TorTV is a build of the Tor Project maintained to run on TV devices and set-top boxes so that anyone with such a household appliance can contribute to strengthen the Tor network. TorTV does not reimplement nor modify the Tor source code in any way; it provides binary builds for embedded targets and scripted bundles to facilitate their installation. So far, it targets WDTV devices running WDLXTV, but aims to grow to support more hardware in future.
Generic Pager is a class that can be used to browse listings of entries split into multiple pages. It takes as parameters the total number of list entries, the limit of entries to display per page, and the number of the current page. The class can generate an HTML list with links to browse the listing pages, optionally with links to the previous, next, first, and last pages. The text labels and the CSS classes of the links are configurable.
mdepub is a tool that allows you to compose a book in Markdown format and use Pandoc and Calibre to compile an Epub package including all of the book's source material. In effect, you can keep the source and product in the same file in your library; if you ever want to revise the product, you merely need to extract the source, make edits, and recompile.
rnio is a minimalistic nio framework for Java. With rnio, it is easy to use non-blocking network sockets in Java. Internally, rnio runs a set of selectors and handles the thread pool for the network-related tasks. This means that non-blocking network connections can be fully event-based.
SQLCipher provides fully transparent encryption of SQLite databases. SQLCipher is a specialized build of the SQLite database that performs transparent and on-the-fly encryption. Using SQLCipher, an application uses the standard SQLite API to manipulate tables using SQL. Behind the scenes, the library silently manages security, making sure that data pages are encrypted and decrypted as they are written to and read from storage. SQLCipher relies on the peer-reviewed OpenSSL library for several encryption requirements, including the AES-256 algorithm, pseudo random number generation, and PBKDF2 key derivation.