Private keys are widely used in Linux systems to protect conversations, and to encrypt/decrypt content. SSH and PGP are two examples of tools that make use of public/private keypairs to provide authentication, session encryption, and content encryption. SSH private keys are used to establish remote shell connections, create secure tunnels, perform secure file transfers, and a wide variety of related functions. PGP private keys are used to encrypt sensitive files, and to encrypt email content.

Keys are often stored insecurely, and unauthorized key disclosure presents a significant risk to the security of any system, or encrypted data.

In this on-demand webinar, security expert, Gary Patterson, who will walk attendees through the:

Gary Patterson, IT & Security Expert

<p>Gary Patterson is an Information Technology security consultant with experience with a variety of platforms including Cisco, Windows, Linux, AIX, and IBM i / iSeries / AS/400. Gary assists clients with a wide variety of IT security-related tasks - including IT security standards compliance, application/server/network security testing, security monitoring, source code vulnerability scanning, encryption implementations, and incident response. Gary is one of the founders and Vice President of Quorum Resources, Inc. (, an IT services company.</p>