IV. Appendix ................................................................................................................................... 133A. KDE: The K Desktop Environment ................................................................................. 135A.1. Customizing KDE ............................................................................................. 135A.2. Introducing Konqueror .................................................................................... 136A.3. Using Konqueror ............................................................................................. 138A.4. Using the KDE Desktop.................................................................................... 140A.5. Using the Panel ................................................................................................. 141A.6. Browsing the Web with Konqueror ................................................................. 144A.7. Using Konqueror to View Images ................................................................... 145A.8. KMail ................................................................................................................ 146A.9. Logging Out of KDE......................................................................................... 148A.10. Finding Help ................................................................................................... 148B. Getting Started with Gnu Privacy Guard.......................................................................... 151B.1. Configuration File ............................................................................................. 151B.2. Warning Messages............................................................................................. 152B.3. Generating a Keypair......................................................................................... 152B.4. Generating a Revocation Certificate.................................................................. 154B.5. Exporting your Public Key................................................................................ 155B.6. Importing a Public Key ..................................................................................... 157B.7. What Are Digital Signatures? ........................................................................... 158B.8. Additional Resources ........................................................................................ 158C. Applications ..................................................................................................................... 161D. A Comparison of Common DOS and Linux Commands ................................................ 165E. System Directories............................................................................................................ 167F. Keyboard Shortcuts........................................................................................................... 169Index................................................................................................................................................. 171Colophon.......................................................................................................................................... 175