# [Gpg4win-commits] r418 - in trunk/doc: . manual

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Jun 19 22:32:50 CEST 2007

Author: jan
Date: 2007-06-19 22:32:49 +0200 (Tue, 19 Jun 2007)
New Revision: 418

Modified:
trunk/doc/ChangeLog
trunk/doc/manual/novices.tex
Log:
manual/novices.tex: Text slightly reworked by
Brigitte Hamilton.

Modified: trunk/doc/ChangeLog
===================================================================
--- trunk/doc/ChangeLog	2007-06-18 20:41:26 UTC (rev 417)
+++ trunk/doc/ChangeLog	2007-06-19 20:32:49 UTC (rev 418)
@@ -1,3 +1,8 @@
+2007-06-19  Jan-Oliver Wagner  <jan-oliver.wagner at intevation.de>
+
+	* manual/novices.tex: Text slightly reworked by
+	Brigitte Hamilton.
+
2007-05-24  Werner Koch  <wk at g10code.com>

* manual/Makefile.am (preview): New.

Modified: trunk/doc/manual/novices.tex
===================================================================
--- trunk/doc/manual/novices.tex	2007-06-18 20:41:26 UTC (rev 417)
+++ trunk/doc/manual/novices.tex	2007-06-19 20:32:49 UTC (rev 418)
@@ -96,9 +96,9 @@

\begin{center}
\T\fbox{\parbox{.7\textwidth}{%
-      The statements on the \textbf{next page} are not anymore
+      The statements on the \textbf{next page} are no longer
correct.  Due to a wrong application of the terms of
-      the GFDL, it is legally not possible to fix them.  Please add
+      the GFDL, it is not legally possible to fix them.  Please add
new copyright notices only here.  \T}}
\end{center}

@@ -164,7 +164,7 @@
which can be found on your hard drive after you have installed Gpg4win,

\item \textbf{the exercise robot Adele,} which allows you to practice
-the \Email{} en- and decryption process(an internet connection is
+the \Email{} en- and decryption process (an internet connection is
required).
\end{itemize}

@@ -174,7 +174,7 @@
through this manual, depending on your knowledge of computers and Windows.

\textbf{"Gpg4win for Advanced Users"} provides in-depth information
-about the basic principles and mechanisms usbed by Gpg4win,
+about Gpg4win's basic principles and mechanisms,
as well as its less commonly used capabilities.

Both manuals are available in PDF format; you can print your own
@@ -187,8 +187,8 @@

-receives, sends and decrypts encrypted \Email{}s. You can use it to
-practice a complete cryptographic exchange, as often as you need
+practice a complete cryptographic exchange as often as you need
to be fully familiar with the software.

Adele was developed as part of the older GnuPP project, where it is
@@ -243,14 +243,14 @@
\clearpage
%% Orginal page 10

-The licencing page contains information regarding the licencing of this
+The licensing page contains information regarding the licensing of this
software.

If your sole intention is to install and use the software, you do not

However, if you plan to distribute and/or alter the software, you must
-familiarize yourself with the conditions contained in the licencing
+familiarize yourself with the conditions contained in the licensing
agreement.

@@ -303,7 +303,7 @@

-these settings within Windows at anytime.
+these settings within Windows at any time.

\begin{center}
@@ -388,13 +388,13 @@
manner.

Of course you do not need to know all the technical details of Gpg4win to be
-able to use it. However, since you will use Gpg4win to handle your
-most sensitive correspondence and it probably iis a good idea to understand
+able to use the program. However, since you will use Gpg4win to handle your
+most sensitive correspondence, it is probably a good idea to understand
the theory behind it.

$\ldots$

-The following section provides you with tips for creating a
+The following section provides you with suggestions for creating a
secure yet easy-to-remember passphrase.

\textbf{
@@ -406,18 +406,18 @@
%% Original page 15
\section{Creating a key pair}

-After reading the information explaining Gpg4win's security features
-and the creating of a good passphrase to protect your
+After reading the information on Gpg4win's security features
+and the creation of a good passphrase to protect your
private key, this section shows you how to create a key pair.

\textbf{
-The processes of creating a key, encryption and decryption are very
+The processes of key creation, encryption and decryption are very
important - so important that it should be possible to practice $\ldots$
}

-\textbf{And this is what you actually can do:}
+\textbf{and this you can actually do:}
Run through the whole processes as often as you want.
using the program, so that some of the more intricate steps in creating
keys will not pose any problems later on. You can use Adele to do this.
It is a test server which was developed as part of the GnuPP project.
@@ -495,7 +495,7 @@

Chapter 4 ("The Passphrase") from the manual "Gpg4win for Advanced
Users" already provided you with suggestions on creating a secure
-passphrase.  So, at this point you should have come up with your own
+passphrase, so at this point you should have come up with your own
passphrase - one that is private, easy to remember, and difficult to
crack.

@@ -569,7 +569,7 @@
\end{center}

What is the significance of the notes regarding your key? Your key has
-no built-in expiry date and is, therefore, valid indefinitely.  You can,
+no built-in expiry date and is therefore valid indefinitely.  You can,

A key consisting of 1024 bits is considered very secure, without
@@ -608,7 +608,7 @@

This is the reason that your public key should be made widely
available. Depending on the number of correspondence partners,
-can do this in two ways:
+this can be done in two ways:

\begin{itemize}
\item \textbf{directly sending an \Email{}} to selected recipients
@@ -808,7 +808,7 @@
\end{verbatim}

(Please note that the encryption sequence has been considerably
-shortened to save space in this manual.)
+shortened for demonstration purposes.)
\clearpage
%% Original page 33

@@ -820,7 +820,7 @@
is that it works with all email programs.

Most email programs (e.g. MS Outlook for Windows) also have special
-plug-ins which can encrypt and decrypt \Email{} directly within the program.
+plug-ins which can encrypt and decrypt an \Email{} directly within the program.

\textbf{ \OtherBook{} Chapter 8 of the manual "\xlink{Gpg4win for
@@ -832,7 +832,7 @@
computer's clipboard.

To do this, highlight the complete text in Adele's \Email{} and copy it
-onto the Clipboard using the copy function or the shortcut Ctrl-C.
+onto the clipboard using the copy function or the shortcut Ctrl-C.

\clearpage
@@ -960,7 +960,7 @@
and find later on, e.g. \Filename{My Documents}).

It does not matter whether you save the key as text or directly as an
-\Email{}attachment, as both methods import the key into your GnuPG-"Key
+\Email{} attachment, as both methods import the key into your GnuPG-"Key
Ring".

@@ -1060,13 +1060,13 @@
\IncludeImage[width=0.7\textwidth]{sc-winpt-good-sig}
\end{center}

-If the status line on the window displays the following message
+If the status line on the window displays the message
\emph{Invalid Signature}%someone check if this is the right text used in
%the program, i did not encounter it so I am not sure of the tranlsation,
%although i think this should be right FIXME

-it means that the message has been altered after being sent.  This does
-not always mean that a third party has altered the message, as it could
+ it means that the message has been altered after being sent.  This does
+not always mean that a third party has altered the message; it could
also have been altered by a technical error during transmission
through the Internet.

@@ -1082,9 +1082,9 @@
Encrypt an \Email{} and send it to Adele (or another person).

Open your \Email{} program and write a message (if you are sending the
-message to Adele, any text will do as Adele can not actually read $\ldots$)
+message to Adele, any text will do as Adele cannot actually read $\ldots$)

-Highlight the text and copy it onto your Clipboard (Windows) using the
+Highlight the text and copy it onto your clipboard (Windows) using the
copy function or the Ctrl-C shortcut.

% screenshot: composer mit mail an Adele, body markiert
@@ -1099,7 +1099,7 @@
\clearpage
%% Original page 45
You should now see a window containing the keys on your key ring. Using
-the examples featured in this guide, you would see Adele's key (the one
+the examples featured in this manual, you would see Adele's key (the one
she sent to you), as well as your own key, which you created in Chapter
2 (FIXME: Use dynamic reference).

@@ -1131,8 +1131,8 @@
\end{center}

-address (rather than the previous practice email) otherwise you will not
-receive a response.   $\ldots$
+address (rather than the practice email) otherwise you will not

\textbf{
Congratulations! You have just encrypted your first \Email{}!
@@ -1142,18 +1142,18 @@
%% Original page 47
\section{How to archive/store encrypted \Email{}s}

-It is probably not wise to store the readable (clear)text of your
+It is probably not wise to store the readable (clear) text of your
encrypted \Email{}s on your computer (after all, they were encrypted
-for a reason). Therefore it is sensible to store encrypted
+for a reason). Therefore it makes sense to store the encrypted
copies of the \Email{}s.

You may already have guessed resulting problem: To decrypt the
archived \Email{}s you need the private key of the recipient, which will
-(should) never be available to you. $\ldots$
+(should) never be available to you.

The solution: You encrypt the messages to yourself as well.

-You can encrypt a message designated for a recipient (e.g. Adele) using
+You can encrypt a message designated for a recipient (ex. Adele) using
their own as well as your own public key, which allows you to decrypt the
text later using your own private key.

@@ -1172,7 +1172,7 @@
\end{center}

This opens the GnuPG Preferences Window. You can add your key in the

\Email{} programs which directly support GnuPG will also feature this
option.
@@ -1201,10 +1201,10 @@

\textbf{
\OtherBook{} Furthermore, Chapters 13 and 14 of the manual
features, as well as detailed insights into the mathematical
-concepts used.  These chapters are easy to read, they were
+concepts used.  These chapters are easy to read, as they were
written for \textbf{the every day user}, not mathematicians and
cryptographers. }

@@ -1214,16 +1214,16 @@
\section{Suggestions regarding the Outlook plugin \emph{GPGol}}

GPGol, a Microsoft Outlook plugin, integrates the operation of GnuPG.
-Here are some tips about the operation of this plugin.
+Here are some suggestions on the operation of this plugin.

While it is fairly easy to operate the plugin in other \Email{} programs,
-technical difficulties associated with its integration of OpenPGP
+technical difficulties associated with the integration of OpenPGP
into Outlook make it harder to operate in this context.

The current version of GPGol works only with Outlook 2003 SP2 and will
notify you if you are using an older version.

-Please be aware of the following limitations:

\begin{itemize}
\item Do not use Word as your text editor.
@@ -1330,7 +1330,7 @@

If \linebreak{} GPGol is not installed as a trusted plugin, Outlook
assumes that it is trying to access internal information without
-authorization.  GPGol attempts to prevent this from happening, but
+authorization.  GPGol tries to prevent this from happening, but
sometimes it is necessary in order to properly display encrypted or
signed \Email{}s.

@@ -1359,16 +1359,16 @@
\section{Transferring from other GnuPG programs}
\label{ch:migration}

-This section explains how to migrate from out GnuPG-based programs to Gpg4win.
+This section explains how to migrate from GnuPG-based programs to Gpg4win.
The installation program recognizes some of these programs
and notifies you if that is the case.

As a general rule it is recommended that existing GnuPG-based programs
-be removed before installing Gpg4win.
+are removed before installing Gpg4win.

\textbf{Always} save a backup of the existing keys.
The best way to do this is to use
-the options in the existing system before installation Gpg4win.
+the options in the existing system before installing Gpg4win.
Select the option to save any private (secret) keys,
as well as all existing public keys.  Save these in one or two files.