How to Install and Uninstall volume_key.src Package on Oracle Linux 8
Last updated: November 28,2024
1. Install "volume_key.src" package
Please follow the guidance below to install volume_key.src on Oracle Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
volume_key.src
Copied
2. Uninstall "volume_key.src" package
Here is a brief guide to show you how to uninstall volume_key.src on Oracle Linux 8:
$
sudo dnf remove
volume_key.src
Copied
$
sudo dnf autoremove
Copied
3. Information about the volume_key.src package on Oracle Linux 8
Last metadata expiration check: 6:35:57 ago on Mon Sep 12 02:51:38 2022.
Available Packages
Name : volume_key
Version : 0.3.11
Release : 5.el8
Architecture : src
Size : 492 k
Source : None
Repository : ol8_appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.
Available Packages
Name : volume_key
Version : 0.3.11
Release : 5.el8
Architecture : src
Size : 492 k
Source : None
Repository : ol8_appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.