Result for 141B2EFAB2A9ABE2FFC80C75868B95167D7B9354

Query result

Key Value
FileName./usr/share/doc/restic/html/_sources/040_backup.rst.txt
FileSize8852
MD5DE1D84D7E08EB35BD24BD3A1FBF19FF3
SHA-1141B2EFAB2A9ABE2FFC80C75868B95167D7B9354
SHA-2567E7E0C3F90F8AEACF7D5CA9DF790C5997A1AEDE95BCE347F8E06C21AFB704F73
SSDEEP192:K+29uu0gusa1ayTxTnSZUm8A0RnnNT1sDN9O/SCqwdl1QCOkMyX/k:hnsa1au7MUm8hRnNKDN9c1QCOk/vk
TLSHT10A02B81F7B880EB20203A1C5AB45E3D2E31A844F02752166F41EB1F87F5E69D86F76D8
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD53A7B98897C51D89B1F2014599DA0934E
PackageArchx86_64
PackageDescriptionrestic is a backup program that is fast, efficient and secure.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamerestic
PackageReleaselp150.1.3
PackageVersion0.8.3
SHA-1484E075C27965253A94D1EB5EBE9469B4A93DE05
SHA-256F4DAAA02C40E8FBBE12B6BA31B94929B8502297A98C993A3C5403E5F1C4E2965
Key Value
FileSize5178996
MD5EBF40B5596414D864A231A5DD64AA312
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-1243DF40792C863B044E9C4FBBA4BB3273E2B2C87
SHA-25622CBA3DF699F550B2E2FA6FDC851F1DA652F916A39A99AF5D173A9E81399A824
Key Value
FileSize5066956
MD57465A038ECC7E693D38C066DEBF3204E
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-11E705963AA9C66FCEE27A1F3779F9FF4DB1DD0F9
SHA-2567061AD88BBEDC61F6FF69BA51C0E339755A510AB3DB81CA7857EB13FA5E401C6