How to Install and Uninstall volume_key.x86_64 Package on CentOS Stream 9
Last updated: November 24,2024
1. Install "volume_key.x86_64" package
Please follow the guidance below to install volume_key.x86_64 on CentOS Stream 9
$
sudo dnf update
Copied
$
sudo dnf install
volume_key.x86_64
Copied
2. Uninstall "volume_key.x86_64" package
This is a short guide on how to uninstall volume_key.x86_64 on CentOS Stream 9:
$
sudo dnf remove
volume_key.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the volume_key.x86_64 package on CentOS Stream 9
Last metadata expiration check: 1:20:21 ago on Sat Mar 16 16:03:45 2024.
Available Packages
Name : volume_key
Version : 0.3.12
Release : 15.el9
Architecture : x86_64
Size : 51 k
Source : volume_key-0.3.12-15.el9.src.rpm
Repository : appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.
Available Packages
Name : volume_key
Version : 0.3.12
Release : 15.el9
Architecture : x86_64
Size : 51 k
Source : volume_key-0.3.12-15.el9.src.rpm
Repository : appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.