Other listings by this author |
|
JarLook 1.2 (Downloads: 312)
Check that class target versions are as expected in a Java jar. Check a Java jar to make sure all the javac -target versions of
the class files are what you expect.
Java application.
Requires Java version 1.5 or later.
All Java source code is included.
to use:
java -jar jarlook.jar jartotocheck.jar 1.1 1.4
where jartocheck.jar is the name of jar to check.
It will check all the class files in it.
In this example:
1.1 is the low...
|
|
HunkIO 1.7 (Downloads: 262)
Java classes to readEntireFile, create a temp file etc. Java classes to include in your own programs. They let you read or write a file in one fell swoop into RAM. It also includes createTempFile method that is more convenient to use than Sun's File.createTempFile. It also includes PrintWriterPlus that converts linefeeds to platform specific line feeds even when they are embedded in data.
Why the three linked ball logo? It symbolises processing a file in line-sized chunks....
|
|
VerCheck 4.4 (Downloads: 340)
VerCheck checks websites for new versions of the software you use. WHAT IT IS FOR
**************
I used to check over a dozen websites each day to see if new versions of the software I use had been released. This was time consuming and error prone. VerCheck automates this
process by checking the websites of the programs you use to see if the version numbers have changed. It comes preconfigured from the factory with 64 applications.
HOW IT WORKS
************
For each applica...
|
|
Base64 1.9 (Downloads: 301)
Java classes to encode/decode Base64 and Base64u Base64 is a freeware way of encoding 8-bit characters using
only ASCII printable characters similar to UUENCODE.
UUENCODE embeds a filename where BASE64 does not. You will
see BASE64 used in encoding digital certificates, in
encoding user:password string in an Authorization: header
for HTTP. The spec is described in RFC 2045.
Don't confuse Base64 with x-www-form-urlencoded which
is handled by java.net.URLEncoder.encod...
|
|
Untouch 2.4 (Downloads: 437)
Reverts files dates back if the files have not really changed. Documentation on the original student project outline
mindprod.com/projects/untouchproj.html
This explains how it works and some of its uses.
Untouch supports the following command line switches which appear
before the directories.
-c or -clear = clear history first and take current file times as the new revert-to point.
-f or -force = revert files back to previous dates whether they have changed or not.
-h or -help =...
|
|
LEDataStream 1.8 (Downloads: 247)
Little-endian replacements for DataInputStream, DataOutputStream and RandomAcces Little-endian replacements for DataInputStream, DataOutputStream and RandomAccessFile. They work just like DataInputStream, DataOutputStream and RandomAccessFile except they work with little-endian binary data. Normally Java binary I/O is done with big-endian data, with the most significant byte of an integer or float first. Intel and Windows 95 tend to work with little endian data in native files. LEDataInputStream, LEDataOutputstream and LERandomAccessFile will le...
|
|
Boyer 1.5 (Downloads: 257)
Fast string search (indexOf) using the Boyer-Moore algorithm. Fast string search (indexOf) using the Boyer-Moore
algorithm. Incorporate this class into your own Java
programs to rapidly search strings.
use:
import com.mindprod.Boyer.Boyer;
...
Boyer b = new Boyer("dogcatwombat");
int where = b.indexOf("cat");
or
int where = Boyer.indexOf("dogcatwombat","cat");
Boyer-Moore is about twice as fast as String.indexOf wh...
|
|
JarCheck 1.4 (Downloads: 511)
Check that class target versions are as expected in a Java jar. Check a Java jar to make sure all the javac -target versions of
the class files are what you expect.
Java application.
Requires Java version 1.5 or later.
All Java source code is included.
to use:
java -jar jarcheck.jar jartotocheck.jar 1.1 1.7
where jartocheck.jar is the name of jar to check.
It will check all the class files in it.
In this example:
1.1 is the lo...
|
|
BlOut 2.6 (Downloads: 370)
Blout removes extra or all blank lines from a file. Blout removes extra blank lines from a file, collapsing multiple blank
lines down to one, (or removing them altogether with the -compact option).
It also ensures the file has a final CrLf. It also trims any blank lines
off the beginning and end of the file. It also converts all line endings
to Windows standard CrLf form. It trims trailing tabs and spaces from
each line.
Blout is not that bright. It does not understand w...
|
|
FileFilters 2.7 (Downloads: 424)
Colllecton of Java FilenameFilters. FilenameFilters you can use in your own Java programs with
File.list( FilenameFilter f ). They can also be used
standalone as fancy dir commands.
They come with Java source and include:
AllDirectoriesFilter gets all directories
AllFilesFilter gets all files
ClamFilter simple wildcard
DirListFilter gets a list of directories
EndsWithFilter gets files whose names end with a...
|
|
Encodings 1.6 (Downloads: 249)
Applet to list all supported encodings (character sets) supported by Java. Applet to list all supported encodings (character sets)
supported by your browser/java.
To install, Extract the zip download with WinZip,
(or similar unzip utility) into
any directory you please, often C:\ -- ticking off the (user
folder names) option. To run as an application, type:
java -jar C:\com\mindprod\encodings\encodings.jar
adjusting as necessary to account for where the jar file is....
|
|
HeapSort 1.7 (Downloads: 241)
HeapSort is an implementation of Williams and Floyd classic HeapSort. HeapSort is an implementation of Williams and Floyd's TopDown HeapSort.
HeapSort is a fast internal sort written in Java that uses a
sorting algorithm analogous to power struggles for higher
positions in a hierarchical bureaucracy. Source provided. It
is faster than QuickSort, but slower that RadixSort. It
sorts using a comparison routine you provide to compare two
elements to be sorted.
You can test it with:
|
|
Tabin 5.3 (Downloads: 252)
Converts spaces to tabs in an ASCII text file. Converts spaces to tabs in an ASCII text file
Usage:
TABIN.exe Myfile.txt
Assumes tab stops are 8 columns apart. Don't use it on word
processor files. C source included. Copyrighted by Canadian
Mind Products. May be freely distributed and used for any
purpose except military. It has been rewritten in C from
Pascal for extra speed. Users of previous versions should
take care to delete the old TABIN.COM...
|
|
Ini 1.4 (Downloads: 503)
Windows *.ini file verifier, tidier and sorter. Windows *.ini file verifier, tidier and sorter.
Tidies and sorts windows *.ini files, ones that look like this:
[section]
; a comment
item=value;
To use:
java.exe -jar ini.jar C:\somedir\somefile.ini UTF-8
Where UTF-8 in the encoding.
Opera uses UTF-8. You can leave it to the default for most others.
The original is named somefile.ini.old when you are done.
Don't run ini ...
|
|
Quoter 5.1 (Downloads: 439)
Converts text with many possible cleanups and transformations. Converts text with many possible cleanups, including
preparation of HTML and Java, aligning in columns, character
set conversion, case converting, removing excess white
space, removing blank lines, preparing regex expressions....
converts raw text with the following possible cleanups:
0. Flow text by removing newline characters. Useful to prepare text to paste into web comment boxes.
1. Convert awkward chara...
|
|
Borders 1.5 (Downloads: 234)
Displays a variety of decorative borders. Shows off what you can do with Swing. Displays a variety of decorative borders.
Shows off what you can do with Swing.
To run as an application, type:
java -jar C:\com\mindprod\borders\borders.jar
adjusting as necessary to account for where the jar file is.
The picture frame icon represents the various decorative
borders you can put around your Swing panels....
|
|
Transporter 1.4 (Downloads: 247)
Lightweight Java classes to let you encrypt/sign/armour for secure transmission. The Transporter acts like an electronic secure courier to
deliver your data and documents in encrypted form safe from
prying eyes or those who would tamper with them.
It Encrypts, digitally signs and armours to send sensitive
information over the Internet without SSL.
Typically you would embed it in your own Internet
applications....
|