Must have applications on Linux

The below list of applications is a must-have for any Linux system. Not just for convenience, but additional capabilities too. The below list of applications is a must-have for any Linux system. Not just for convenience, but additional capabilities too. Download From internet Firefox Thunderbird Android Studio VirtualBox Google Chrome Mega InsyncHQ Spotify Vivaldi Browser … Continue reading Must have applications on Linux

How to start up Thunderbird mail client on another path or computer in Linux

After moving Thunderbird folder i.e. ~/.thunderbird to another computer, it could not find the mailbox of the profile. It created a new profile. This was due to the change in the path where ~/.thunderbird folder was restored. To overcome this issue, open a terminal window and enter the following: $ cd ~/thunderbird <enter>$ ./thunderbird -profilemanager … Continue reading How to start up Thunderbird mail client on another path or computer in Linux

How to revoke a GnuPG / GPG key in Linux

If your Gnu Privacy Guard or GPG or GnuPG key has been compromised or something has gone wrong, you can revoke your key. Make sure that you generated a revocation certificate and stored in a safe place to do so. To revoke a key, open a terminal in Linux, and enter the following command: $ … Continue reading How to revoke a GnuPG / GPG key in Linux

How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it

We saw how to create a GPG, GnuPG or PGP key pair in earlier posts. Now we need to tell Evolution that we have a PGP key pair that can be used to sign email messages and also encrypt them. To sign, all you need is create a GPG, GnuPG or PGP key pairthe private … Continue reading How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it

How to generate a revocation certificate for your GnuPG / GPG key

Whenever you create a key pair using GNU Privacy Guard, you need to make sure you also generate a revocation certificate for your key. Sometimes, keys are lost, misplaced, deleted, passwords forgotten and so on. To ensure that you revoke the keys you created, you need a revocation certificate. Simply deleting a key file or … Continue reading How to generate a revocation certificate for your GnuPG / GPG key