Result for 0FEB66DE47ABA0CC37D80FEEAC4F17D16C286480

Query result

Key Value
FileName./usr/share/man/man1/restic-snapshots.1.gz
FileSize896
MD5FF6F0B30656F92583C91CA4E1D068929
SHA-10FEB66DE47ABA0CC37D80FEEAC4F17D16C286480
SHA-256475326211D274CBFA22CD3B5A4F69108A6B53360DDF1AEF542ADFAA2232C15CC
SSDEEP24:Xql+mA9baW0V0y2Qvb2lh3aLgCpqo6AZwlu00p:XU+zu0PQKlI0CcAZwlu00p
TLSHT16011B770C7F65CD25016EBF8A179B1743A5A480F5E21085070FE64CB4963905BA8EEAE
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD53A7B98897C51D89B1F2014599DA0934E
PackageArchx86_64
PackageDescriptionrestic is a backup program that is fast, efficient and secure.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamerestic
PackageReleaselp150.1.3
PackageVersion0.8.3
SHA-1484E075C27965253A94D1EB5EBE9469B4A93DE05
SHA-256F4DAAA02C40E8FBBE12B6BA31B94929B8502297A98C993A3C5403E5F1C4E2965
Key Value
FileSize5178996
MD5EBF40B5596414D864A231A5DD64AA312
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-1243DF40792C863B044E9C4FBBA4BB3273E2B2C87
SHA-25622CBA3DF699F550B2E2FA6FDC851F1DA652F916A39A99AF5D173A9E81399A824
Key Value
FileSize5066956
MD57465A038ECC7E693D38C066DEBF3204E
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-11E705963AA9C66FCEE27A1F3779F9FF4DB1DD0F9
SHA-2567061AD88BBEDC61F6FF69BA51C0E339755A510AB3DB81CA7857EB13FA5E401C6