Enter the query into the form above. You can look for specific version of a package by using @ symbol like this: gcc@10.
API method:
GET /api/packages?search=hello&page=1&limit=20
where search is your query, page is a page number and limit is a number of items on a single page. Pagination information (such as a number of pages and etc) is returned
in response headers.
If you'd like to join our channel webring send a patch to ~whereiseveryone/toys@lists.sr.ht adding your channel as an entry in channels.scm.
Duplicity backs up directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.
wimlib is a C library and set of command-line utilities for creating, modifying, extracting, and mounting archives in the Windows Imaging Format (WIM files). It can capture and apply WIMs directly from and to NTFS volumes using ntfs-3g, preserving NTFS-specific attributes.
With dirvish you can maintain a set of complete images of your file systems with unattended creation and expiration. A dirvish backup vault is like a time machine for your data.
Restic is a program that does backups right and was designed with the following principles in mind:
Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated.
Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast.
Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored.
Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers.
Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
Vorta is a graphical backup client based on the Borg backup tool. It supports the use of remote backup repositories. It can perform scheduled backups, and has a graphical tool for browsing and extracting the Borg archives.
Dump examines files in a file system, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. Subsequent incremental backups can then be layered on top of the full backup. The restore command performs the inverse function of dump; it can restore a full backup of a file system. Single files and directory subtrees may also be restored from full or partial backups in interactive mode.
Grsync is a simple graphical interface using GTK for the rsync command line program. It currently supports only a limited set of the most important rsync features, but can be used effectively for local directory synchronization.
Burp is a network backup and restore program. It attempts to reduce network traffic and the amount of space that is used by each backup.
The Restic REST server is a high performance HTTP server that implements restic's REST backend API. It provides a secure and efficient way to backup data remotely, using the restic backup client and a rest: URL.
borgmatic is simple, configuration-driven backup software for servers and workstations. Protect your files with client-side encryption. Backup your databases too. Monitor it all with integrated third-party services. borgmatic is powered by borg.
Rdup is a utility inspired by rsync and the plan9 way of doing backups. Rdup itself does not backup anything, it only print a list of absolute file names to standard output. Auxiliary scripts are needed that act on this list and implement the backup strategy.
rsnapshot is a file system snapshot utility based on rsync. rsnapshot makes it easy to make periodic snapshots of local machines, and remote machines over SSH. To reduce the disk space required for each backup, rsnapshot uses hard links to deduplicate identical files.
Btar is a tar-compatible archiver which allows arbitrary compression and ciphering, redundancy, differential backup, indexed extraction, multicore compression, input and output serialisation, and tolerance to partial archive errors.
Borg is a deduplicating backup program. Optionally, it supports compression and authenticated encryption. The main goal of Borg is to provide an efficient and secure way to backup data. The data deduplication technique used makes Borg suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for storing backups on untrusted computers.
Libarchive provides a flexible interface for reading and writing archives in various formats such as tar and cpio. Libarchive also supports reading and writing archives compressed using various compression filters such as gzip and bzip2. The library is inherently stream-oriented; readers serially iterate through the archive, writers serially add things to the archive. In particular, note that there is currently no built-in support for random access nor for in-place modification. This package provides the bsdcat, bsdcpio and bsdtar commands.
Disarchive can disassemble software archives into data and metadata. The goal is to create a small amount of metadata that can be used to recreate a software archive bit-for-bit from the original files. For example, a software archive made using tar and Gzip will need to describe the order of files in the tarball and the compression parameters used by Gzip.
Par2cmdline uses Reed-Solomon error-correcting codes to generate and verify PAR2 recovery files. These files can be distributed alongside the source files or stored together with back-ups to protect against transmission errors or bit rot, the degradation of storage media over time. Unlike a simple checksum, PAR2 doesn't merely detect errors: as long as the damage isn't too extensive (and smaller than the size of the recovery file), it can even repair them.
The which program finds the location of executables in PATH, with a variety of options. It is an alternative to the shell "type" built-in command.
grep is a tool for finding text inside files. Text is found by matching a pattern provided by the user in one or many files. The pattern may be provided as a basic or extended regular expression, or as fixed strings. By default, the matching text is simply printed to the screen, however the output can be greatly customized to include, for example, line numbers. GNU grep offers many extensions over the standard utility, including, for example, recursive directory searching.
Any Unix-like operating system needs a C library: the library which defines the "system calls" and other basic facilities such as open, malloc, printf, exit...
The GNU C library is used as the C library in the GNU system and most systems with the Linux kernel.
Make is a program that is used to control the production of executables or other files from their source files. The process is controlled from a Makefile, in which the developer specifies how each file is generated from its source. It has powerful dependency resolution and the ability to determine when files have to be regenerated after their sources change. GNU make offers many powerful extensions over the standard utility.
This package provides a standalone shared library version of BFD, which is otherwise distributed and installed as part of the Binutils package release.
GNU Binutils is a collection of tools for working with binary files. Perhaps the most notable are "ld", a linker, and "as", an assembler. Other tools include programs to display binary profiling information, list the strings in a binary file, and utilities for working with archives. The "bfd" library for working with executable and object formats is also included.
GNU Binutils is a collection of tools for working with binary files. Perhaps the most notable are "ld", a linker, and "as", an assembler. Other tools include programs to display binary profiling information, list the strings in a binary file, and utilities for working with archives. The "bfd" library for working with executable and object formats is also included.