mirror of
https://github.com/cheat/cheat.git
synced 2024-12-18 10:45:05 +01:00
Merge pull request #51 from fuzzgun/master
Added sheets for emacs and gpg
This commit is contained in:
commit
d3de6c71c0
70
cheatsheets/emacs
Normal file
70
cheatsheets/emacs
Normal file
@ -0,0 +1,70 @@
|
||||
# Basic usage
|
||||
|
||||
Indent Select text then press TAB
|
||||
Cut CTRL-w
|
||||
Copy ALT-w
|
||||
Paste CTRL-y
|
||||
Search/Find CTRL-s
|
||||
Replace ALT-% (ALT-SHIFT-5)
|
||||
Save CTRL-x CTRL-s
|
||||
Load/Open CTRL-x CTRL-f
|
||||
Undo CTRL-x u
|
||||
Highlight all text CTRL-x h
|
||||
Directory listing CTRL-x d
|
||||
Cancel a command ESC ESC ESC
|
||||
Font size bigger CTRL-x CTRL-+
|
||||
Font size smaller CTRL-x CTRL--
|
||||
|
||||
# Buffers
|
||||
|
||||
Split screen vertically CTRL-x 2
|
||||
Split screen vertically with 5 row height CTRL-u 5 CTRL-x 2
|
||||
Split screen horizontally CTRL-x 3
|
||||
Split screen horizontally with 24 column width CTRL-u 24 CTRL-x 3
|
||||
Revert to single screen CTRL-x 1
|
||||
Hide the current screen CTRL-x 0
|
||||
Kill the current screen CTRL-x k
|
||||
Move to the next buffer CTRL-x O
|
||||
Select a buffer CTRL-x b
|
||||
Run command in the scratch buffer CTRL-x CTRL-e
|
||||
|
||||
# Other stuff
|
||||
|
||||
Open a shell ALT-x eshell
|
||||
Goto a line number ALT-x goto-line
|
||||
Word wrap ALT-x toggle-word-wrap
|
||||
Spell checking ALT-x flyspell-mode
|
||||
Line numbers ALT-x linum-mode
|
||||
Toggle line wrap ALT-x visual-line-mode
|
||||
Compile some code ALT-x compile
|
||||
List packages ALT-x package-list-packages
|
||||
|
||||
# Sudoing within eshell
|
||||
|
||||
By default when using the sudo command within eshell you'll just
|
||||
get "permission denied" messages. To overcome that type:
|
||||
|
||||
alias sudo '*sudo $*'
|
||||
|
||||
# Line numbers
|
||||
|
||||
To add line numbers and enable moving to a line with CTRL-l:
|
||||
|
||||
(global-set-key "\C-l" 'goto-line)
|
||||
(add-hook 'find-file-hook (lambda () (linum-mode 1)))
|
||||
|
||||
# Org-mode
|
||||
|
||||
To begin org-mode ALT-x org-mode
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Section heading *
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
173
cheatsheets/gpg
Normal file
173
cheatsheets/gpg
Normal file
@ -0,0 +1,173 @@
|
||||
# Create a key
|
||||
|
||||
gpg --gen-key
|
||||
|
||||
|
||||
# Show keys
|
||||
|
||||
To list a summary of all keys
|
||||
|
||||
gpg --list-keys
|
||||
|
||||
To show your public key
|
||||
|
||||
gpg --armor --export
|
||||
|
||||
To show the fingerprint for a key
|
||||
|
||||
gpg --fingerprint KEY_ID
|
||||
|
||||
# Search for keys
|
||||
|
||||
gpg --search-keys 'user@emailaddress.com'
|
||||
|
||||
|
||||
# To Encrypt a File
|
||||
|
||||
gpg --encrypt --recipient 'user@emailaddress.com' example.txt
|
||||
|
||||
|
||||
# To Decrypt a File
|
||||
|
||||
gpg --output example.txt --decrypt example.txt.gpg
|
||||
|
||||
|
||||
# Export keys
|
||||
|
||||
gpg --output ~/public_key.txt --armor --export KEY_ID
|
||||
gpg --output ~/private_key.txt --armor --export-secret-key KEY_ID
|
||||
|
||||
Where KEY_ID is the 8 character GPG key ID.
|
||||
|
||||
Store these files to a safe location, such as a USB drive, then
|
||||
remove the private key file.
|
||||
|
||||
shred -zu ~/private_key.txt
|
||||
|
||||
# Import keys
|
||||
|
||||
Retrieve the key files which you previously exported.
|
||||
|
||||
gpg --import ~/public_key.txt
|
||||
gpg --allow-secret-key-import --import ~/private_key.txt
|
||||
|
||||
Then delete the private key file.
|
||||
|
||||
shred -zu ~/private_key.txt
|
||||
|
||||
# Revoke a key
|
||||
|
||||
Create a revocation certificate.
|
||||
|
||||
gpg --output ~/revoke.asc --gen-revoke KEY_ID
|
||||
|
||||
Where KEY_ID is the 8 character GPG key ID.
|
||||
|
||||
After creating the certificate import it.
|
||||
|
||||
gpg --import ~/revoke.asc
|
||||
|
||||
Then ensure that key servers know about the revokation.
|
||||
|
||||
gpg --send-keys KEY_ID
|
||||
|
||||
# Signing and Verifying files
|
||||
|
||||
If you're uploading files to launchpad you may also want to include
|
||||
a GPG signature file.
|
||||
|
||||
gpg -ba filename
|
||||
|
||||
or if you need to specify a particular key:
|
||||
|
||||
gpg --default-key <key ID> -ba filename
|
||||
|
||||
This then produces a file with a .asc extension which can be uploaded.
|
||||
If you need to set the default key more permanently then edit the
|
||||
file ~/.gnupg/gpg.conf and set the default-key parameter.
|
||||
|
||||
To verify a downloaded file using its signature file.
|
||||
|
||||
gpg --verify filename.asc
|
||||
|
||||
# Signing Public Keys
|
||||
|
||||
Import the public key or retrieve it from a server.
|
||||
|
||||
gpg --keyserver <keyserver> --recv-keys <Key_ID>
|
||||
|
||||
Check its fingerprint against any previously stated value.
|
||||
|
||||
gpg --fingerprint <Key_ID>
|
||||
|
||||
Sign the key.
|
||||
|
||||
gpg --sign-key <Key_ID>
|
||||
|
||||
Upload the signed key to a server.
|
||||
|
||||
gpg --keyserver <keyserver> --send-key <Key_ID>
|
||||
|
||||
# Change the email address associated with a GPG key
|
||||
|
||||
gpg --edit-key <key ID>
|
||||
adduid
|
||||
|
||||
Enter the new name and email address. You can then list the addresses with:
|
||||
|
||||
list
|
||||
|
||||
If you want to delete a previous email address first select it:
|
||||
|
||||
uid <list number>
|
||||
|
||||
Then delete it with:
|
||||
|
||||
deluid
|
||||
|
||||
To finish type:
|
||||
|
||||
save
|
||||
|
||||
Publish the key to a server:
|
||||
|
||||
gpg --send-keys <key ID>
|
||||
|
||||
# Creating Subkeys
|
||||
|
||||
Subkeys can be useful if you don't wish to have your main GPG key
|
||||
installed on multiple machines. In this way you can keep your
|
||||
master key safe and have subkeys with expiry periods or which may be
|
||||
separately revoked installed on various machines. This avoids
|
||||
generating entirely separate keys and so breaking any web of trust
|
||||
which has been established.
|
||||
|
||||
gpg --edit-key <key ID>
|
||||
|
||||
At the prompt type:
|
||||
|
||||
addkey
|
||||
|
||||
Choose RSA (sign only), 4096 bits and select an expiry period.
|
||||
Entropy will be gathered.
|
||||
|
||||
At the prompt type:
|
||||
|
||||
save
|
||||
|
||||
You can also repeat the procedure, but selecting RSA (encrypt only).
|
||||
To remove the master key, leaving only the subkey/s in place:
|
||||
|
||||
gpg --export-secret-subkeys <subkey ID> > subkeys
|
||||
gpg --export <key ID> > pubkeys
|
||||
gpg --delete-secret-key <key ID>
|
||||
|
||||
Import the keys back.
|
||||
|
||||
gpg --import pubkeys subkeys
|
||||
|
||||
Verify the import.
|
||||
|
||||
gpg -K
|
||||
|
||||
Should show sec# instead of just sec.
|
Loading…
Reference in New Issue
Block a user