Result for 1849D5FE38CC8549B1762F390A7118F9CBD87257

Query result

Key Value
FileName./usr/share/doc/restic/html/_sources/050_restore.rst.txt
FileSize2926
MD5AE2FA1A0A749C9A538D689EDF445BBEF
SHA-11849D5FE38CC8549B1762F390A7118F9CBD87257
SHA-256FCDAB8880B7DA4DE57ED812E7D716B032189DE203052912309C3EF8D88750320
SSDEEP48:oxsk+ZwTfpQQqb4AS8kv5jMCImGv5Dmlv53fZOGAz9K9At:aB+29nKnmNZ99At
TLSHT1EE518267BB9624F007539114B644C293F30A58DA0BB331A2F81E01FCAF9A75953B9BC4
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD53A7B98897C51D89B1F2014599DA0934E
PackageArchx86_64
PackageDescriptionrestic is a backup program that is fast, efficient and secure.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamerestic
PackageReleaselp150.1.3
PackageVersion0.8.3
SHA-1484E075C27965253A94D1EB5EBE9469B4A93DE05
SHA-256F4DAAA02C40E8FBBE12B6BA31B94929B8502297A98C993A3C5403E5F1C4E2965
Key Value
FileSize5178996
MD5EBF40B5596414D864A231A5DD64AA312
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-1243DF40792C863B044E9C4FBBA4BB3273E2B2C87
SHA-25622CBA3DF699F550B2E2FA6FDC851F1DA652F916A39A99AF5D173A9E81399A824
Key Value
FileSize5066956
MD57465A038ECC7E693D38C066DEBF3204E
PackageDescriptionbackup program with multiple revisions, encryption and more restic is a program that does backups right and was designed with the following principles in mind: - Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated. - Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast. - Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored. - Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers. - Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamerestic
PackageSectionutils
PackageVersion0.8.3+ds-1
SHA-11E705963AA9C66FCEE27A1F3779F9FF4DB1DD0F9
SHA-2567061AD88BBEDC61F6FF69BA51C0E339755A510AB3DB81CA7857EB13FA5E401C6