RSS 11 projects tagged "Apache 2.0"

No download Website Updated 27 Jun 2004 zipdiff

Screenshot
Pop 60.01
Vit 1.75

The zipdiff tool compares the contents of two zip files. It is equally suited for comparing jar, EAR, WAR, or RAR files. The project includes a task for Ant.

Download Website Updated 21 Jan 2013 Conary

Screenshot
Pop 288.27
Vit 39.78

Conary is a distributed software management system for Linux distributions. It replaces traditional package management solutions (such as RPM and dpkg) with one designed to enable loose collaboration across the Internet. It enables sets of distributed and loosely connected repositories to define the components which are installed on a Linux system. Rather than having a full distribution come from a single vendor, it allows administrators and developers to branch a distribution, keeping the pieces which fit their environment while grabbing components from other repositories across the Internet.

Download No website Updated 14 Dec 2004 Yahoo Group Mail Archiver

Screenshot
Pop 19.80
Vit 1.00

Yahoo Group Mail Archiver (YGMA) is a Java library and command line tools for extracting group messages from a Yahoo! group and processing them into Maildir format. It is designed for groups who wish to migrate their mail to a new location.

Download Website Updated 04 Jun 2005 JBup

Screenshot
Pop 34.42
Vit 1.00

JBup (Java Backup) aims to become a robust, professional backup tool. It creates a mirror of the current file set and compares it to the previous version. The deltas are saved and the previous mirror is removed. By applying the increments in reverse time order, complete backups of arbitrary versions can be created. It is an Ant task and can therefore be used in Ant scripts that perform additional backup actions, such as archiving directories or sending emails.

Download Website Updated 18 Oct 2013 ftwin

Screenshot
Pop 111.98
Vit 14.62

ftwin is a tool useful to find duplicate files or pictures according to their content on your file system.

Download Website Updated 05 Dec 2007 VeriTAR

Screenshot
Pop 24.08
Vit 1.42

VeriTAR [Veri(fy)TAR] is a command-line utility that verifies the MD5 sums of files within a tar archive. Due to the limitations of the tar ("ustar") format, the MD5 sums are retrieved from a separate file and are checked against the MD5 sums of the files within the tar archive. The process takes place without actually exctracting the files. It works even with corrupted tar archives. The program carries on to the next file within the archive, skipping the damaged parts. At the moment, this relies on internal functions of Python's tarfile module.

Download Website Updated 11 Mar 2014 Jailer

Screenshot
Pop 448.96
Vit 74.77

Jailer is a database subsetting and browsing tool. It is a tool for data exporting, schema browsing, and rendering. It exports consistent, referentially intact row-sets from relational databases. It removes obsolete data without violating integrity. It is DBMS agnostic (by using JDBC), platform independent, and generates DbUnit datasets, hierarchically structured XML, and topologically sorted SQL-DML.

Download Website Updated 17 Dec 2008 apub

Screenshot
Pop 15.36
Vit 44.12

apub is a tool to simplify uploading documents of a site to remote servers. Simply create an XML configuration file containing one or more site definitions, with the local and remote document root. After that, you can upload any file in any of your document roots with one simple command.

No download No website Updated 12 Aug 2009 Associative Indexing Service

Screenshot
Pop 28.83
Vit 41.49

Associations Indexing Service (AIS) was originally done as an extension of human memory for tagging (storing under personal keywords and associations) resources, URIs, bookmarks, and memos (for fast access to the information in future) by using the same keywords or queries, similar to popular search engines. It can be seen as a local search engine, used as an automatic indexer of big file hierarchies (e.g. personal archives or files repositories). It is based on Lucene, so the application will remain very fast with any size index.

No download Website Updated 23 Feb 2010 Cibet

Screenshot
Pop 17.29
Vit 38.90

With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.

Screenshot

Project Spotlight

ips-qos

A flexible firewall and traffic shaping tool for Linux.

Screenshot

Project Spotlight

gscan2pdf

A GUI to ease the process of producing a multipage PDF from a scan.