How to Install and Uninstall volume_key.x86_64 Package on Rocky Linux 8
Last updated: November 14,2024
1. Install "volume_key.x86_64" package
Please follow the guidelines below to install volume_key.x86_64 on Rocky Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
volume_key.x86_64
Copied
2. Uninstall "volume_key.x86_64" package
This guide let you learn how to uninstall volume_key.x86_64 on Rocky Linux 8:
$
sudo dnf remove
volume_key.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the volume_key.x86_64 package on Rocky Linux 8
Last metadata expiration check: 0:40:50 ago on Mon Sep 12 10:27:18 2022.
Available Packages
Name : volume_key
Version : 0.3.11
Release : 5.el8
Architecture : x86_64
Size : 48 k
Source : volume_key-0.3.11-5.el8.src.rpm
Repository : appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.
Available Packages
Name : volume_key
Version : 0.3.11
Release : 5.el8
Architecture : x86_64
Size : 48 k
Source : volume_key-0.3.11-5.el8.src.rpm
Repository : appstream
Summary : An utility for manipulating storage encryption keys and passphrases
URL : https://pagure.io/volume_key/
License : GPLv2 and (MPLv1.1 or GPLv2 or LGPLv2)
Description : This package provides a command-line tool for manipulating storage volume
: encryption keys and storing them separately from volumes.
:
: The main goal of the software is to allow restoring access to an encrypted
: hard drive if the primary user forgets the passphrase. The encryption key
: back up can also be useful for extracting data after a hardware or software
: failure that corrupts the header of the encrypted volume, or to access the
: company data after an employee leaves abruptly.