[seahorse/wip/userdocs: 79/244] help: Get introduction.page ready for review
- From: Ekaterina Gerasimova <egerasimov src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [seahorse/wip/userdocs: 79/244] help: Get introduction.page ready for review
- Date: Mon, 17 Mar 2014 11:00:48 +0000 (UTC)
commit 38e2046c6ff03b4278b2b614a58c3373331804be
Author: Aruna Sankaranarayanan <arunasank src gnome org>
Date: Mon Jul 22 11:33:08 2013 -0400
help: Get introduction.page ready for review
help/C/introduction.page | 35 +++++++++++++++++------------------
1 files changed, 17 insertions(+), 18 deletions(-)
---
diff --git a/help/C/introduction.page b/help/C/introduction.page
index 87cf917..3bfb568 100644
--- a/help/C/introduction.page
+++ b/help/C/introduction.page
@@ -6,7 +6,7 @@
<link type="guide" xref="index"/>
<revision pkgversion="3.8" date="2013-02-26" status="stub"/>
- <revision pkgversion="3.9" date="2013-06-13" status="draft"/>
+ <revision pkgversion="3.9" version="0.1" date="2013-06-13" status="review"/>
<include href="legal.xml" xmlns="http://www.w3.org/2001/XInclude"/>
@@ -21,17 +21,18 @@
<title>Introduction</title>
- <p><app>Passwords and Keys</app> helps you to communicate securely over the
- Internet and keep your files and data safe. It provides advanced mathematical
- methods and secret keys to protect your files and communication. Some basic
- terms that you may encounter while reading this help are:</p>
+ <p><app>Passwords and Keys</app> helps you to generate and manage tokens that
+ can be used to protect your files and communication. Some basic terms you
+ will encounter while reading this help are:</p>
<terms>
<item>
<title>Encryption</title>
- <p>Encryption is the process of making your important files and data
- unreadable to anyone but the intended recipient. It is done by the
- sender.</p>
+ <p>Encryption is the process of making your important files and data
+ unreadable to anyone but the intended recipient. When you encrypt your
+ data, it becomes a scrambled sequence of numbers and letters.
+ Encryption is done by someone who is sending a protected file, or
+ sending a message in a protected conversation.</p>
</item>
<item>
<title>Algorithm</title>
@@ -40,8 +41,10 @@
</item>
<item>
<title>Decryption</title>
- <p>Decryption is the process of retrieving the original text from the
- encrypted message or file. It is done by the receiver.</p>
+ <p>Decryption is the process of retrieving the original text from the
+ encrypted message or file. It is done by the receiver of the protected
+ file or communication. Encrypted messages cannot be understood without
+ decrypting them first.</p>
</item>
<item>
<title>Plaintext</title>
@@ -50,14 +53,10 @@
</item>
<item>
<title>Key</title>
- <p>A key is used to encrypt or decrypt your data. For example, if you
- wish to encrypt a personal message by substituting every letter in the
- message with a new letter according to some substitution set you have,
- the substitution set would be a key because anyone who has the
- substitution set can decrypt your message.
- <app>Passwords and Keys</app> uses advanced mathematical means to
- generate a key so that it is not guessable. Keys can be
- <link xref="what-diff-private-public">private or public</link>.</p>
+ <p>A key is used to encrypt and decrypt files and communication. A key
+ may also be used to login to a remote computer. Some types of keys are
+ <link xref="what-is-pgp-key">PGP keys</link> and
+ <link xref="what-is-ssh-key">SSH keys</link>.</p>
</item>
<item>
<title>Keyring</title>
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]