[Gpg4win-commits] r382 - trunk/doc/manual

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Sun Mar 11 02:58:00 CET 2007


Author: bernhard
Date: 2007-03-11 02:58:00 +0100 (Sun, 11 Mar 2007)
New Revision: 382

Modified:
   trunk/doc/manual/novices.tex
Log:
Merged many changes and suggestions by Michael W. Lewis.
Changed some sentences to be a little closer to the original or to 
correct obvious mistakes.


Modified: trunk/doc/manual/novices.tex
===================================================================
--- trunk/doc/manual/novices.tex	2007-03-09 16:08:50 UTC (rev 381)
+++ trunk/doc/manual/novices.tex	2007-03-11 01:58:00 UTC (rev 382)
@@ -40,12 +40,12 @@
 Gpg4win for Novices}
 
 \author{\htmlonly{\xml{p}\small
-Hier \xlink{Download als PDF Version 2.0.1 (1.5
-MByte)}{http://wald.intevation.org/frs/download.php/203/gpg4win-fuer-einsteiger-2.0.1.pdf} und
-\xlink{Downloadübersicht alle PDF
-Versionen}{http://wald.intevation.org/frs/?group_id=11}\xml{br}
-Zu \xlink{Gpg4win for Advanced Users}{advanced.html}\xml{br}
-Zur \xlink{Gpg4win Homepage}{http://www.gpg4win.de/}\xml{p}
+%%Here \xlink{Download PDF Version 2.0.1 (1.5
+%MByte)}{http://wald.intevation.org/frs/download.php/203/gpg4win-fuer-einsteiger-2.0.1.pdf} und
+\xlink{List of PDF Download
+Versions}{http://wald.intevation.org/frs/?group_id=11}\xml{br}
+To \xlink{Gpg4win for Advanced Users}{advanced.html}\xml{br}
+To \xlink{Gpg4win Homepage}{http://www.gpg4win.org/}\xml{p}
 }%
 A publication of the Gpg4win project\\
   \small based on original documents by  
@@ -72,25 +72,27 @@
 \maketitle
 
 
-\section*{Impressum Gpg4win}
+\section*{Imprint Gpg4win}
 
 \noindent
 Copyright \copyright{} 2002 Bundesministerium für Wirtschaft und
-Technologie\\
+Technologie (German Federal Ministry of Economics \& Technology)\\
 Copyright \copyright{} 2005 g10 Code GmbH\\
 Copyright \copyright{} 2006 Brigitte Hamilton\\
 Permission is hereby granted to copy, distribute and/or modify this
-document
-under the terms of the GNU Free Documentation License, Version 1.2 (or
-newer)
-published by the Free Software Foundation; with
-the Invariant Sections being "`Impressum"', no Front-Cover Texts, and
+document under the terms of the GNU Free Documentation License, 
+Version 1.2 (or newer) published by the Free Software Foundation; 
+with the Invariant Sections being "`Impressum"', no Front-Cover Texts, and
 no Back-Cover Texts.  A copy of the license is included in the section
 entitled "`GNU Free Documentation License"'.
 
 %%\htmlonly{Die aktuelle PDF Version dieses Dokuments finden sie unter
 %%\xlink{\EinsteigerPDFURL}{\EinsteigerPDFURL}.}
 
+Special Thanks to:\\
+Bernhard Reiter for minor edits (2006, 2007).\\
+Michael W. Lewis for proofreading (2007).\\
+
 \vfill
 
 \begin{center}
@@ -156,45 +158,44 @@
 
 \begin{itemize}
 
-\item \textbf{the condensed version "`Gpg4win for Novices"',} which you
-are reading right now,
+\item \textbf{an introductory guide called "`Gpg4win for Novices"',} 
+which you are reading right now,
 
-\item \textbf{the manual  "`Gpg4win for Advanced Users"'} in PDF-Format,
-which can be found on your hard drive following the installation of
-Gpg4win,
+\item \textbf{the manual "`Gpg4win for Advanced Users"'} in PDF-Format,
+which can be found on your hard drive after you have installed Gpg4win,
 
-\item \textbf{the exercise ROBOT Adele,} which allows you to practice
+\item \textbf{the exercise robot Adele,} which allows you to practice
 the \Email{} en- and decryption process(an internet connection is
 required). 
 \end{itemize}
 
 
-\textbf{"`Gpg4win for Novices"'} provides you with a quick guide to the
-installation and everyday use of the Gpg4win software. The time required
-to work thru this manual is about half an hour, but will depend on your
-knowledge of computers and Windows. 
+\textbf{"`Gpg4win for Novices"'} is a quick guide to installing and
+everyday use of the Gpg4win software. You will need about half and hour to work
+through this manual, depending on your knowledge of computers and Windows. 
 
-\textbf{"`Gpg4win for Advanced Users"'} provides more in-depth
-information on the basic principles and mechanisms behind Gpg4win as
-well as its less commonly used capabilities.
+\textbf{"`Gpg4win for Advanced Users"'} provides in-depth information
+about the basic principles and mechanisms usbed by Gpg4win, 
+as well as its less commonly used capabilities.
 
-Both manuals are available in PDF format, so you can print your own
+Both manuals are available in PDF format; you can print your own
 manual if you did not receive a printed copy. 
 
-Each manual can be used independently, however, we suggest that you read
-both manuals to get a better understanding of the software.
+Each manual can be read independently. We suggest, however, that you 
+read both manuals in order to get a better understanding of the software.
 
 \OtherBook{} This symbol references a link to the other manual.
 
 
 \textbf{The practice robot Adele} is available on the Internet. Adele
-receives, sends an decrypts encrypted \Email{}s, and is a useful tool
-which will assist you in becoming more familiar with the software. 
+receives, sends and decrypts encrypted \Email{}s. You can use it to 
+practice a complete cryptographic exchange, as often as you need 
+to be fully familiar with the software.
 
 Adele was developed as part of the older GnuPP project, where it is
 still used.  "`Gpg4win for Novices"' also uses this very reliable
 practice robot and hereby wishes to express its gratitude to the owners
-of gnupp.de for the operation of Adele. 
+of gnupp.de for operating Adele. 
 
 \clearpage
 %% Orginal page 8
@@ -207,25 +208,25 @@
 \section{Installing Gpg4win}
 
 If you already have a GnuPG-based application such as GnuPP, GnuPT,
-WinPT or GnuPG Basics installed on your system, we recommend reading the
-Appendix \ref{ch:migration} regarding the transferability of existing
+WinPT or GnuPG Basics installed on your system, we recommend that you
+read the Appendix \ref{ch:migration} to find out how to migrate existing
 keys. 
 
 Installing Gpg4win from a CD-ROM:
 
 Insert the CD-ROM in the CD-ROM drive of your computer and log in as
-Administrator. On your screen click on the CD-ROM icon titled 'Gpg4win'.
+Administrator. On the screen click on the CD-ROM icon titled 'Gpg4win'.
 Once the CD-ROM icon opens, click on the installation icon titled
 'Gpg4win'.
 
 Installing Gpg4win from the Internet:
 
 If you have downloaded Gpg4win from the Internet, click on the new file
-(it should be named \texttt{gpg4win-\PackageVersion{}.exe}, or a newer
+(it should be named \texttt{gpg4win-\PackageVersion{}.exe} or a newer
 version).  Please ensure that you have downloaded the file from a
 trustworthy site.
 
-The following installation steps apply in all situations:
+The following installation steps apply to all situations:
 
 You will be asked if you want to install the program; click on
 \Button{Yes}. 
@@ -246,8 +247,8 @@
 The licencing page contains information regarding the licencing of this
 software.
 
-If your sole intention is to install and use the software, you are not
-obliged to read this information. 
+If your sole intention is to install and use the software, you do not
+need to read this information. 
 
 However, if you plan to distribute and/or alter the software, you must
 familiarize yourself with the conditions contained in the licencing
@@ -269,9 +270,9 @@
 On the components page you can select which features of GnuPG For
 Windows you want to install. 
  
-To assist you with your selection, a short description dialogue appears
-when you roll your mouse over the selected item. At this point, you may
-also want to check the available memory on your hard drive.
+To assist you with your selection, a short description window appears
+when you hover the mouse over a selected item. At this point, you may
+want to check the available free space on your hard drive as well.
 
 % sreenshot Auswahl zu installierender Komponenten
 \begin{center}
@@ -279,7 +280,7 @@
 \end{center}
 
 The recommended minimum installation consists of GnuPG, GPA, WinPT and
-the manuals. The remaining programs can be installed later as required. 
+the manuals. If required, the remaining programs can be installed later.
 
 Click on \Button{Next}.
 
@@ -288,9 +289,9 @@
 %% Original page 11
 
 On this page you can choose the folder in which to install Gpg4win on
-your computer. If you do not specify a folder, the default location for
-this folder will be as shown: \\
-\Filename{C:$\backslash$Programme$\backslash$GNU$\backslash$GnuPG}\\
+your computer. If you do not enter a folder name, 
+you should accept the default folder name, which is: \\
+\Filename{C:$\backslash$Programme$\backslash$GNU$\backslash$GnuPG}\\%%FIXME
 
 % screenshot: Auswahl des Installationsverzeichnis.
 \begin{center}
@@ -302,8 +303,8 @@
 \clearpage
 
 This page allows you to set start links for the program. The default
-setting links Gpg4win to the start menu only.  Please note that these
-settings can also be changed anytime within Windows.
+setting adds Gpg4win to the start menu only.  You can change
+these settings within Windows at anytime.
 
 % screenshot: Auswahl des Links
 \begin{center}
@@ -315,8 +316,8 @@
 \clearpage
 %% Original page 12
 
-If you chose to link the program with the Start Menu (as per previous
-page), this page allows you to choose a Start Menu folder for the
+If you chose to add the program to the Start Menu (as per previous
+page), this page allows you to choose a Start Menu subfolder for the
 program.
 
 
@@ -325,13 +326,13 @@
 \IncludeImage{sc-inst-startmenu}
 \end{center}
 
-For a standard installation select the default setting and click on
+For a standard installation, select the default setting and click on
 \Button{Install}.
 
 \clearpage
 
-During the installation, a progress bar will be displayed, as well as an
-indicator listing the file currently being installed.  You can click on
+During the installation, a progress bar will be displayed, as well as 
+showing the file currently being installed.  You can click on
 \Button{Show details} to get more information on the installation steps
 in progress.
 
@@ -358,7 +359,7 @@
 
 You may need to restart Windows for the settings to take effect.  In
 that case, instead of showing the installation completion page, the
-following page will appear: 
+following page appears: 
 
 % Screenshot: Finish page Installer with reboot
 \begin{center}
@@ -380,27 +381,27 @@
 \textbf{And that's it!}
 
 
-You have now installed Gpg4win and are ready to work with the program.
+You have now installed Gpg4win and can use the program.
 
 Prior to starting Gpg4win, we recommend reading Chapter 3 and 4 of the
 manual "`Gpg4win for Advanced Users"'
-(PDF-Files).  These chapters highlight the ingeneous theory behind
+(PDF-File).  These chapters highlight the ingenious theory behind
 Gpg4win's ability to encrypt \Email{}s in a safe and user-friendly
 manner.
 
-Of course you do not need to know the mechanics behind Gpg4win to be
-able to use the program. However, because unlike other applications
-Gpg4win is used to handle your most sensitive correspondence, it is a
-good idea to understand the theory behind the program. 
+Of course you do not need to know the insides of Gpg4win to be
+able to use it. However, you will use Gpg4win to handle your 
+most sensitive correspondence and it seems a good idea to understand
+the theory behind it.
 
 $\ldots$
 
-The following section will provide you with some tips for creating a
+The following section provides you with tips for creating a
 secure yet easy-to-remember passphrase.
 
 \textbf{
 \OtherBook{}  At this point, please read Chapter 3 and 4 in the manual
-"`\xlink{Gpg4win for Advanced Users}{durchblicker.html}"'before reading
+"`\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' before reading
 on.}
 
 \clearpage
@@ -408,19 +409,19 @@
 \section{Creating a key pair}
 
 After reading the information explaining the security features of
-Gpg4win as well as the creation of a good passwordphrase protecting your
+Gpg4win, as well as creating  good passphrase to protect your
 private key, this section shows you how to create a key pair.
 
 \textbf{
-The process of creating a key, encryption and decryption is very
-important, therefore it is a good idea to practice these steps until you
-are very comfortable with the procedure. $\ldots$
+The processes of creating a key, encryption and decryption are very
+important; it is a good idea to practice these steps until you
+are very comfortable with the procedures. $\ldots$
 }
 
-The idea behind doing a "`dry-run"' is to help you gain confidence in
+Doing a "`dry-run"' helps you gain confidence in
 using the program, so that some of the more intricate steps in creating
-keys will not pose any problems later on. To do this, you can use Adele,
-a test server which was developed as part of a previous GnuPP project.
+keys will not pose any problems later on. You can use Adele to do this.
+It is a test server which was developed as part of the GnuPP project.
 Adele allows you to try and test several practice keys before creating
 your own set.  
 
@@ -435,7 +436,7 @@
 \IncludeImage[width=0.4\textwidth]{sc-gpa-rungpa}
 \end{center}
 
-The following window will appear: 
+The following window appears: 
 
 % screenshot: GPA erste Schlüsselerzeugung
 \begin{center}
@@ -449,15 +450,14 @@
 %% Original page 17
 
 \textbf{For practice purposes} you can enter any name in the window for
-now,
-i.e. "`Larry Smith"'.
+now, e.g. "`Larry Smith"'.
 
 % screenshot: Key generation wizard first page
 \begin{center}
 \IncludeImage[width=0.6\textwidth]{sc-gpa-gen-name}
 \end{center}
 
-Or you can generate your 'real' key in which case you would enter your
+Or you can generate your 'real' key in which case you should enter your
 real name.
 
 When you are done, click on  \Button{Forward}.
@@ -479,7 +479,7 @@
 \Button{Forward}.
 
 %note by translator Brigitte: when I ran Gpg4win, the option outlined in
-the text below was not available!
+%the text below was not available!  FIXME
 
 This option allows you to enter notes regarding your key.  Usually this
 field is empty; however, if you are creating a test key, you should make
@@ -492,11 +492,11 @@
 %% Original page 19
 
 Entering a passphrase is one of the most important steps in the program,
-as the program is only as good (and secure) as your passphrase! 
+as the program is only as good (and as secure) as your passphrase! 
 
 Chapter 4 ("`The Passphrase"') from the manual "`Gpg4win for Advanced
 Users"' already provided you with suggestions on creating a secure
-passphrase.  So at this point you should have developed your own
+passphrase.  So, at this point you should have thought your own
 passphrase - one that is private, easy to remember, and difficult to
 crack.  
 
@@ -507,29 +507,24 @@
 \IncludeImage[width=0.6\textwidth]{sc-gpa-gen-passwd}
 \end{center}
 
-If the passphrase you entered is not very secure, the program will give
-you a warning in this regard.  This allows you to enter a more secure
-passphrase. 
+If the passphrase you entered is not very secure, the program will warn
+you about it, allowing you to enter a more secure passphrase. 
 
 \textbf Again, you can enter a test passphrase for practice purposes, or
 your real passphrase.
 
-Once you entered your passphrase twice, click on \Button{Next}.
-%%Oder lieber so:  Dann mussen wir den Button in GPA aber ändern.
-%%Fertig? Dann klicken Sie auf \Button{Fertig} und Ihre Schlüssel werden
-%%endgültig erzeugt.
+Once you have entered your passphrase twice, click on \Button{Next}.
 
-
 \clearpage
 %% Original page 21
 
 This starts the creation of your key pair, which can take a few minutes.
-In the meantime you can continue to work with other programs on your
-computer, which will slightly increase the quality of the key being
+In the meantime, you can continue to work with other programs on your
+computer which will slightly increase the quality of the key being
 generated.
 
 %put a note in here somewhere that 'key pair' and 'key' are used
-interchangeably.
+%interchangeably.  FIXME
 
 Once the key is generated, the following window appears:
 
@@ -546,12 +541,11 @@
 different file name now. 
 
 \textbf{Important:} Once the the back-up file is saved onto your hard
-drive, you should save this file onto a removable file storage device
-(ex. USB stick, diskette or CD-ROM), and subsequently delete the
-original file.  Be sure to keep the file storage device in a secure
-place. 
+drive, you should save this file onto a removable storage device
+(e.g. USB stick, diskette or CD-ROM), and subsequently delete the
+original file.  Be sure to keep the storage device in a secure place. 
 
-Please note that you can create a back-up copy at any time, by selecting
+Please note that you can create back-up copies at any time by selecting
 the following option from the main menu: 
 \Menu{Key$\rightarrow$Backup}.
 
@@ -563,11 +557,11 @@
 key pair.  You are now the owner of a unique and secure digital key. 
 }
 
-You should now see the main page of GPA. The key pair you just created
+You should now see the GPA's main window. The key pair you just created
 will be shown in the middle of the window, beside the key pair symbol.  
 
 Clicking on the key pair symbol will provide details about your key
-pair, which are examined in more detail below.
+pair, which are discussed in more detail below.
 
 % screenshot: keymanger mit einem Schlüssel.
 \begin{center}
@@ -575,8 +569,8 @@
 \end{center}
 
 What is the significance of the notes regarding your key? Your key has
-no built-in expiry date, and is therefore valid indefinitely.  You can
-however change the validity period of the key - more about this later.
+no built-in expiry date and is, therefore, valid indefinitely.  You can,
+however, change the key's validity period - more about this later.
 
 A key consisting of 1024 bits is considered very secure, without
 creating undue strain on your computer's capacity.
@@ -597,7 +591,7 @@
 long way towards keeping your information confidential. 
 
 Everyone can and should have your public key, just as you can and should
-have the public keys from those you correspond with. 
+have the public keys of the people you correspond with. 
 
 Because:
 
@@ -606,15 +600,15 @@
 the public key of the other party. 
 }
 
-So in order to send someone encrypted \Email{}s, you must have their
-public key in order to encrypt the emails sent to them. 
+In order to send someone encrypted \Email{}s, you must have their
+public key in order to encrypt the emails to sent to them. 
 
-Similarly, someone wanting to send you encrypted \Email{}s must also
+Similarly, someone wanting to send you encrypted \Email{}s must 
 have your public key in order to encrypt the email being sent to you.  
 
-It is for this reason that your public key should be made widely
-available. Depending on the number of people on your mailing list, this
-can be done in two ways:
+This is the reason that your public key should be made widely
+available. Depending on the number of communication partners,
+can do this in two ways:
 
 \begin{itemize}
 \item \textbf{directly sending an \Email{}} to selected recipients
@@ -622,10 +616,10 @@
 available to anyone
 \end{itemize}
 
-The first way of distributing your public key is to send it per
+The first way to distribute your public key is to send it by
 \Email{} to one or more selected recipients.
 Alternatively you can make your \Email{}address available to anyone
-throughout the Internet. The second option is somewhat risky, as it can
+in the Internet. The second option is somewhat risky, as it can
 result in considerable SPAM activity on your email account. Therefore it
 is a good idea to only use an address with a good SPAM filter. 
 
@@ -635,7 +629,7 @@
 You can use Adele to practice the following steps:
 
 Adele is a very good \Email{}robot for practicing secure correspondence.
-And because most people prefer to correspond with a real person rather
+Because most people prefer to correspond with a real person rather
 than with a piece of software (which is what Adele is, after all), we
 developed the following scenario:
 
@@ -659,13 +653,13 @@
 
 Here is one possible way of doing just that, a method which works even
 if your \Email{} service does not allow attachments.
-This procedure will also provide you with a first in-depth look at your
+This procedure also gives you a first in-depth look at your
 key and its components.
 
 How it works:\\
 Select the key you want to export by clicking on the corresponding key
 on your list, and then clicking on the \Button{Export} icon of the main
-GPA menu. Choose a file to export your key to, ex. \\
+GPA menu. Choose a file to export your key to, e.g. \\
 \Filename{my-key.asc}.  A popup window will let you know whether the
 operation was successful.  Then click on \Button{OK}.
 
@@ -673,8 +667,8 @@
 \clearpage
 %% Original page 27
 
-You can access the file thru Windows Explorer, making sure you choose
-the same folder you chose when exporting the key to file.  You can open
+You can access the file through Windows Explorer; make sure you choose
+the same folder you chose when exporting the key.  You can open
 the file with a text editor (ex. WordPad), which will show your public
 key as a series of blocks containing text and numbers. 
 
@@ -701,10 +695,10 @@
 shortcut such as Ctrl-C. This saves your key on the clipboard until you
 are ready to paste it, as described below. 
 
-Start your email program. Then open a new \Email{} message and paste
+Start your email program. Open a new \Email{} message and paste
 your public key (Windows users may use a shortcut key such as Ctrl-V).
-Prior to doing this, it is useful to configure your email program to
-send messages in text-only format, rather than HTML.
+Before doing this, your should configure your email program to
+send messages in text-only format rather than HTML.
 
 Put \verb-adele at gnupp.de- into the address line of the \Email{}, and
 \textbf{my public key} on the subject line.
@@ -724,19 +718,19 @@
 %% Original page 29
 
 This process works exactly the same way if you send your key to a real
-\Email{} address. You can also add comments, just like any other emails.
-Obviously this is not required for emails addressed to Adele, as the
-robot's only purpose is to assist you with the technical aspects of this
+\Email{} address. You can add other text, just like in any other email.
+Obviously, this is not required for emails addressed to Adele, as the
+robot's only purpose is to help you with the technical aspects of this
 process.
 
-\textbf{Summary:} You have now sent your public key per \Email{} to
-someone else (ex. Adele). 
+\textbf{Summary:} You have now sent your public key by \Email{} to
+someone else (e.g. Adele). 
 
-\textbf{ \OtherBook{} The "`Copy \& Paste"'-method demonstrated in this
-example is a more transparent and easier-to-understand method for
-beginners. Chapter 7 of the manual "`\xlink{Gpg4win for Advanced
-Users}{durchblicker.html}"' describes how you can send your key as a
-file attachment, which is a more commonly-used method.}  
+\textbf{ \OtherBook{} The "`Copy \& Paste"'-method shown in this
+example is easily understood by beginners.
+Chapter 7 of the manual "`\xlink{Gpg4win for Advanced
+Users}{durchblicker.html}"' describes how to send your key as a
+file attachment, which is a more commonly used method.}  
 
 \clearpage
 %% Original page 30
@@ -748,7 +742,7 @@
 
 \textsc{PLEASE NOTE: Although there are no indications that spammers are
 currently collecting addresses from keyservers, it is technically
-possible to do so. Therefore we do not recommend publishing your key to
+possible to do so. We do not, therefore, recommend publishing your key to
 a key server if you do not have an effective spam filter.}
 
 Choose your key by clicking on it. Then click on \Menu{Server
@@ -764,16 +758,16 @@
 This window also displays a default key server.  If you click on
 \Button{Yes}, your key will be automatically sent to the server, from
 where it is sent to a network of worldwide key servers. Now anyone can
-download your key, and use it to send you a secure \Email{}.
+download your key, and use it to send you secure \Email{}.
 
 If this is a practice run, do NOT send your practice key to the key
-server, because it cannot be removed once sent.
+server because, once send, it cannot be removed.
 
 \textbf{Summary:} You now know how to distribute your key via a key
 server on the Internet. 
 
 \textbf{ \OtherBook{} Chapter 6 of the manual"`\xlink{Gpg4win for
-Advanced Users}{durchblicker.html}"'explains how to find someone else's
+Advanced Users}{durchblicker.html}"' explains how to find someone else's
 key on a keyserver.}
 
 \clearpage
@@ -813,20 +807,20 @@
 -----END PGP MESSAGE-----
 \end{verbatim}
 
-(Please note that this encryption sequence has been shortened
-considerably for the purposes of this manual.)
+(Please note that the encryption sequence has been considerably 
+shortened to save space in this manual.)
 \clearpage
 %% Original page 33
 
 \textbf{Using WinPT to decrypt this \Email{}.}
 
 WinPT (Windows Privacy Tray key management tool) serves as PnuPG's
-"`front end"'. This program is used to en- and decrypt \Email{}s; it
+"`front end"'. This program is used to encrypt and decrypt \Email{}s; it
 also creates and verifies digital signatures.  One of WinPT's advantages
-is that it works with any email program. 
+is that it works with all email programs. 
 
-Most email programs (ex. MS Outlook for Windows) also have special
-plug-ins which can en- and decrypt email directly within the program.
+Most email programs (e.g. MS Outlook for Windows) also have special
+plug-ins which can encrypt and decrypt \Email{} directly within the program.
 
 
 \textbf{ \OtherBook{} Chapter 8 of the manual "`\xlink{Gpg4win for
@@ -834,7 +828,7 @@
 particular funtion.} 
 
 WinPT performs the en/decryption function using your computer's memory.
-This means that any text to be en/decrypted should be copied onto the
+This means that any text to be en/decrypted must be copied onto the
 computer's clipboard.
 
 To do this, highlight the complete text in Adele's \Email{} and copy it
@@ -851,13 +845,13 @@
 \end{center}
 
 % the english version of the program does not have the "hinweis"below,
-so I have not translated it.
+% so I have not translated it. FIXME
 
-Während WinPT startet, erscheint kurz ein Hinweis darauf, dass das
-Programm die bereits vorhandenen Schlüssel einlädt.
+% Während WinPT startet, erscheint kurz ein Hinweis darauf, dass das
+% Programm die bereits vorhandenen Schlüssel einlädt.
 
-Once you open the program, the WinPT icon - a key - appears in your
-Windows taskbar located in the lower right hand corner of the screen.
+Once you open the program, the WinPT icon (a key) appears in the
+Windows taskbar, which is located in the lower right hand corner of the screen.
 
 % screenshot: taskbar rechts mit WinPT icon
 \begin{center}
@@ -896,7 +890,7 @@
 
 here is an encrypted response to your email. 
 
-I received the your public key with the ID 57251332CD8687F6 and a
+I received your public key with the ID 57251332CD8687F6 and a
 description `<larrys at gpg4win.de>'.
 
 I have enclosed the public key of adele at gnupp.de.
@@ -907,9 +901,10 @@
 
 The text sequence following this message is Adele's public key. 
 
-Below we show you how to import someone's public key and attach it to
-your key ring, which allows you to use this key anytime to decrypt
-messages from that person (in this case, Adele). 
+The next section shows you how to import someone's public key and attach it to
+your key ring, which allows you to use this key anytime 
+to encrypt messages to that person (in this case, Adele) or to
+verify a digital signature.
 
 \textbf{Summary:}
 
@@ -948,7 +943,7 @@
 \end{verbatim}
 
 and use Copy \& Paste to insert it into your text editor.  We recommend
-using a file and folder name that is easily found later; ex.
+using a file and folder name that is easily found later; e.g.
 \Filename{adeles-key.asc} in folder 
 \Filename{My Documents}.
 
@@ -961,10 +956,10 @@
 The key is sent to you as a file attachment to the \Email{}. No matter
 which mail program you use, you can always save attachments onto your
 hard drive.  Do this now (again using names you will easily recognize
-and find later on, ex. \Filename{My Documents}).
+and find later on, e.g. \Filename{My Documents}).
 
 It does not matter whether you save the key as text or directly as an
-\Email{}attachment, as each method imports the key into your GnuPG-"`Key
+\Email{}attachment, as both methods import the key into your GnuPG-"`Key
 Ring"'.
 
 % screenshot:  Startmenu, Auswahl GPA
@@ -972,7 +967,7 @@
 This is how it works:
 
 Start the GNU Privacy Assistant (GPA) from Windows (this is necessary
-only if you shut it down during the previous practice session).
+only if you shut it down after the previous practice session).
 
 
 \clearpage
@@ -996,24 +991,25 @@
 name, therefore how do you know that the public key sent to you is
 really Adele's key? 
 
-\textbf{ \OtherBook{} Chapter 9 ("`Key Verification"') of the manual "`
-\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' addresses this
-important question.  You may want to read that section now before
-continuing with this manual. }
+\textbf{ \OtherBook{} Chapter 9 ("`Key Verification"') in the 
+"`\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' manual deals
+with this important question.  You may want to read that section now 
+before continuing with this manual. }
 
 \clearpage
 %% Original page 40
 Chapter 9 of the manual "`Gpg4win for Advanced Users"' shows you how to
-validate a key as well as to sign a message (ie. attach a signature)
+validate a key as well as how to sign a message (i.e. attach a signature)
 using your private key.
 
 Chapter 10 of the advanced manual also discusses ways to attach a
-signature to \Email{}messages. This is the equivalent of attaching an
-electronic seal to your message, which allows the recipient to verify
-whether the \Email{} has been altered during transmission. 
+signature to \Email{} messages. This is the equivalent of attaching an
+electronic seal to your message, allowing the recipient to verify
+whether the \Email{} has been altered during transmission (and that it
+came from you).
 
-The signature verification process is fairly simple. To do this, you
-must have the sender's public key on your Gpg4win-"`key ring"' (see
+The signature verification process is fairly simple. To do it, you
+need the sender's public key on your Gpg4win-"`key ring"' (see
 Chapter 8 of "`Gpg4win for Advanced Users"' for more information).
 
 % cartoon:  Müller mit Schlüssel
@@ -1049,7 +1045,7 @@
 \textsl{END PGP SIGNATURE} and copy it (using Ctrl-C) to your
 clipboard. 
 
-Now cotinue to decrypt the \Email{} as shown in Chapter 7 of this
+Now continue to decrypt the \Email{} as shown in Chapter 7 of this
 manual.
 
 Right-click on the WinPT icon on your Windows taskbar and select
@@ -1065,17 +1061,17 @@
 
 If the status line on the window displays the following message
 \emph{Invalid Signature}%someone check if this is the right text used in
-the program, i did not encounter it so I am not sure of the tranlsation,
-although i think this should be right
+%the program, i did not encounter it so I am not sure of the tranlsation,
+%although i think this should be right FIXME
 
-it means that the message has been altered after it was sent.  This does
+it means that the message has been altered after being sent.  This does
 not always mean that a third party has altered the message, as it could
-also have been altered through a technical error during transmissiont
+also have been altered by a technical error during transmission
 through the Internet. 
 
 \textbf{ \OtherBook{} Before continuing, you may want to read Chapter 10
 of the manual "`\xlink{Gpg4win for Advanced Users}{durchblicker.html}"'
-which contains additional information on how to handle and manage
+which contains additional information on how to deal with
 invalid signatures.}
 
 \clearpage
@@ -1102,7 +1098,7 @@
 \clearpage
 %% Original page 45
 You should now see a window containing the keys on your key ring. Using
-the examples featured in this manual, you would see Adele's key (the one
+the examples featured in this guide, you would see Adele's key (the one
 she sent to you), as well as your own key, which you created in Chapter
 2.
 
@@ -1111,11 +1107,11 @@
 \IncludeImage[width=0.7\textwidth]{sc-winpt-sel-enc-key}
 \end{center}
 
-Click on Adele's key to encrypt the message you just composed, keeing in
+Click on Adele's key to encrypt the message you just composed, keeping in
 mind the following principle:
 
 \textbf{In order to send someone encrypted \Email{}s, you need to have
-that person's public key to encrypt the message properly.}
+that person's public key in order to encrypt the message properly.}
 
 Clicking on \Button{OK} starts the encryption process, which will be
 confirmed by the program if successful.
@@ -1126,7 +1122,7 @@
 which you can copy it into the \Email{} window.  You can erase the
 unencrypted text or just copy and paste the contents of the clipboard.
 
-It would look something like this: 
+It will look something like this: 
 
 % screenshot: composer Windows mit enrcypted text 
 \begin{center}
@@ -1145,20 +1141,20 @@
 %% Original page 47
 \section{How to archive/store encrypted \Email{}s}
 
-It is probably not wise to store the full(ie. decrypted) text of your
-encrypted \Email{}s on your computer (they were encrypted for a reason,
-after all). Therefore it is advisable to always store the encrypted
-copies of the \Email{}.
+It is probably not wise to store the readable (clear)text of your
+encrypted \Email{}s on your computer (after all, they were encrypted 
+for a reason). Therefore it is sensible to store encrypted
+copies of the \Email{}s.
 
-You may already guess the problem at hand: In order to decrypt the
+You may already have guessed resulting problem: To decrypt the
 archived \Email{}s you need the private key of the recipient, which will
-(or at least should) never be available to you. $\ldots$
+(should) never be available to you. $\ldots$
 
-The solution: You encrypt messages to yourself as well. 
+The solution: You encrypt the messages to yourself as well. 
 
-You can encrypt a message designated for a recipient (ex. Adele) using
-their own as well as your own public key. This allows you to decrypt the
-text later using your private key.
+You can encrypt a message designated for a recipient (e.g. Adele) using
+their own as well as your own public key, which allows you to decrypt the
+text later using your own private key.
 
 Since Gpg4win cannot tell the difference between the different keys used
 to encrypt a message (ie. you could have more than one key), you need to
@@ -1177,7 +1173,7 @@
 This opens the GnuPG Preferences Window. You can add your key in the
 "Encrypt to this key" field using your \Email{}address.
 
-\Email{}programs which directly support GnuPG will also feature this
+\Email{} programs which directly support GnuPG will also feature this
 option.
 
 \clearpage
@@ -1189,7 +1185,7 @@
 his/her public key.
 
 \item You also set up WinPT to encrypt archived copies of your \Email{}s
-with your own private key.
+with your own public key.
 \end{enumerate}
 
 \textbf{And that's it - welcome to the world of free and secure \Email{}
@@ -1197,20 +1193,19 @@
 
 \textbf{
 \OtherBook{} We recommend you read Chapter 10 to 12 of the manual "`
-\xlink{Gpg4win
-for Advanced Users}{durchblicker.html}"' for additional information on
-adding signatures to \Email{}s, as well as importing and using an
-existing private key in GnuPG.
+\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' 
+for additional information on adding signatures to \Email{}s, as well 
+as importing and using an existing private key in GnuPG.
 }
 
 \textbf{
-\OtherBook{} Furthermore, Chapters 13 and 14 of the manual "`
-\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' provide you with
-additional information regarding the premises on which GnuPG's security
-features are based, as well as detailed insights into the mathematical
-concepts behind GnuPG.  These texts are easily readable, as they were
-created for \textbf{the every day user}, not mathematicians or
-cryptographs. }
+\OtherBook{} Furthermore, Chapters 13 and 14 of the manual 
+"`\xlink{Gpg4win for Advanced Users}{durchblicker.html}"' give you 
+additional information about the ideas behind GnuPG's security
+features, as well as detailed insights into the mathematical
+concepts used.  These chapters are easy to read, they were
+written for \textbf{the every day user}, not mathematicians and
+cryptographers. }
 
 
 \newpage
@@ -1218,16 +1213,16 @@
 \section{Suggestions regarding the Outlook plugin \emph{GPGol}}
 
 GPGol, a Microsoft Outlook plugin, integrates the operation of GnuPG.
-Here are some tips regarding the operation of this plugin.
+Here are some tips about the operation of this plugin.
 
-While it is fairly easy to operate the plugin in other \Email{}programs,
-the technical difficulties associated with the integration of OpenPGP in
-Outlook make it harder to operate the plugin in this context.
+While it is fairly easy to operate the plugin in other \Email{} programs,
+technical difficulties associated with its integration of OpenPGP
+into Outlook make it harder to operate in this context.
 
-The current version of GPGol works only with Outlook 2003 SP2, and will
-notify you if you are using an older version of Outlook. 
+The current version of GPGol works only with Outlook 2003 SP2 and will
+notify you if you are using an older version.
 
-You should also be aware of the following limitations:
+Please be aware of the following limitations:
 
 \begin{itemize}
 \item Do not use Word as your text editor. 
@@ -1235,8 +1230,8 @@
 \item Inline-PGP or the conventional PGP is fully supported, however,
 PGP/MIME \Email{}s cannot be created. 
 
-On the other hand, it does support the decryption and signature
-verification of simple (unlike more complex) PGP/MIME \Email{}s.
+On the other hand, decryption and signature verification of simple,
+as opposed to more complex, PGP/MIME \Email{}s, is not supported.
 \end{itemize}
 
 
@@ -1251,9 +1246,8 @@
 \end{center}
 
 The first two options of this tab allow you to set default settings
-regarding the encryption and signature of new messages. Note that you
-can always change these settings at the time you are creating new
-messages.
+to do with encrypting and signing new messages.  Note that you
+can always change these settings when creating new messages.
 
 The option "Save decrypted message automatically" will save attachments
 as unencrypted text (after decryption). As a result, the attachment can
@@ -1278,11 +1272,11 @@
 it will be shown in text format. 
 
 There are a number of preset default settings which take effect after
-the initial installation. However, you should also ensure that you are
-not using \textbf{Microsoft Word} to compose messages.  We also
-recommend against using HTML messages.
+initial installation. However, you should also ensure that you are
+not using \textbf{Microsoft Word} to compose messages.  We also do not
+recommend using HTML messages.
 
-You can set these option using the \Menu{Mail Format}tab in the
+You can set these option using the \Menu{Mail Format} tab in the
 \Menu{Tools$\rightarrow$Options} menu.  Your settings should look like
 this:
 
@@ -1298,12 +1292,12 @@
 tray.] 
 
 %The german text below was somewhat confusing - I know what they are
-trying to accomplish here and changed the english text slightly.
+%trying to accomplish here and changed the english text slightly.
 
 If the system tray contains a large number of icons, it may not display
-all of them directly. Clicking on the arrow at the end of the system
+all of them. Clicking on the arrow at the right end of the system
 tray (located on the bottom right hand side of most computers) will open
-the tray to show all icons including the Key Manager icon.
+up the tray to show all icons, including the Key Manager icon.
 
 Again, make sure that you are not using Microsoft Word to compose
 messages (see installation instructions).
@@ -1311,8 +1305,8 @@
 \item[What is the meaning of the letters included in the GnuPG tab?] 
 
   GPGol lists the components and their associated file names as part of
-the decryption or signature verification of messages. File names
-containing encrypted attachments are prefaced with "`E"', while signed
+the decryption or message signature verification. File names
+containing encrypted attachments are prefaced with "`E"', and signed
 attachments are marked with an "`S"'. 
 
 \item[Where can I locate information regarding the latest version
@@ -1339,15 +1333,15 @@
 sometimes it is necessary in order to properly display encrypted or
 signed \Email{}s.
 
-GPGol is still in the development process. One outstanding issue is its
-registration as a trusted plugin. Future versions ofGPGol should be able
-to solve the issue of having to confirm each or certain emails.
+GPGol is still "`in development"'. One outstanding issue is its
+registration as a trusted plugin. Future versions of GPGol should be able
+to solve the issue of needing to confirm some or all \Email{}s.
 
 \item[How come GPGol cannot create PGP/MIME messages?]
 
-At the present there is no way of telling Outlook that a PGP/MIME
+At the present, there is no way of telling Outlook that a PGP/MIME
 message is to be created. Outlook decides on its own which
-"`Content-Type"'is to be used, as the plugin is not able to preset a
+"`Content-Type"' is to be used, as the plugin is not able to preset a
 certain type.  You may want to contact Microsoft directly to talk about
 this setting and/or missing documentation regarding this setup.
 
@@ -1364,32 +1358,33 @@
 \section{Transferring from other GnuPG programs}
 \label{ch:migration}
 
-This section explains how to transfer to Gpg4win from other GnuPG-based
-programs. The installation program will recognize some of these programs
-and notify you if that is the case.
+This section explains how to migrate from out GnuPG-based programs to Gpg4win.
+The installation program recognizes some of these programs
+and notifies you if that is the case.
 
-As a general rule it is recommended that an existing GnuPG-based program
+As a general rule it is recommended that existing GnuPG-based programs
 be removed before installing Gpg4win. 
 
-Do not forget to save existing keys. The best way to do this is to use
-the options in the existing system. Select the option to save a private
-(secret) key, as well as all existing public keys.  Save these in one or
-two files.
+\textbf{Always} save a backup of the existing keys. 
+The best way to do this is to use
+the options in the existing system before installation Gpg4win.
+Select the option to save any private (secret) keys, 
+as well as all existing public keys.  Save these in one or two files.
 
 As soon as Gpg4win is installed, check if your existing keys are listed
-in the new program (using either GPA or WinPT). If yes, the previous
-system was able to use the new rules regarding key storage, and no
-additional action is required on your part. 
+in the new program (using either GPA or WinPT). If yes, Gpg4win 
+was able to detect the previous key storage and you
+need take no further action.
 
-If the program does not list the existing keys, you can import them from
-your backup file.  For more information on this topic, refer to Chapter
+If the program does not list the existing keys, you must import them from
+your backup file(s).  For more information on this topic, refer to Chapter
 12 in the manual "`\xlink{Gpg4win for Avanced
 Users}{durchblicker.html}"'.
 
-If your older system also includes GPA, you can use its back-up option
+If your older system also includes GPA, you can use its back-up option,
 which should be very similar to the operation of GPA in Gpg4win.
 
-Also, if you are not able to locate your existing keys, use the 'Search'
+If you are not able to locate your existing keys, use the 'Search'
 function in Windows to find the files named \Filename{secring.gpg} and
 \Filename{pubring.gpg} an import them per GPA.\footnote{This is not the
 official procedure, but it works with all current versions of GnuPG.}
@@ -1408,7 +1403,7 @@
   Layout: Isabel Kramer, Bihlmeier \& Kramer GbR\\
   Documentation: Dr. Francis Wray, e-mediate Ltd.\\
   Editor: Ute Bahn, TextLab text+media\\
-  Published by the Federal Ministry for Industry and Technology.\\
+  Published by the German Federal Ministry for Industry \& Technology.\\
   Available at
   \verb-http://www.gnupp.de/pdf/einsteiger.pdf-.
 %    Der Abschnitt "`History"' ist im Originaldokument nicht vorhanden



More information about the Gpg4win-commits mailing list