move packages to pkg branch

This commit is contained in:
IgnorantGuru 2013-04-05 12:11:41 -06:00
parent 1c5e4ec7b3
commit 1ed28d69a5
95 changed files with 0 additions and 1254 deletions

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
8f71b17db5bc77c5cae520d49e7c6484d1a8312c54af2279f1b1226558d9976c udevil-0.2.0.tar.xz
6200178ce4b9382de1354cf79fa4eb9883c6e634731b3d8c1226e291936fc819 udevil-0.2.0-installer.sh
2fd3731ea08e8ccdd593974803a125fa204a4605fbf45120a9d6f033d21402bb udevil_0.2.0-1_all.deb
#
# This file (udevil-0.2.0.SHA256.asc) is used to authenticate download of
# udevil version 0.2.0
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.0/udevil-0.2.0.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.0/udevil-0.2.0.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.0/udevil-0.2.0-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.0/udevil_0.2.0-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.0.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.0.tar.xz: OK
# --> udevil-0.2.0-installer.sh: OK
# --> udevil_0.2.0-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk+71McACgkQJ6WsWgGTdiHzdwEAuuTXUUHsErbkXb/IT2sWkydu
1wXON/xNJVXqht31N+8A/jFGqAA+u+Ra62hXjvq/VeJEez5FeWluvPwgoVkxAdzC
=bTNP
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
bf866287d4295047015dca995903b703b23deabbc4daf3a23ff281c218118116 udevil-0.2.1.tar.xz
10f5dc8b7cece535c9a5bab32f5f69631606a8b3479ec7edcdcdfd7b7d689385 udevil-0.2.1-installer.sh
89c6e4b23427f4a8b94acd2301e0241ce3c85a965ec384d595c2e57374bb7487 udevil_0.2.1-1_all.deb
#
# This file (udevil-0.2.1.SHA256.asc) is used to authenticate download of
# udevil version 0.2.1
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil-0.2.1-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.1/udevil_0.2.1-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.1.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.1.tar.xz: OK
# --> udevil-0.2.1-installer.sh: OK
# --> udevil_0.2.1-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk+/xZ0ACgkQJ6WsWgGTdiEJ4QEA1KBnvHm/wv2y6LVV8IwyiGvC
MCqUfUvW3asaVAlU9fABAIu6Pd8Otchnn51g7b1ZMUhvXvCTTd/+y2HnSutZbU0r
=rYfk
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
8267fc6bcde0581f13abb82fba275a70001a6044e9fb82e54b921d192a468ca3 udevil-0.2.2.tar.xz
6c9484ecdcc4e6823a5796faa56eee2b99b5c1daa870be119797e063d3b805e6 udevil-0.2.2-installer.sh
f0a38132016b24d905f8d8037ec0fa2b962c2dffaea46b0d7f0af29aec7b6523 udevil_0.2.2-1_all.deb
#
# This file (udevil-0.2.2.SHA256.asc) is used to authenticate download of
# udevil version 0.2.2
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.2/udevil-0.2.2.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.2/udevil-0.2.2.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.2/udevil-0.2.2-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.2/udevil_0.2.2-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.2.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.2.tar.xz: OK
# --> udevil-0.2.2-installer.sh: OK
# --> udevil_0.2.2-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/BC+wACgkQJ6WsWgGTdiFknQEAp6jV4YhthHV4GC+XDVhwabYC
JwbOXUPtwmtaPemac00A/jCA5IaQW7/sEc3n0Wo4R49H23z64cCSL8NQKRjfskGw
=OUZX
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
368a4e761a4bf8d9e8cff8f9cdb14764093f5e9c93e78d8a2c578a8e92fce1dd udevil-0.2.3.tar.xz
a18f686a10880039d30b2a1c0659d1b5b21e48ddef80444896a9e1f3b486dfc5 udevil-0.2.3-installer.sh
64a3be2fc454837d18f4a32aee860afd70c3ced03c9928265041a53b8b210b07 udevil_0.2.3-1_all.deb
#
# This file (udevil-0.2.3.SHA256.asc) is used to authenticate download of
# udevil version 0.2.3
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.3/udevil-0.2.3.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.3/udevil-0.2.3.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.3/udevil-0.2.3-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.3/udevil_0.2.3-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.3.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.3.tar.xz: OK
# --> udevil-0.2.3-installer.sh: OK
# --> udevil_0.2.3-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/CcGQACgkQJ6WsWgGTdiHSDgD/UM4f7u76ahS0/+twzkDwqiIq
5Qee3mnvngZjDBw5OwYBANVHKnanGE66o53rHWOVBpi+mnjKfDpFbxt0H1PN1+Ur
=kKkf
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
f3ba62911f7a64beb8cfd59a8ad7ba01f5b378c805c7b9d1cc2b1d6c3c63863f udevil-0.2.4.tar.xz
15f7c962c1a8b2e0676b0cc243d0cbb65d7b9fadb816085207c108bae699414c udevil-0.2.4-installer.sh
efe9bd8941c1e85b5ddac9fe9a1d823f55f3af8eb4a32ccb2aa81e80274a1c5e udevil_0.2.4-1_all.deb
#
# This file (udevil-0.2.4.SHA256.asc) is used to authenticate download of
# udevil version 0.2.4
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil_0.2.4-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.4.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.4.tar.xz: OK
# --> udevil-0.2.4-installer.sh: OK
# --> udevil_0.2.4-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/Drq4ACgkQJ6WsWgGTdiEd+wEAnVdpM+aqX7138lNsxSAL3PwZ
uU7G9DsJ8w75YdxwPqYA/RZmkpxIrKSJeyVgg+TWll1LAZHzuPVkJoqQfC+uQHU7
=E9VF
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
85a6d837c4e40885d4717a777e5db7dfb57eb20ebe24ca78255c056f4ab3a2c0 udevil-0.2.5.tar.xz
942ae311f17ea1be8131e7544bdcf326e993c9a58e70c1dc095acecdabbbc30e udevil-0.2.5-installer.sh
68ca5a3c80225e9bc3876bdc478e73c7beadb2e7ebc37a5cd8b7ab3f6f6b7699 udevil_0.2.5-1_all.deb
#
# This file (udevil-0.2.5.SHA256.asc) is used to authenticate download of
# udevil version 0.2.5
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.5/udevil-0.2.5.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.5/udevil-0.2.5.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.5/udevil-0.2.5-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.5/udevil_0.2.5-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.5.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.5.tar.xz: OK
# --> udevil-0.2.5-installer.sh: OK
# --> udevil_0.2.5-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/GPYQACgkQJ6WsWgGTdiF0EwD9F2Tg235MD0+TZENZIdox5Sd1
MXIUU9d7sUZQ119lz9YA/1k3xM8HwR+Ux5TmPBFPki9v+N89Y5aT9RWnvrS/pKNj
=Sut1
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
7e6ec346292b1a5c168e92903a6e80b866924872bf3dc954e90e02dc42a003c6 udevil-0.2.6.tar.xz
2b68fad7535f5d2f33ff2b51fbccdbd724f9caab52d08f6e5abc9d0ba09a00b9 udevil-0.2.6-installer.sh
fcbe504ace63b2d869a9f53edffc10b3d107185a6e5b2bbcfbfba4d831dc5e7a udevil_0.2.6-1_all.deb
#
# This file (udevil-0.2.6.SHA256.asc) is used to authenticate download of
# udevil version 0.2.6
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.6/udevil-0.2.6.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.6/udevil-0.2.6.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.6/udevil-0.2.6-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.6/udevil_0.2.6-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.6.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.6.tar.xz: OK
# --> udevil-0.2.6-installer.sh: OK
# --> udevil_0.2.6-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/Lhw0ACgkQJ6WsWgGTdiHj6wEAj++Mp/9EA2PHtcnhLZPQlpsl
uQF3fqNASUYHvyt3XngBAKQZyQ3TQGubQyBP7GhkUVH6wQPP5WXgzY6EIwv7mIc1
=jQY5
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
bb0044b0cba4e89f5b61e2bb09ef0bac82a5e03bcd77b23545b30d8a1713cb59 udevil-0.2.7.tar.xz
416adc176f7a687a136bb5854c371cefd8db60358b67fadfe4b46c9a44efa19a udevil-0.2.7-installer.sh
9c2782eee46fdbe893ae05b5efe0121db96273093323e40059b9016df83098be udevil_0.2.7-1_all.deb
#
# This file (udevil-0.2.7.SHA256.asc) is used to authenticate download of
# udevil version 0.2.7
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.7/udevil-0.2.7.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.7/udevil-0.2.7.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.7/udevil-0.2.7-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.7/udevil_0.2.7-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.7.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.7.tar.xz: OK
# --> udevil-0.2.7-installer.sh: OK
# --> udevil_0.2.7-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/M++MACgkQJ6WsWgGTdiHifgEAyBRSMy4zwQc+pM0f0yvs6a8P
9Cr9HNhQrG/OsfGjKwEA/RGmTW7AX2PWe5Pl7bkyHA2HjM8RiKx7SIaTjKsbuXIv
=qw6g
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
3ffdd11283772f4a66c8ac928cf5e03072a1497ae70c9a131ec06d1dae9297cb udevil-0.2.8.tar.xz
24983b58cad16764dc65c76b7514a90feaa8845d3ca0cd7c3fca514ecdb56a63 udevil-0.2.8-installer.sh
fa026c7dbc318ccc5bcd98491450d4ae06d4186f63965cc387e0ee31961b2ffb udevil_0.2.8-1_all.deb
#
# This file (udevil-0.2.8.SHA256.asc) is used to authenticate download of
# udevil version 0.2.8
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.8/udevil-0.2.8.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.8/udevil-0.2.8.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.8/udevil-0.2.8-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.8/udevil_0.2.8-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.8.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.8.tar.xz: OK
# --> udevil-0.2.8-installer.sh: OK
# --> udevil_0.2.8-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/biJIACgkQJ6WsWgGTdiHqgQEA5qvR+lUwmDslfGO28iHIwmuw
zQkLi79koZ+xOcQZXFIBANVAaoLfPWtJZ1IEIUxzJe5WxMmvfh8w4q+rCf0CndGD
=K+Yg
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
224f10b20726fd544cade37284533fba2daa268073bdfaccbf53632f44b2ffdd udevil-0.2.9.tar.xz
337722895936d6be24d93024d7b57ef5508dd193b1c5d6c684f92d72df250540 udevil-0.2.9-installer.sh
b8438d49eb4a3a776448ae6d5a0bf64231268a8e0d5d4ea7c32c73197c8c0fab udevil_0.2.9-1_all.deb
#
# This file (udevil-0.2.9.SHA256.asc) is used to authenticate download of
# udevil version 0.2.9
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.9/udevil-0.2.9.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.9/udevil-0.2.9.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.9/udevil-0.2.9-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.9/udevil_0.2.9-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.9.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.9.tar.xz: OK
# --> udevil-0.2.9-installer.sh: OK
# --> udevil_0.2.9-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/tqcAACgkQJ6WsWgGTdiG8ngD/Wv/eN6JYoItAlUaYXGYPLF8/
HrReSTZyCtWpjulGDo4A/0qKoJr8qEC0YHFTjr6YSHhmyY6hKNfa2m4zyLoqrPTm
=nNab
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
675331a7c9dca52088234a88b82b450f0231cbf5b39f9e58f591e18a95d10fc3 udevil-0.3.0.tar.xz
2d4edd8d360f9bf2d602c80e3de015c31829194cb714a95a9bc01970b7cc1bb2 udevil-0.3.0-installer.sh
c5799795b57946758d12cafde2c048287772820e0a17eacf3fa9672701a9d08a udevil_0.3.0-1_all.deb
#
# This file (udevil-0.3.0.SHA256.asc) is used to authenticate download of
# udevil version 0.3.0
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.0/udevil-0.3.0.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.0/udevil-0.3.0.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.0/udevil-0.3.0-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.0/udevil_0.3.0-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.0.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.0.tar.xz: OK
# --> udevil-0.3.0-installer.sh: OK
# --> udevil_0.3.0-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlAAJG8ACgkQJ6WsWgGTdiG7rgD/feu86IMbmtgGgNHSYRswpfB9
g/0S49OwozZtSnwGuygBAPEkrNYSAHTbzEruuX2jvZk65yHS3MR3jiMdsfCyI7UH
=nTEw
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
150d669f00a19558dd00a21339c4f4a79cf247c2478c5966ed843b13543a9bab udevil-0.3.1.tar.xz
d8f25eb1cecaf6d1f70c94f986710c0fce472236f85de8d257d1c0043c317e44 udevil-0.3.1-installer.sh
68a01d7a78f1061e1de97e40caf54ff3e32b9075dc7e4f89853b7bc2379ab658 udevil_0.3.1-1_all.deb
#
# This file (udevil-0.3.1.SHA256.asc) is used to authenticate download of
# udevil version 0.3.1
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.1/udevil-0.3.1.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.1/udevil-0.3.1.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.1/udevil-0.3.1-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.1/udevil_0.3.1-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.1.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.1.tar.xz: OK
# --> udevil-0.3.1-installer.sh: OK
# --> udevil_0.3.1-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlAP5H4ACgkQJ6WsWgGTdiFgEQEAlhEmKHnDv1S4pt/H8SyNxII+
JuM2yAhoGyyeUcBlIykBANdYvxGiaJTqhE1r6j4iZv3a5Rd8oQz0SM1JOs5JzMsR
=8Dbi
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
a10821213e3fbe70b363165b14eb2988dc3014b32ea74c2f1ccb784f0ef9204b udevil-0.3.2.tar.xz
cbd3cbc7c983d5c680f5fe51587ec258670d4f034581ba1c3948181ab0e4204d udevil-0.3.2-installer.sh
7c4a8f58695856571fda566aebd31a70a7d023daf926a6e9852547700c196d12 udevil_0.3.2-1_all.deb
#
# This file (udevil-0.3.2.SHA256.asc) is used to authenticate download of
# udevil version 0.3.2
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.2/udevil-0.3.2.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.2/udevil-0.3.2.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.2/udevil-0.3.2-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.2/udevil_0.3.2-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.2.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.2.tar.xz: OK
# --> udevil-0.3.2-installer.sh: OK
# --> udevil_0.3.2-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlArzLAACgkQJ6WsWgGTdiHesQEA5vZVI+KLvLNbdR3UVv0Rft8i
qDeNbJBW4K191sgEXJ4A/2u0rtTcntMhmZ+e9NJ0JxgXVLJgPD1fiZVgJUMsK5F+
=RqZd
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
e5cac0e3ff25bbefabe3dba4612ebf87db07bd8e9192a19cc635728ce2590496 udevil-0.3.3.tar.xz
0a037519676a14d33aae41e07286786b8f21f35e75f55aa4ffafbcf68af6f3e1 udevil-0.3.3-installer.sh
f8e52afd8976aadd6716451c464fbde9df2298a02b1683bb117fcb72860c831f udevil_0.3.3-1_all.deb
#
# This file (udevil-0.3.3.SHA256.asc) is used to authenticate download of
# udevil version 0.3.3
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.3/udevil-0.3.3.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.3/udevil-0.3.3.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.3/udevil-0.3.3-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.3/udevil_0.3.3-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.3.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.3.tar.xz: OK
# --> udevil-0.3.3-installer.sh: OK
# --> udevil_0.3.3-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlBTDmIACgkQJ6WsWgGTdiHSjwEAuCa5aqKBbF7Gm6PYfCziTTa9
uv8EYlUKfqg2QvYHyq4A/3rLSVqdj6ClWxAcPTB7vbaZNTBJzxEOWPO5b5HZrg4P
=gLFZ
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
03645cddd87366f4bf19fccce7f40ef3bcecb6b07ced4a1ff07578e3a7136cc8 udevil-0.3.4.tar.xz
aa2a788252030851fdc53db7cbdd22f128d43c7b6d2dd7f413cbd70c15debe64 udevil-0.3.4-installer.sh
b6198da0f1b7cd5100c9779837a77fdcd8fb30116a06d42b860310a4122e75fc udevil_0.3.4-1_all.deb
#
# This file (udevil-0.3.4.SHA256.asc) is used to authenticate download of
# udevil version 0.3.4
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.4/udevil-0.3.4.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.4/udevil-0.3.4.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.4/udevil-0.3.4-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.4/udevil_0.3.4-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.4.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.4.tar.xz: OK
# --> udevil-0.3.4-installer.sh: OK
# --> udevil_0.3.4-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlCD43MACgkQJ6WsWgGTdiGcqAEAjfHeNmEm+cKZXIW+eVxB/JbK
4KUp7YJD01CJgbAjkTsBANqeema16DQkt7MXW74YOAHENfDaQ2IFfEHtW/YecLbZ
=3dmL
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
b8869daec6ab645709f577da22484f47fb6c3e97869fa420e744b4fd082d8a1c udevil-0.3.5.tar.xz
8e829a01b9ba5a965a207be94ae4751b73b66a4f220f072f40a2471f9f0e470f udevil-0.3.5-installer.sh
df10095309054f0751d033890d332bf7782b57d54378b82dfb0ddc27f9329630 udevil_0.3.5-1_all.deb
#
# This file (udevil-0.3.5.SHA256.asc) is used to authenticate download of
# udevil version 0.3.5
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.5/udevil-0.3.5.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.5/udevil-0.3.5.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.5/udevil-0.3.5-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.5/udevil_0.3.5-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.5.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.5.tar.xz: OK
# --> udevil-0.3.5-installer.sh: OK
# --> udevil_0.3.5-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlCwtkoACgkQJ6WsWgGTdiEkLQEAk1p9BKItZg64DNEkMrp+RG/o
Ki0/GaqGXd6zYGgphwMBAMq5s4aYEs7rH6xepgDwlLr5A8gMB4J8FPcgmWjF3sqN
=CoES
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
8676ce874a678d9ee728fcbfa274ab4c23eee76fd0d09b1dce145dfddfe22762 udevil-0.3.6.tar.xz
e26cf6753264702b55ebfc47b502f0c238d1735c309662d4a21299e842c492ac udevil-0.3.6-installer.sh
e6daa5056e3e35316262efdf80a10549a33b5415766e8879dd2c57b90c667b9a udevil_0.3.6-1_all.deb
#
# This file (udevil-0.3.6.SHA256.asc) is used to authenticate download of
# udevil version 0.3.6
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.6/udevil-0.3.6.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.6/udevil-0.3.6.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.6/udevil-0.3.6-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.3.6/udevil_0.3.6-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.3.6.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.3.6.tar.xz: OK
# --> udevil-0.3.6-installer.sh: OK
# --> udevil_0.3.6-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlDN08QACgkQJ6WsWgGTdiEUpgEA3eGe/r+vih3ucaVaO9VOxPsw
KBr8pMSZLkrdiUCrZfsBANktbPWbMHVg+SYLggJwroSw0+op9QvhGWCIiSGuCkxQ
=kY1b
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
baaab9b65ccbab55849ce4dec22ba412fd45655b14d163030c2245bc62fc7265 udevil-0.4.0.tar.xz
d65204ea9aeb22636a56ed7f5cb1b0cecf72edc26106c84ca2c1c8500297d8d5 udevil-0.4.0-installer.sh
462293d89c265e6379a06f52c6cd6cb84d4150b37feee8fdc860913786c1f0bc udevil_0.4.0-1_all.deb
#
# This file (udevil-0.4.0.SHA256.asc) is used to authenticate download of
# udevil version 0.4.0
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.0/udevil-0.4.0.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.0/udevil-0.4.0.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.0/udevil-0.4.0-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.0/udevil_0.4.0-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.4.0.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.4.0.tar.xz: OK
# --> udevil-0.4.0-installer.sh: OK
# --> udevil_0.4.0-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlEZGscACgkQJ6WsWgGTdiHQrwD+KSQg2fBkukA17JjF/3kUqPR7
+h/1Vob+hcsiajg6PqsBAOd/RoUwevuumm1tuoWHjJL2hIDtMnvCoP5Rx2//BuDj
=fAUT
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.

View File

@ -1 +0,0 @@
**To save a file** click on the link and click 'View Raw'

Binary file not shown.

View File

@ -1,65 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
fa4a3d85361d17bb69dd7dabdcfeecd2b0f5fff95698113975d8fbd504af6c2e udevil-0.4.1.tar.xz
211b8ab934b6b6b037d05f9e428fea44ec69049d793593e47275d0435cc63f42 udevil-0.4.1-installer.sh
049f94940040af7075c4e6f99df5aa34b1e249855dd15c57024320522754dcd7 udevil_0.4.1-1_all.deb
#
# This file (udevil-0.4.1.SHA256.asc) is used to authenticate download of
# udevil version 0.4.1
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.1/udevil-0.4.1.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.1/udevil-0.4.1.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.1/udevil-0.4.1-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.4.1/udevil_0.4.1-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.4.1.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.4.1.tar.xz: OK
# --> udevil-0.4.1-installer.sh: OK
# --> udevil_0.4.1-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAlFGBS8ACgkQJ6WsWgGTdiEf7AD+NXwoQhMDWYwKQve7vxJd1a8x
JZDdIXAJ53sZHjztmmoBAKU5z/xmOUvFbvf0QJWsm8fxaaOeYqovAKKMvtv/mo9A
=jNqC
-----END PGP SIGNATURE-----

Binary file not shown.

Binary file not shown.