Pretty Good Privacy version 2.6

Synopsis: PGP(tm) uses public-key encryption to protect E-mail and data files. Communicate securely with people you've never met, with no secure channels needed for prior exchange of keys. PGP is well featured and fast, with sophisticated key management, digital signatures, data compression, and good ergonomic design.

Software and documentation (c) Copyright 1990-1994 Philip Zimmermann. All rights reserved. For information on PGP licensing, distribution, copyrights, patents, trademarks, liability limitations, and export controls, see the "Legal Issues" section in the "PGP User's Guide, Volume II: Special Topics". Distributed by the Massachusetts Institute of Technology.

"Whatever you do will be insignificant, but it is very important that you do it." --Mahatma Gandhi

PGP (Pretty Good Privacy) ver 2.5 - RSA public-key encryption freeware for MSDOS, protects E-mail. Lets you communicate securely with people you've never met, with no secure channels needed for prior exchange of keys. Well featured and fast! Excellent user documentation.

PGP has sophisticated key management, an RSA/conventional hybrid encryption scheme, message digests for digital signatures, data
compression before encryption, and good ergonomic design. Source code is free.

a description of ASCII armor. An ASCII armored file is just like a binary file described here, but with an extra layer of encoding added, framing lines, and a 24-bit CRC at the end.


For Clinical Paranoia Sufferers Only

It is always possible that the PGP you have received has been tampered with in some way. This is a risk because PGP is used as a system to assure security, so those wishing to breach your security could likely do it by making sure that your copy of PGP has been tampered with. Of course, if you receive PGP in a binary distribution, it makes sense to check it for viruses, and if you receive PGP as source code, looking for signs of obvious tampering might be a good idea. However, it is very difficult to actually determine if the code has no subtle bugs
that have been introduced and that the executable you are using has not been tampered with in any way.

If you have a previous version of PGP which you already trust, the cryptographic signature on the executable will assure you that it has
not been tampered with (with the possible exception of a "stealth virus" already existing on your system). If you are a really paranoid person, try getting a cryptographically signed copy of the software from someone you trust to have a good copy. It would also likely be good for you to pay special attention to the sections of the manual on "Vulnerabilities." You are going to read the manual, aren't you?


Compilation Copyright (c) 1994 by the Massachusetts Institute of Technology. All rights reserved.

Permission to use, copy, modify, and distribute this compilation for any non-commercial purpose is hereby granted without fee, subject to the following license:

1. Any copy or modification of this compilation must include the above copyright notice and this license.

2. Software included in this compilation includes a feature that causes the format of messages generated by it to change on September 1, 1994. Modification to this software to disable this feature is not authorized and will make this license, and the license in the underlying software, null and void.

3. Users of the software included in this compilation agree to use their best efforts to provide MIT with any modifications containing improvements or extensions and hereby grant MIT a perpetual, royalty-free license to use and distribute such modifications under the terms of this license. Such modifications may be provided to
MIT by email to [email protected].

4. The software included in this compilation makes use of the RSAREF(TM) Cryptographic Toolkit, use and distribution of which are covered by the RSA Data Security, Inc., Program License Agreement included in this compilation. This compilation also contains materials copyrighted by Philip Zimmermann under terms also included in this compilation. (See the "Legal Issues" section of the PGP User's Guide, Volume 2.) Users must also agree to the terms of both of these licenses.

5. MIT makes no warranty or representation that the operation of the software in this compilation will be error-free, and MIT is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL MIT OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF MIT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

6.Users will not use the name of the Massachusetts Institute of Technology nor any adaptation thereof in any publicity or advertising, without prior written consent from MIT in each case.

7. Export of this software from the United States may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting.


DOWNLOAD THESE FILES NOW!

Once downloaded unzip into new directories, use the file names for the directories names.

pgp.zip winfront.zip doc.zip