USB $B%a%b%jFb$N%U%!%$%k0E9f2=(B

[$BLa$k(B]

USB $B%a%b%j$H$$$&$N$OHs>o$KJXMx$JBeJ*$G$9(B. $B$h$/;H$&%D!<%k$rF~$l$F$*$$$?$j(B, $B2q5D;qNA$N%P%C%/%"%C%W$rG&$P$;$F$*$$$F(B, $BK|0l$N;vBV(B (PC $B$rK:$l$?$H$+5/F0$7$J$$$H$+(B) $B$KHw$($F$$$^$9(B.

$B$7$+$7(B, $B30=P@h$G2?5$$J$/(B USB $B%a%b%j$,pJs$OF~$l$F$J$$$N$G$9$,(B, $B$=$l$G$b$=$N6Z$N?M$,=&$C$FMxMQ$5$l$k$H(B, $B$^$:$$$3$H$K$J$k2DG=@-$OH]Dj$G$-$^$;$s(B.

USB $B%a%b%jFb$r0E9f2=$9$l$P:Q$`$s$G$9$,(B, $B$3$l$O$H$$$&%=%U%H$,L5$+$C$?(B ($B8+$D$1$F$J$+$C$?(B) $B$N$G(B, $B5$$,$R$1$F$^$7$?(B. $BI,?\$H9M$($k>r7o$O(B

$B$NFsE@$G$9(B. $B0lJ}(B, $B6/EY$O$=$3$^$G5a$a$^$;$s(B. $B=PMh?4$,KI$2$kDxEY$G$$$$$H;W$C$F$^$9(I!(B

$B@N(B RSA$B$K

$B@hF|(B, $B$R$5$S$5$K=P@h$G(B USB $B%a%b%j$,8+Ev$?$i$:$"$;$C$?$N$G(B, $B:#EY$3$=$O$H?4$rF~$lBX$((B, $B??7u$KC5$7$F$_$^$7$?(B. $B%T%s%]%$%s%H$N$b$N$O:#2s$b8+$D$+$j$^$;$s$,(B, GnuPG$B$r9)IW$9$l$P(B $B;H$($=$&$J$3$H$,J,$+$j$^$7$?(B. Windows $B$N(B$B%P%$%J%j(B $B$b$"$j$^$9(B. $B%$%s%9%H!<%k$9$k$H$$$m$$$mF~$C$A$c$$$^$9$,I,MW$J$N$O(B gpg.exe $B$@$1$G$9(B. $B$3$N%U%!%$%k$@$1C$7$F$b$$$$$G$7$g$&(B.

gpg.exe --homedir [DIR] --cipher-algo AES256 -c [FILE]
$B$H$9$l$P0E9f2=(B ($B$3$NNc$G$O(B AES 256bit $B$G(B),
gpg.exe --homedir [DIR] -o [FILE] --decrypt [FILE].gpg
$B$H$9$l$PJ#9g$G$-$^$9(B. $BEvA3$G$9$,(B, [DIR] $B$d(B [FILE] $B$O>u67$K1~$8$FE,Ev$K=q$-49$($F$/$@$5$$(B. --homedir [DIR] $B$O>JN,$7$F$bF0$-$^$9$,(B, $BBe$o$j$K(B Documents and Setting $B$N(B Application Data/gnupg $B$K%4%_$,=PMh$^$9(B ($BK\4QE@$+$i$O%4%_$H$$$&0UL#$G$9(B).

$B0E9f2=$5$l$k$H(B, $B%U%!%$%kL>$K(B gpg $B$H$$$&3HD%;R$,IU$-$^$9(B. $B%*%j%8%J%k$O$=$N$^$^$J$N$G(B, $BI,MW$K1~$8$FC$9I,MW$,$"$j$^$9(B. $B$?$@$7(B, $BIaDL$K:o=|$7$?$@$1$@$HE,Ev$J%D!<%k$G4JC1$KI|85$G$-$F$7$^$$$^$9(B. $B40`z$rK>$`$J$i(B File Shredder$BEy$N%D!<%k$G(B $BI|85$G$-$J$$$h$&$K>C5n$9$Y$-$G$7$g$&(B ($B$?$@$7(B, $B%$%s%9%H!<%kA`:n$,I,MW$G$9(B). $B$^$?(B, gpg.exe $B$OI|85$K@.8y$7$?$+$I$&$+$rCN$k$3$H$,$G$-$^$9$N$G(B, $B4JC1$K%Q%9%o!<%I$rAmEv$j$9$k%W%m%0%i%`$,:n$l$^$9(B ($B$b$A$m$s2rFI$K$O;~4V$O$+$+$j$^$9$,(B). $B$H$$$C$?$3$H$+$i(B, $B$3$N

$B$5$i$K(B, $BKh2s=P@h$G0E9f2=(B, $BI|9f$r9T$&$H9M$($k$H(B, $B>e5-%3%^%s%I$O(B $BD9$9$.$F6lDK$H$$$&$3$H$,$"$j$^$9(B. UNIX $B4D6-2<$G$OE,Ev$J%7%'%k%9%/%j%W%H$rAH$a$P:Q$`$N$G(B, Windows $B$,LdBj(B, $B$H$$$&$3$H$K$J$j$^$9(B. $B$=$3$I(B Windows $B$GF0$/(B$B%U%m%s%H%(%s%I(B $B$r:n$C$F$_$^$7$?(B. USB $B%a%b%j$KE,Ev$J%G%#%l%/%H%j$r7!$j(B, gpg.exe $B$H0l=o$KCV$$$F;H$o$l$k$3$H$r(B $BA[Dj$7$F$$$^$9(B.

$B5/F0$9$k$H>e$N$h$&$J2hLL$,N)$A>e$,$j$^$9(B. [Encrypt]/[Decrypt]$B%\%?%s$r2!$9$H(B, $B>e5-$7$?$h$&$J0z?t$r:n$C$F(B gpg.exe $B$r8F$S=P$7(B, $B7k2L$H$7$F%U%!%$%k$r0E9f2=(B/$BJ#9g$7$^$9(B. $B0E9f2=(B/$BJ#9g:n6H$,@.8y$9$k$H(B, $B85$N%U%!%$%k$r>C5n$9$k$+$I$&$+$?$:$M$^$9(B ($B0BA4$N$?$aFs2s3NG'$5$;$F$$$^$9(B). $B$3$N$&$A0E9f2=8e$N%*%j%8%J%k%U%!%$%k>C5n=hM}$Oe5-$N>C5n=hM}$r;H$C$F(B $B:o=|$7$^$9(B.

$B$?$@$7(B, $B$3$l$i>C5n=hM}$O


2009.11