Result for 098E2583DFEB6D0976C96435E307B8C6BC5CD965

Query result

Key Value
FileName./usr/share/doc/restic/html/_images/02_aws_menu.png
FileSize203613
MD5F03EB218C7101AC5CD72012B29D06599
SHA-1098E2583DFEB6D0976C96435E307B8C6BC5CD965
SHA-2564EA408E2DB4E3EB2918C6F8A9F4301ADEDCE96DEDBBA04175ABD51F4576B8AB8
SSDEEP6144:8kQyV4CyodoIT/zRTZSj7/mIfNlaElHNxItOpS:8kQy3yVIjCuEnaEk
TLSHT10914129446FFC9964ECF943A067B9F1BA62781E424E33234EF2FC81D4396E004BA5B54
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize7266052
MD56E012FD8A1B6D6E4BEB24949F3B16A9A
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerDebian Go Packaging Team <pkg-go-maintainers@lists.alioth.debian.org>
PackageNamerestic
PackageSectionutils
PackageVersion0.11.0-1+b5
SHA-125D5AC2F2EA00988592B6AAB02817AED01EB188B
SHA-2568C7838ED013B4BF852311FB5001D7427E29CAC245DB1EBD1A9B6351E69BB5125