Mar 22, 2022How to create GPG key pair.There are many uses for gpg, like signing/encrypting emails, signing commits, linux password store, use gpg as ssh agent, etc… This is similar to creating ssh key where you choose key size, specify an identifier, and set a passphrase. …6 min read6 min read
Mar 22, 2022A Google quiz that helps you spot email phishing scams better.Many people fall for those bogus emails which range from attractive shopping offers to fake emails telling you to secure your online accounts. Identifying a phishing email might not be easy as you think. You may only realise that you clicked a malicious link after it’s done. So what is a Phishing email? A phishing email…1 min read1 min read