Screenshots of cpm

the loginscreen

Here cpm just starts up and requests your passphrase to decrypt the datafile.

01_login.jpg

Back to the main page.


the hosts listing

In this setup the first hierarchy are hosts which you can see here. This is all dynamic and you can configure it like you want.

02_host.jpg

Back to the main page.


the service listing

Just another hierarchy named service.

03_service.jpg

Back to the main page.


the user listing

Just another hierarchy named user.

04_user.jpg

Back to the main page.


the password listing

Here we finaly manage the password of the entry.

05_password.jpg

Back to the main page.


the add new entry dialog

Using this dialog you can add unlimited entries to a hierarchy.

06_add.jpg

Back to the main page.


the key management dialog

With this dialog you can manage the keys, the datafile gets encrypted for. There is no limit in the number of keys you have.

07_edit_keys.jpg

Back to the main page.


the help dialog

The help dialog just shows the available keybindings.

08_help.jpg

Back to the main page.


This is how the commandline search works. The pattern you search for can also be freely configured. The same goes for the displayed result of a search.

09_search.jpg

Back to the main page.


 
harry/cpm_screenshots.txt · Last modified: 2006/04/03 20:35 (external edit)
Locations of visitors to this page

 
Recent changes RSS feed Creative Commons License Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki