From 0b8ca6637be94f7814cafa7d01ad4699672ff336 Mon Sep 17 00:00:00 2001 From: Darrell Anderson Date: Tue, 21 Jan 2014 22:06:48 -0600 Subject: Beautify docbook files --- .../docs/tdebase/kcontrol/crypto/index.docbook | 278 +++++---------------- 1 file changed, 63 insertions(+), 215 deletions(-) (limited to 'tde-i18n-en_GB/docs/tdebase/kcontrol/crypto') diff --git a/tde-i18n-en_GB/docs/tdebase/kcontrol/crypto/index.docbook b/tde-i18n-en_GB/docs/tdebase/kcontrol/crypto/index.docbook index 0c4d8e716c4..65ec3b1d583 100644 --- a/tde-i18n-en_GB/docs/tdebase/kcontrol/crypto/index.docbook +++ b/tde-i18n-en_GB/docs/tdebase/kcontrol/crypto/index.docbook @@ -2,311 +2,159 @@ - + ]>
-&Mike.McBride; &Mike.McBride.mail; -MalcolmHunter
malcolm.hunter@gmx.co.uk
Conversion to British English
+&Mike.McBride; &Mike.McBride.mail; +MalcolmHunter
malcolm.hunter@gmx.co.uk
Conversion to British English
-2002-10-17 -3.1 +2002-10-17 +3.1 -KDE -KControl -crypto -SSL -encryption +KDE +KControl +crypto +SSL +encryption
-Encryption Configuration +Encryption Configuration -Introduction -Many applications within &kde; are capable of exchanging information using encrypted files and/or network transmissions. +Introduction +Many applications within &kde; are capable of exchanging information using encrypted files and/or network transmissions. -Use - -All encryption schemes are only as strong as their weakest link. In general, unless you have some previous training/knowledge, it is better to leave this module unchanged. - -The options within this module can be divided into two groups: - -Two options along the bottom of the module, Warn on entering SSL Mode and Warn on leaving SSL mode, allow you to determine if &kde; should inform you when you enter or leave SSL encryption. - -The remainder of the options are about determining which encryption methods to use, and which should not be used. Once you have selected the appropriate encryption protocols, simply click Apply to commit your changes. - -Only make changes to this module if specific information about the strength or weakness of a particular encryption method is given to you from a reliable source. +Use + +All encryption schemes are only as strong as their weakest link. In general, unless you have some previous training/knowledge, it is better to leave this module unchanged. + +The options within this module can be divided into two groups: + +Two options along the bottom of the module, Warn on entering SSL Mode and Warn on leaving SSL mode, allow you to determine if &kde; should inform you when you enter or leave SSL encryption. + +The remainder of the options are about determining which encryption methods to use, and which should not be used. Once you have selected the appropriate encryption protocols, simply click Apply to commit your changes. + +Only make changes to this module if specific information about the strength or weakness of a particular encryption method is given to you from a reliable source. -The <guilabel ->SSL</guilabel -> Tab - -The first option is Enable TLS support if supported by the server. TLS is Transport Layer Security, and is the newest version of SSL. It integrates better than SSL with other protocols, and it has replaced SSL in protocols such as POP3 and SMTP. - -Then next options are Enable SSL v2 and Enable SSL v3. These are the second and third revision of the SSL protocol, and it is normal to enable both. - -There are several different Ciphers available, and you can enable these separately in the lists labelled SSL v2 Ciphers to Use and SSL v3 Ciphers to Use. The actual protocol to use is negotiated by the application and the server when the connection is created. - -There are several Cipher Wizards to help you choose a set that is suitable for your use. +The <guilabel>SSL</guilabel> Tab + +The first option is Enable TLS support if supported by the server. TLS is Transport Layer Security, and is the newest version of SSL. It integrates better than SSL with other protocols, and it has replaced SSL in protocols such as POP3 and SMTP. + +Then next options are Enable SSL v2 and Enable SSL v3. These are the second and third revision of the SSL protocol, and it is normal to enable both. + +There are several different Ciphers available, and you can enable these separately in the lists labelled SSL v2 Ciphers to Use and SSL v3 Ciphers to Use. The actual protocol to use is negotiated by the application and the server when the connection is created. + +There are several Cipher Wizards to help you choose a set that is suitable for your use. -Most Compatible +Most Compatible -Select the settings found to be most compatible with the most servers. +Select the settings found to be most compatible with the most servers. -US Ciphers Only +US Ciphers Only -Select only the US strong (128 bit or greater) ciphers. +Select only the US strong (128 bit or greater) ciphers. -Export Ciphers Only +Export Ciphers Only -Select only the weak (56 bit or less) ciphers. +Select only the weak (56 bit or less) ciphers. -Enable All +Enable All -Select all ciphers and methods. +Select all ciphers and methods. -Finally, there are some general SSL settings. +Finally, there are some general SSL settings. -Use EGD +Use EGD -If selected, OpenSSL will be asked to use the entropy gathering daemon (EGD) for initialising the pseudo-random number generator. +If selected, OpenSSL will be asked to use the entropy gathering daemon (EGD) for initialising the pseudo-random number generator. -Use entropy file +Use entropy file -If selected, OpenSSL will be asked to use the given file as entropy for initialising the pseudo-random number generator. +If selected, OpenSSL will be asked to use the given file as entropy for initialising the pseudo-random number generator. -Warn on entering SSL mode +Warn on entering SSL mode -If selected, you will be notified when entering an SSL enabled site. +If selected, you will be notified when entering an SSL enabled site. -Warn on leaving SSL mode +Warn on leaving SSL mode -If selected, you will be notified when leaving an SSL based site. +If selected, you will be notified when leaving an SSL based site. -Warn on sending unencrypted data +Warn on sending unencrypted data -If selected, you will be notified before sending unencrypted data via a web browser. +If selected, you will be notified before sending unencrypted data via a web browser. -The <guilabel ->OpenSSL</guilabel -> Tab - -Here you can test if your OpenSSL libraries have been detected correctly by &kde;, with the Test button. - -If the test is unsuccessful, you can specify a path to the libraries in the field labelled Path to OpenSSL Shared Libraries. +The <guilabel>OpenSSL</guilabel> Tab + +Here you can test if your OpenSSL libraries have been detected correctly by &kde;, with the Test button. + +If the test is unsuccessful, you can specify a path to the libraries in the field labelled Path to OpenSSL Shared Libraries. -The <guilabel ->Your Certificates</guilabel -> Tab +The <guilabel>Your Certificates</guilabel> Tab -The list shows which certificates of yours &kde; knows about. You can easily manage them from here. +The list shows which certificates of yours &kde; knows about. You can easily manage them from here. -The <guilabel ->Authentication</guilabel -> Tab +The <guilabel>Authentication</guilabel> Tab -Not yet documented +Not yet documented -The <guilabel ->Peer SSL Certificates</guilabel -> Tab +The <guilabel>Peer SSL Certificates</guilabel> Tab -The list box shows which site and personal certificates &kde; knows about. You can easily manage them from here. +The list box shows which site and personal certificates &kde; knows about. You can easily manage them from here. -- cgit v1.2.1