RSS 6 projects tagged "log4j"

Download Website Updated 01 Nov 2012 Eagle DNS

Screenshot
Pop 72.06
Vit 2.95

Eagle DNS is a powerful, multithreaded, platform independent DNS server written in Java. It is based on the very reliable and proven dnsjava API and has pluggable resolvers, zone providers, and plugins, making it very flexible.

No download No website Updated 28 Mar 2010 jmdb

Screenshot
Pop 26.04
Vit 1.00

jmdb is a Java library for retrieving and parsing information from imdb.com.

No download Website Updated 01 May 2010 JExecDaemon

Screenshot
Pop 27.46
Vit 38.13

JExecDaemon is a small TCP/IP daemon that is used to safely execute programs on remote servers and get the output that these programs write to standard out (stdout) and error out (stderr).

Download Website Updated 05 Nov 2010 Log4g

Screenshot
Pop 47.46
Vit 1.51

Log4g is a logging framework based on a port of the popular Log4j project. It brings the flexibility of Log4j to the C/GLib/GObject programming stack.

Download Website Updated 24 Jun 2013 OMapper

Screenshot
Pop 36.22
Vit 2.98

OMapper provides a simple library to ease the process of mapping objects or beans from one design layer to another design layer, using annotations.

Download Website Updated 26 Sep 2013 zlog logging library

Screenshot
Pop 150.42
Vit 4.63

zlog is a reliable, efficient, thread safe, flexible, pure C logging library. It was written because there were no good C logging libraries along the lines of Logback for Java or log4cxx for C++. printf can work, but can not be easily redirected or reformatted, and syslog is slow and designed for system use. It provides a syslog model, log format customization, multiple output, safe run-time reconfiguration, high performance, user-defined log levels, safe log rotation, a log4j-style key-value map, in-built debugging, and no external dependencies.

Screenshot

Project Spotlight

QtitanRibbon

An implementation of Microsoft's Ribbon UI for Qt.

Screenshot

Project Spotlight

sshdfilter

A program that automatically blocks ssh brute force attacks.