release 0.2.4

This commit is contained in:
IgnorantGuru 2012-05-28 10:58:34 -06:00
parent a9311278f9
commit 67080b718c
5 changed files with 66 additions and 0 deletions

1
packages/0.2.4/README.mkd vendored Normal file
View File

@ -0,0 +1 @@
**To save a file** click on the link and click 'View Raw'

BIN
packages/0.2.4/udevil-0.2.4-installer.sh vendored Normal file

Binary file not shown.

65
packages/0.2.4/udevil-0.2.4.SHA256.asc vendored Normal file
View File

@ -0,0 +1,65 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
f3ba62911f7a64beb8cfd59a8ad7ba01f5b378c805c7b9d1cc2b1d6c3c63863f udevil-0.2.4.tar.xz
15f7c962c1a8b2e0676b0cc243d0cbb65d7b9fadb816085207c108bae699414c udevil-0.2.4-installer.sh
efe9bd8941c1e85b5ddac9fe9a1d823f55f3af8eb4a32ccb2aa81e80274a1c5e udevil_0.2.4-1_all.deb
#
# This file (udevil-0.2.4.SHA256.asc) is used to authenticate download of
# udevil version 0.2.4
#
# Homepage: http://ignorantguru.github.com/udevil/
#
#
# Why Authenticate?
#
# Verifying the authenticity of downloaded files prior to installation is
# important to ensure that your download is not corrupt and that no one has
# tampered with the server holding the files.
#
#
# 1) If you don't already have IgnorantGuru's CURRENT key on your keyring:
#
# gpg --keyserver keys.gnupg.net --recv-keys 0x7977070A723C6CCB696C0B0227A5AC5A01937621
# (if you receive an error, try again)
#
# Also visually verify that the given fingerprint matches the one shown here:
# http://igurublog.wordpress.com/contact-ignorantguru/
#
#
# 2) Download one or more files (the first is required):
#
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4.SHA256.asc
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4.tar.xz
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil-0.2.4-installer.sh
# wget https://raw.github.com/IgnorantGuru/udevil/master/packages/0.2.4/udevil_0.2.4-1_all.deb
#
#
# 3) Check signature and files:
#
# gpg -d udevil-0.2.4.SHA256.asc | sha256sum --check
#
# This should report a good signature and an OK for each file present:
#
# gpg: Signature made <SIGNATURE DATE> using DSA key ID 01937621 <--
# --> udevil-0.2.4.tar.xz: OK
# --> udevil-0.2.4-installer.sh: OK
# --> udevil_0.2.4-1_all.deb: OK
# --> gpg: Good signature from IgnorantGuru <EMAIL>
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# sha256sum: WARNING: x lines are improperly formatted
#
# If "BAD signature" or the wrong key ID is reported, or if FAILED appears
# next to any file you plan to use, DO NOT USE the file. A "key is not
# certified" warning (shown above) is normal and can be safely ignored if
# you visually verified the key fingerprint in step 1.
#
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iF4EAREIAAYFAk/Drq4ACgkQJ6WsWgGTdiEd+wEAnVdpM+aqX7138lNsxSAL3PwZ
uU7G9DsJ8w75YdxwPqYA/RZmkpxIrKSJeyVgg+TWll1LAZHzuPVkJoqQfC+uQHU7
=E9VF
-----END PGP SIGNATURE-----

BIN
packages/0.2.4/udevil-0.2.4.tar.xz vendored Normal file

Binary file not shown.

BIN
packages/0.2.4/udevil_0.2.4-1_all.deb vendored Normal file

Binary file not shown.