I've been looking around the internet for an example that shows how to encrypt a file with an existing PGP public key that was sent to me. The examples I find generate the key pair on the fly and then ...
Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.