From 2973526567a392d6946af2af82ac8efd93c14d7a Mon Sep 17 00:00:00 2001 From: Paul Buetow Date: Sat, 1 May 2021 08:59:26 +0100 Subject: more cleanup --- .../content/Tutorials.sub/10.Passwords.xml | 40 ---------------------- .../content/Tutorials.sub/20.Files.xml | 17 --------- pwgrep.buetow.org/content/Tutorials.sub/home.xml | 5 --- 3 files changed, 62 deletions(-) delete mode 100644 pwgrep.buetow.org/content/Tutorials.sub/10.Passwords.xml delete mode 100644 pwgrep.buetow.org/content/Tutorials.sub/20.Files.xml delete mode 100644 pwgrep.buetow.org/content/Tutorials.sub/home.xml (limited to 'pwgrep.buetow.org/content/Tutorials.sub') diff --git a/pwgrep.buetow.org/content/Tutorials.sub/10.Passwords.xml b/pwgrep.buetow.org/content/Tutorials.sub/10.Passwords.xml deleted file mode 100644 index d503edc..0000000 --- a/pwgrep.buetow.org/content/Tutorials.sub/10.Passwords.xml +++ /dev/null @@ -1,40 +0,0 @@ - - - Tutorial for storing passwords - First check out pwgrep from git and edit the configuration parameters in its header. Also setup a versioning repository (e.g. svn) for your password database storage (preferable using some encryption for checkout/update operations such as SSL or SSH). Afterwards you may go on with the usage of pwgrep itself: - Please note that the current version of pwgrep is configured to work with git. The rest of this tutorial however should work as with svn. - The database file is divided in several records. Each record begins with its name followed by several lines holding all the secret information. The (actually very simple) format of the database file is as follows: - -some record name here - after a tabulator some secret information - more secret information -another record name here - secret username: foo - secret password is bla - you can write as many secret infos as you wish -. -. -secret stuff - password: hello world - username: mr. universe -. -. - - The database is not stored in plain text. It is encrypted using GnuPG (database.gpg). - I can only search for the record names of a database file. For example if I want to see my secret username and password which is stored in the database.gpg file it will look like this: - - After entering the password of my secret GnuPG key I will receive the information requested: - - pwgrep will print out automatically all records matching my search string. Not only the first one it finds. - I can use pwedit for the case I want to add something to the database or just to edit/delete something of the current database: - - - After editing, pwgrep will automatically wipe all temporally files securely and it will commit the new version into the versioning system (In this case subversion is being used. But others can be configured as well). pwgrep is using Vim (with swapping and backuping disabled) in order to edit the database file. If you want to use a different editor, you should make sure NOT to produce temporally files. If you produce temporally files, at least they should get wiped securely from the hard disk. - - - If you want to look up your secret ebay stuff, just search for it with - ~/svn/pwgrep$ pwgrep ebay - Since pwgrep v0.5 it's possible to specify the offline option, which causes pwgrep not use versioning at all (usable if there is no connection to the subversion or CVS server available): - ~/svn/pwgrep$ pwgrep -o ebay - All commands support the -o option - diff --git a/pwgrep.buetow.org/content/Tutorials.sub/20.Files.xml b/pwgrep.buetow.org/content/Tutorials.sub/20.Files.xml deleted file mode 100644 index 06f443f..0000000 --- a/pwgrep.buetow.org/content/Tutorials.sub/20.Files.xml +++ /dev/null @@ -1,17 +0,0 @@ - - - Tutorial for storing files - Please read the "tutorial for storing passwords" first. Afterwards you may go on with this tutorial. This tutorial expects you to have understood the basics of pwgrep. - Besides of storing passwords into a single file, pwgrep can also be used for storing a collection of files, which is very usefull for storing certificate files etc. Like passwords, all files stored within pwgrep are encrypted using GPG. The command pwfls will list all files currently stored in your database: - - pwfadd adds a specific file to the database: - - - pwfls will show you that it has been added successfully: - - In order to decrypt a specific stored file you have to use pwfcat: - - File deletion can be accomplished using pwfdel: - - In general you can decrypt/store/encrypt any specific file format (as well as binary files). - diff --git a/pwgrep.buetow.org/content/Tutorials.sub/home.xml b/pwgrep.buetow.org/content/Tutorials.sub/home.xml deleted file mode 100644 index 5b89810..0000000 --- a/pwgrep.buetow.org/content/Tutorials.sub/home.xml +++ /dev/null @@ -1,5 +0,0 @@ - - - Tutorials... - ...for using pwgrep. - -- cgit v1.2.3