Post by RichardMThe latest version I've bought for a company was PGP 7.0.3.
PGP 6.5.8. still works well, but the supplied plug-ins don't.
If I remember correctly PGP 6.5.8. is also accessable trough the
MS-DOS command line.
If you are experienced with programming, then, PGP 6.5.8. is very
neat to create your own custom wrappers.
If you want to use PGP for commercial purposes then you should
contact the PGP corporation for the right solution. (www.pgp.com)
If you stay up to date with the latest releases of Windows than
you should have to do that with PGP too I guess.
GnuPG works quiet similar to PGP, but is not equal. (!)
I appreciate your comments - thank you.
I have looked at 3 options so far...
McAfee eBusiness Server (http://www.mcafee.com/us/products/e-business-
server.aspx) appears to be the "natural descendant" of PGP 6.5.8.
There is even a "legacy mode" option that can be used to set up
aliases using old v6.5.8 syntax for commands.
Symantec now owns PGP Corporation, and PGP Command Line 10.x is the
current version. We also use PGP 8.x for a GUI interface, so that
would "match up" nicely. I know they are the current industry leader.
GnuPG requires a separate add-on for IDEA cipher (which we will need).
Since we'll be running in a Windows environment, I have reservations
about GPG. The user base is overwhelmingly Linux/UNIX
(understandably). It does look like there are a good number of Win
users though also. Do you think I should I be concerned about this at
all?
------------------------
And some other questions about pgp...
I'm a bit new to the details of pgp and am unclear on the difference
between an encryption algorithm and a cipher. Would anyone like to try
explaining the difference, or point me to a good source? I'll do some
more googling over the weekend also.
Is there a way to determine the original program that created the
public key, or can I only read the program that exported the key? (For
example, I exported public keys from a keyring using PGP 8.1 and that
is what shows up at the top of each key - but I'm wondering if I can
determine the software with which each key was created.)
Thanks again,
Nancy