Yours for that key is: 8FC8E099 (sometimes you may need to add 0x to the beginning of it)
In Linux you can get it by entering: gpg -k to view all your keys.
If you wanted to import mine, you could either do it manually (like you did before), or just enter gpg --recv-keys FBF52716
You can upload them to:
http://pgp.mit.edu/
https://keyserver.pgp.com/vkd/GetWelcomeScreen.event
They will eventually propagate to all PGP servers.
You can also use my key id to search for my keys on the above sites, or search by my name, username, etc.
That way, if someone gets hold of your keys, they'd have to know the pass phrase associated with it to do any thing with.
Using an offline computer is one way to go, but every time you want to sign/encrypt/decrypt a message, you'll have to put the file on a USB, boot up the offline computer, run PGP, put the encrypted/sign file back on the USB, and back onto you're online computer.
Worth doing for a Bitcoin wallet, but is overkill for something like this IMO, unless you are dealing with sensitive data or you are of importance.
If you want to back it up, which I suggest, you could create a QR barcode of it (best to do it offline, but can be done online like here), you could then print that and store it somewhere safe. Quite easy to import then.
I use OpenSSL on Linux to encrypt all my files, so my knowledge of Windows tools is not that great, but TrueCrypt is an option, you could then email yourself the encrypted file.
If you key ever does get compromised, you can revoke it and attach your new key to it. To do this you need to create a key revocation certificate.
This is just basically a certificate you create, store some where safe and never have to touch again, until you need to revoke it, which you do by uploading it to a PGP key server. When it sees this special certificate, it basically broadcasts a message to all key servers saying "my key is compromised, do not use or trust it, here is my new one".
Have a read of this: http://www.pgp.net/pgpnet/pgp-faq/pgp-faq-key-revocation.html
This is a great very short guide to PGP in general that helped me a lot:
http://aplawrence.com/Basics/gpg.html