From 85c38af8b431e9bc0a6fe8f3c96f21cedb6f935d Mon Sep 17 00:00:00 2001 From: Aaron Weber Date: Thu, 26 Jul 2001 21:55:25 +0000 Subject: revised. 2001-07-26 Aaron Weber * C/usage-mail-org.sgml: revised. * C/usage-mail.sgml: revisions and stuff. * C/evolution-faq.sgml: Reworded a few questions. svn path=/trunk/; revision=11436 --- help/C/evolution-faq.sgml | 16 ++ help/C/usage-mail-org.sgml | 70 +++--- help/C/usage-mail.sgml | 599 ++++++++++++++++++++++++++++----------------- help/ChangeLog | 6 + 4 files changed, 427 insertions(+), 264 deletions(-) (limited to 'help') diff --git a/help/C/evolution-faq.sgml b/help/C/evolution-faq.sgml index 80650fdbd3..8e658ff308 100644 --- a/help/C/evolution-faq.sgml +++ b/help/C/evolution-faq.sgml @@ -556,6 +556,22 @@ + + + + + The address suggestion list steals focus from the "To:" + entry box when I'm typing. How can I make it keep focus? + + + + + This is a bug in GTK version 1.2.10. To avoid it, downgrade + to GTK version 1.2.9, or install the Ximian version of GTK + 1.2.10. + + + diff --git a/help/C/usage-mail-org.sgml b/help/C/usage-mail-org.sgml index 61f46114c4..32e2353e14 100644 --- a/help/C/usage-mail-org.sgml +++ b/help/C/usage-mail-org.sgml @@ -23,7 +23,7 @@ - Right click on the bar + Right click on the column header @@ -33,8 +33,9 @@ - Click and drag a column you want into the toolbar. A red arrow will - show you where the column will be placed. + Click and drag a column you want into a space between + existing column headers. A red arrow will show you where + the column will be placed. @@ -82,7 +83,8 @@ of column headers will appear; just drag and drop them into place between two existing headers. A red arrow will appear to show you where you're about to put the - column. + column. + @@ -110,10 +112,10 @@ using the Move button in the toolbar. If you want to move several messages at once, click on the ones you want to move while holding down the - CTRL key, or use Shift to + Ctrl key, or use Shift to select a range of messages. If you create a filter with the filter assistant, you can have mail - moved to your folder automatically. + filed automatically. @@ -224,14 +226,13 @@ Filters work very much like the mail room in a large company. Their purpose is to bundle, sort, and distribute mail to the - various folders. - In addition, you can have multiple filters performing multiple - actions that may effect the same message in several ways. For - example, your filters could put copies of one message into - multiple folders, or keep a copy and send one to another - person as well, and it can do that quickly. Which is - to say, it's faster and more flexible than an actual person - with a pile of envelopes. + various folders. In addition, you can have multiple filters + performing multiple actions that may effect the same message + in several ways. For example, your filters could put copies + of one message into multiple folders, or keep a copy and send + one to another person as well, and it can do that quickly. Of + course, it's also faster and more flexible than an actual + person with a pile of envelopes. @@ -514,7 +515,7 @@ - + Getting Really Organized with Virtual Folders If filters aren't flexible enough for you, or you find @@ -556,6 +557,18 @@ systems can't. + + + The Unmatched Virtual Folder + + Obveously, not all messages will fit into all your Virtual + Folders. That's why Evolution + includes an UNMATCHED Virtual Folder. The UNMATCHED Virtual + Folder displays messages that are not matched by other rules. + + + + Using Folders, Searches, and Virtual Folders @@ -595,9 +608,14 @@ Name your virtual folder in the Rule name field. - For each criterion, you must first select - which of the following parts of the message you want the search to - examine: + + + + + + Select your search criteria. For each criterion, you + must first select which of the following parts of the + message you want the search to examine: Sender - The sender's address. @@ -700,12 +718,6 @@ - - - - - - Select criteria to search by. @@ -744,7 +756,7 @@ - If you want multiple criteria for this filter, press Add + If you want multiple criteria for this filter, press Add criterion and repeat the previous step. @@ -760,14 +772,6 @@ - - The Unmatched Virtual Folder - - Obveously, not all messages will fit into all your Virtual Folders. That is - what the UNMATCHED Virtual Folder is for. The UNMATCHED Virtual Folder is a folder - for any mail that doesn't get matched by other rules. - - Evolution can also display - HTML-formatted mail, complete with graphics. Graphics don't load - automatically by default, becuase they can be large and take a long - time to download. They can also be used by spammers to help track - who reads their email. So having them not load automatically helps - protect your privacy. - + HTML-formatted mail, complete with graphics. Graphics + don't load automatically by default, because they can be + large and take a long time to download. They can also be + used by spammers to help track who reads their email. So + having them not load automatically helps protect your + privacy. @@ -454,29 +462,42 @@ You can also choose to save messages as drafts or as text - files. Choose - - File - Save + files. Your options are: + + + Choose + + File + Save Draft - or Save As to save your message - as a text file. If you prefer to keep your message in a - folder (the Drafts folder would be the - obvious place), you can select - File Save In - Folder . + to store your messages in the drafts folder for later + revision. + + + + If you'd like to have the message sent later, you + can choose Send Later. That way, + the message will be added to the queue, and you can send a + batch of messages all at once. + + + + If you prefer to save your message as a text file, + choose Save As and then choose a + file name. + + + Advanced Mail Composition - Evolution is meant to not only handle large - amounts of incoming mail, but helps you manage all the tasks of having - an email account. - In the next few sections, you'll see how - Evolution handles additional features, - including large recipient lists, attachments, and forwarding. + In the next few sections, you'll see how + Evolution handles advanced email + features, including large recipient lists, attachments, and + forwarding. Attachments @@ -529,9 +550,9 @@ Types of Recipients Evolution, like most email - programs recognizes three types of addressee: primary - recipients, secondary recipients, and hidden ("blind") - recipients. + programs, recognizes three types of addressee: primary + recipients, secondary recipients, and hidden ("blind") + recipients. The simplest way to direct a message is to put the email @@ -545,6 +566,16 @@ typewriters and there were no copy machines, "Cc" stands for "Carbon Copy." Use it whenever you want to share a message you've written to someone else. + + + Bcc: is a little more complex. You + use it like Cc:, but people on the + Bcc: list are hidden from the other + recipients of the message. Use it to send mail to large + groups of people, especially if they don't know each other + or if privacy is a concern. + + Using the Cc: field @@ -556,7 +587,7 @@ Tim about the message as well. - + @@ -585,16 +616,14 @@ If you have created address cards in the contact manager, you can also enter nicknames or other portions of address - data, and Evolution will transparently - complete - the address for you. If you enter a name - or nickname that can go with more than one card, Evolution - will open a dialog box to ask you which person you meant. - + data, and Evolution will offer a + drop down list of possible address completions from your + address book. If you enter a name or nickname that can go + with more than one card, Evolution will open a dialog box to + ask you which person you meant. Also, + Evolution will add a domain to + any unqualified addresses. By default, this is your domain, + but you can choose which one mail preferences dialog. Alternately, you can click on the @@ -669,29 +698,35 @@ with quoted materials and the relevant replies interspersed--> - You may want to reply to a whole mailing list. For this, you would - use the Reply to List instead of the standard - Reply or Reply to All. + If you're subscribed to a mailing list, and want your reply + to go just to the list, rather than to the sender, choose + Reply to List instead of + Reply or Reply to + All. What is a Mailing List? - Mailing Lists are one of the most popular ways in which group - collaboration on the Internet works. They allow people to send one - message to one server. The server then knows who is subscribed to the - mailing list, and sends a copy of your email to all the people on the - list. - For example, evolution-hackers@ximian.com allows the - Evolution programmers to converse - publically about their latest developments so that everyone can - stay up to date. + Mailing Lists are one of the most popular tools for + group collaboration on the Internet. Here's how they work: + + + Someone sends a message to a single address, like + evolution@ximian.com. + + + That address belongs to a program that distributes + the message to a list of recipients. + + + The mail management program lets individuals subscribe + to or unsubscribe from the list at will, without + requiring the message writers to remember the addresses + of every recipient. - There are two different types of mailing lists. The first is a - general submission list. That means that anyone can write to the - list. The second is a managed list. The managed lists have - someone running them. They can do as little as limit who - subscribes to the list or as much as moderate which emails get on - the list. + Mailing list servers can also let network administrators + control mail flow, list membership, and even moderate + the content of mailing lists. @@ -700,12 +735,13 @@ with quoted materials and the relevant replies interspersed--> Searching and Replacing with the Composer - You maybe familiar with search and replace features, - and if you come from a Linux or Unix background, you - probably know what Find Regex - does. If you aren't among the lucky who already know, - here's a quick rundown of an important section of the - Edit menu. + You are probably familiar with search and replace features + in any sort of text-editing software, and if you come from + a Linux or Unix background, you may know what + Find Regex does. If you aren't + among the lucky who already know, here's a quick rundown of + the automated text searching features that the message + composer makes available to you. @@ -1049,8 +1085,9 @@ with quoted materials and the relevant replies interspersed--> - ALL CAPS MEANS YOU'RE SHOUTING! Don't write a whole - message in capital letters. It hurts people's ears. + WRITING IN CAPITAL LETTERS MEANS YOU'RE SHOUTING! + Don't write a whole message in capital letters. It + hurts people's ears. @@ -1086,7 +1123,6 @@ with quoted materials and the relevant replies interspersed--> - Subscription Management @@ -1097,13 +1133,13 @@ with quoted materials and the relevant replies interspersed--> - Click on the folder you wish to subscribe to in the - Store section. + In the Store section, click on the + folder to which you wish to subscribe. - Click the Subscribe to add it to the + Click Subscribe to add it to the subscribed list. @@ -1112,129 +1148,224 @@ with quoted materials and the relevant replies interspersed--> Close the window. - - - - + Encryption What is Encryption? - Encryption is an ancient method of changing readable text to unreadable - text that dates back to Egyptian times. Encryption takes the statement - "Evolution" and turns it into something which cannot be read without help - through decryption. - - Encryption Example + Encryption is an ancient method of keeping information safe + from prying eyes. Evolution can + help you keep your private messages secret. To do that, it + makes use of the external application + gpg, an implementation of strong + Public Key + Encryption. + + + + Public Key? Private Key? Whats the difference? - Kevin sends his friend Rachel and email and chooses to encrypt it. - The email has the following contents: - Hi Rachel. - Go banana! - Kevin - He tells Evolution to encrypt the - message. The computer encrypts the message which now looks like - @#$23ui7yr87#@!48970fsd. When the information gets to Rachel, - she'll decrypt the message and it'll show up in plain text for her - to read. + GPG uses two keys: public and private. You can give your + public key to anyone from whom you want to recieve + encrypted messages, or put it on a public key server so + that people can look it up before contacting you. + Never give your private key to anyone, + ever. Your private key lets you decrypt any + message encrypted with your public key. - - Encryption can be used in email in two ways: to verify that the sender is - the real sender, and to hide the message while in transmission. - Evolution has the capability to do both. + + + + Using encryption takes a bit of forethought. When you send a + message that is encrypted, you must encrypt it using your + intended recipient's public key. To get + an encrypted message, you must make sure that the sender has + your public key in advance. + + + + You can use encryption in two different ways: + + + Encrypt the entire message, so that nobody but the recipient can read it. + + + Attach an encrypted signature to a plain text message, so + that the recipient can read the message without decrypting it, and + only needs decryption to verify the sender's identity. + + + + + Sending an Encrypted Messagee + + Kevin wants to send an encrypted message to his friend + Rachel. He looks up her public key on a general key + server, and then tells + Evolution to encrypt the + message. The message now reads "@#$23ui7yr87#@!48970fsd." + When the information gets to Rachel, she decrypts it using + her private key, and it appears as plain text for her to + read. + + + - Generating your PGP key + Making Encryption Keys - First, you need to create a PGP key. To do this, you'll need GPG - installed. + Before you can get or send encrypted mail, you need to + generate your public and private keys with GPG. Here's how: GPG Versions - This manual covers version 1.0.6 of GPG. If your version is different, - this may not be entirely accurate. You may find out your version number - by typing in: gpg --version. + This manual covers version 1.0.6 of GPG. If your version is + different, this may not be entirely accurate. You may find + out your version number by typing in: gpg + --version. - You can start by typing in: gpg --gen-key at the - console. When you are asked about the algorythm to use, select 1. The next question asks you about key length. - The longer the key, more stronger it is. However, the longer the key, the - longer it takes to generate. This is your choice. However, 1024 bits - (default) should be adequate. The next question asks you if you want your - key to expire. Expiring keys make your key invalid after a certain amount - of time, so old keys don't float around when they aren't used anymore. This is the same concept - as a coupon at a supermarket. Next, you'll type in your real name, your - email address, and a comment. You should not forge this information, as - it is used later to verify who you are. Assuming that all your - information is correct, press "O" to continue. GPG now asks you for a - passphrase. This is a password which you will need to decrypt and encrypt - messages. This can be any length, with any characters in it. It is case - sensitive, which means that it does know the difference between capital - letters and lower-case. Now your key is generated. It is recommend you - surf the Internet, read your email, or write a letter in a word - processor while your key is generated. + + + + Open a terminal and type gpg --gen-key. + + + + + + Choose the default algorythm, "DSA and ElGamal." + + + + + + Choose a key length. The default, 1024 bits, should be + long enough. + + + + + + Decide if you want your key to expire automatically, and if so, when. + + + + + + + Enter your name, email address, and any additional + personal information you think is appropriate. Do not + falsify this information, because it will be needed to + verify your identity later on. + + + + + + Next, enter your passphrase. It does not have to be the + same as your email password or your login password. In + fact, it probably shouldn't. Don't forget it. If you lose + it, your keys will be useless and you will be unable to + decrypt messages sent to you with those keys. + + + + + + Now, GPG will generate your keys. This may take awhile, + so feel free to do something else while it's + happening. In fact, using your computer for something + else actually helps to generate better keys, because it + increases the randomness in the key generation seeds. + + + - Once this is completed, you'll be dropped back to the command line. - Now you can view your key information by typing gpg - --list-keys. You should see something similar to this: - - GPG Listing Keys - - /home/bob/.gnupg/pubring.gpg + Once the keys are generated, you can view your key information + by typing gpg --list-keys. You should see + something similar to this: + + /home/you/.gnupg/pubring.gpg ---------------------------- - pub 1024D/32j38dk2 2001-06-20 bob <bob@bob.com> + pub 1024D/32j38dk2 2001-06-20 you <you@your-address.com> sub 1024g/289sklj3 2001-06-20 [expires: 2002-11-14] - - - You'll now need to upload your public key to a keyserver, so that your - friends can use your key. You'll need to know the ID of your key, which - is after the 1024D on the line beginning with pub. For this example, it - is 32j38dk2. You now type in gpg --send-keys --keyserver - wwwkeys.pgp.net 32j38dk2. Substitute your key ID for 32j38dk2. - You will be prompted to type in your password and your key will be uploaded for your - friends to download. + + + + GPG will create one list, or keyring, for your public keys + and one for your private keys. All the public keys you know + are stored in the file + ~/.gnupg/pubring.gpg. If you want to + give other people your key, send them that file. + + + If you wish, you can upload your keys to a keyserver. Here's + how: + + + + Check your public key ID with gpg +--list-keys. It will be the string after 1024D on the line +beginning with "pub." In this example, it's 32j38dk2. + + + + + Enter the command gpg --send-keys --keyserver +wwwkeys.pgp.net 32j38dk2. Substitute your key ID for +32j38dk2. You will need your password to do this. + + + + Why Use a Keyserver? - Keyservers store your public keys for you so that your friends can - decrypt your messages. If you choose not to use a keyserver, you - can manually send your friends your public key. It is much easier - though to upload to a keyserver and then let your friends download - your public key on their own wish. - - - - Public Key? Private Key? Whats the difference? - - GPG uses two types of keys: public and private. The private should - be given out to no one, ever. Your private key allows your mail to - be signed and encrypted and decrypted by anyone who has it. The - public key is what you give your friends so that they can decrypt - your mails. + Keyservers store your public keys for you so that your + friends can decrypt your messages. If you choose not to + use a keyserver, you can manually send your people public + key, include it in your signature file, or put it on your + own web page. However, it's easier to publish them once, + and then let people download them from the keyserver when + they want. + + - Retrieving a Friends Key + Getting and Using Public Keys - To encrypt a message to your friends, you'll need to use their public - key in combination with your private key. - Evolution does that transparently, but you - still need to get their key off a keyserver. To do that, type: + To encrypt a message to your someone else you'll need to use + their public key in combination with your private key. + Evolution does that for you, but + you still need to get their key and add it to your keyring. + + + To get public keys from a public key server, enter the + command: gpg --recv-keys --keyserver wwwkeys.pgp.net keyid - . You will need to type in your password, and then their ID - will automatically be added to your keyring. + , substituting "keyid" for your recipient's ID. You + will need to type in your password, and then their ID will + automatically be added to your keyring. When you send mail to + them, Evolution will allow you to + encrypt your messages. + + + If someone sends you their public key directly, save it as a + plain text file and enter the command gpg + filename. This will add it to your keyring. @@ -1246,28 +1377,32 @@ with quoted materials and the relevant replies interspersed--> Tools Mail Settings - Once there, select the account you'd like to associate the key to and click - the Edit button. In the - Security tab is a section labeled Pretty - Good Privacy. Enter your key ID and click - OK. Your key is now integrated into your identity - in Evolution. + Once there, select the account with which you'd like to send + and recieve encrypted mail, and click the + Edit button. In the + Security tab is a section labeled + Pretty Good Privacy. Enter your key ID + and click OK. Your key is now + integrated into your identity in + Evolution. + Sending Encrypted Messages - You can either sign or encrypt a message. When you sign a message, you verify - that you were the one who sent it, and that no one is forging your - identity. Encrypting a message makes it impossible for someone with - prying eyes to view it while it's in transmission. + As you know, you can use encryption to hide the entire + message, or just to verify your signature. Once you've + generated your public and private keys, and have the public + keys of the people to whom you want to send mail, here's what + to do: Signing a Message - To sign a message, you simply click + To sign a message, choose: Security PGP Sign @@ -1280,8 +1415,8 @@ with quoted materials and the relevant replies interspersed--> Encrypting a Message - Encrypting a message is very similar to signing a message. You simply - click the menu item + Encrypting a message is very similar to signing a message. + Just choose the menu item Security PGP Encrypt @@ -1291,14 +1426,16 @@ with quoted materials and the relevant replies interspersed--> Unencrypting a Recieved Message - Sometimes, a friend will send you a message which is encrypted. In order - for you to read it, you need to unencrypt it. + If you get an encrypted message, you will need to decrypt it + before you read it. Remember, the sender has to have your + public key before they can send you an encrypted message. - When you view the encrypted message, Evolution - will prompt you for your PGP password. You type in your PGP password and - the message is then decrypted. - - - + When you view the message, + Evolution will ask you for your + PGP password. Enter it, and the message will be displayed + properly. + + + diff --git a/help/ChangeLog b/help/ChangeLog index b38eea6a0f..256122089e 100644 --- a/help/ChangeLog +++ b/help/ChangeLog @@ -1,3 +1,9 @@ +2001-07-26 Aaron Weber + + * C/usage-mail-org.sgml: revised. + + * C/usage-mail.sgml: revisions and stuff. + 2001-07-24 Aaron Weber * C/evolution-faq.sgml: Reworded a few questions. -- cgit