How to Install and Uninstall volume_key-devel.x86_64 Package on AlmaLinux 8
Last updated: November 02,2024
1. Install "volume_key-devel.x86_64" package
This tutorial shows how to install volume_key-devel.x86_64 on AlmaLinux 8
$
sudo dnf update
Copied
$
sudo dnf install
volume_key-devel.x86_64
Copied
2. Uninstall "volume_key-devel.x86_64" package
Please follow the guidelines below to uninstall volume_key-devel.x86_64 on AlmaLinux 8:
$
sudo dnf remove
volume_key-devel.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the volume_key-devel.x86_64 package on AlmaLinux 8
Last metadata expiration check: 2:13:19 ago on Mon Sep 5 03:22:42 2022.
Available Packages
Name : volume_key-devel
Version : 0.3.11
Release : 5.el8
Architecture : x86_64
Size : 18 k
Source : volume_key-0.3.11-5.el8.src.rpm
Repository : appstream
Summary : A library for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides libvolume_key, a library for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.
Available Packages
Name : volume_key-devel
Version : 0.3.11
Release : 5.el8
Architecture : x86_64
Size : 18 k
Source : volume_key-0.3.11-5.el8.src.rpm
Repository : appstream
Summary : A library for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides libvolume_key, a library for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.