--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: truecrypt -- Free open-source disk encryption software for Windows XP/2000/2003 and Linux
- From: Thomas Quas <tquas@yahoo.com>
- Date: Fri, 21 Apr 2006 08:36:52 +0200
- Message-id: <20060421063652.5098.72003.reportbug@strider.tquas.lab>
Package: wnpp
Severity: wishlist
* Package name : truecrypt
Version : 4.2
Upstream Author : Name <somebody@example.org>
* URL : http://www.truecrypt.org/
* License : TrueCrypt License 2.0 (http://www.truecrypt.org/license.php)
Programming Lang: (C, C++, C#, Perl, Python, etc.)
Description : Free open-source disk encryption software for Windows XP/2000/2003 and Linux
>From the man pages:
Manages encrypted TrueCrypt volumes, which can be mapped as virtual
block devices and used as any other standard block device. All data
being read from a mapped TrueCrypt volume is transparently decrypted
and all data being written to it is transparently encrypted.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-vserver
Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 364034
stop
Further comments on the work done in the bug sent to
364034@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org>.
--- End Message ---