw how to create a GPG, GnuPG or PGP key pair in earlier posts. Now we need to tell Evolution that we have a PGP key pair that can be used to sign email messages and also encrypt them.
To sign, all you need is the private key. To encrypt, you will need the . . . → Read More: How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it
You will be able to sign emails using your private key by default. This means that people know that it is your email ID that is the originator of the email. However, if you want to send people encrypted messages, you need to have their public keys in your key ring. You need to get . . . → Read More: How to receive other people’s GnuPG / PGP public key from a key server into your key ring
After keys have been generated, we need to ensure that we spread our public key far and wide. It can be attached to every email we send to others, but the problem is, it becomes a big pain to do every time.
The easiest way to spread the public key far and wide is to . . . → Read More: How to send GPG public key to a PGP key server