Other listings by this author |
|
Unicode 1.8 (Downloads: 389)
Used to test your computer's Unicode support Used to test your computer's Unicode support and your font's
support for particular characters, or as a learning to to
explore the Unicode character set. Displays in Courier,
TimesRoman, Symbol, Dialog and Helvetica.
copyright (c) 1996-2008 Nic Fulton nic.fulton@reuters.com of
Reuters Ltd. Modified by Roedy Green
of Canadian Mind Products with permission.
To install, Extract the zip download with WinZip, availa...
|
|
HeapSort 1.7 (Downloads: 263)
HeapSort is an implementation of Williams and Floyd classic HeapSort. HeapSort is an implementation of Williams and Floyd's TopDown HeapSort.
HeapSort is a fast internal sort written in Java that uses a
sorting algorithm analogous to power struggles for higher
positions in a hierarchical bureaucracy. Source provided. It
is faster than QuickSort, but slower that RadixSort. It
sorts using a comparison routine you provide to compare two
elements to be sorted.
You can test it with:
|
|
JarLook 1.2 (Downloads: 316)
Check that class target versions are as expected in a Java jar. Check a Java jar to make sure all the javac -target versions of
the class files are what you expect.
Java application.
Requires Java version 1.5 or later.
All Java source code is included.
to use:
java -jar jarlook.jar jartotocheck.jar 1.1 1.4
where jartocheck.jar is the name of jar to check.
It will check all the class files in it.
In this example:
1.1 is the low...
|
|
Base64 1.9 (Downloads: 306)
Java classes to encode/decode Base64 and Base64u Base64 is a freeware way of encoding 8-bit characters using
only ASCII printable characters similar to UUENCODE.
UUENCODE embeds a filename where BASE64 does not. You will
see BASE64 used in encoding digital certificates, in
encoding user:password string in an Authorization: header
for HTTP. The spec is described in RFC 2045.
Don't confuse Base64 with x-www-form-urlencoded which
is handled by java.net.URLEncoder.encod...
|
|
BOOTSave 2.8 (Downloads: 290)
BootSave saves/restores the master boot sector BootSave saves/restores the master boot sector on the
hard disk. Suite of three utilities BootSave, BootRest and
BootChk. Protects against damage to the partition table or
boot sector done by rogue programs, viruses or accidents
with tools like Norton NU.
The BootSave suite will work under DOS, Windows 3.x, Windows
95/98/ME, OS/2, but not NT, Windows 2000, XP, Vista or Windows 7.
These OSes block low level disk I/O as...
|
|
SetClock 8.5 (Downloads: 917)
Set your PC Clock from an accurate atomic clock on the web. Set PC Clock from an accurate atomic clock on the web. You
can put in on your website so that others can use it to
correct their clocks without having to install software or
without you having to install software on your server.
Java Web Start signed.
Requires Java version 1.5 or later. Native code for Windows only.
Full Java source code included, and native C JNI code....
|
|
CMOSSave 4.6 (Downloads: 346)
Check CMOS for corruption and automatically restore it. CMOSSave CMOSRest CMOSChk restore corrupted CMOS from
backup and check that CMOS has not been tampered with.
Naive users sometimes meddle with CMOS settings. We need a
fast way to put the scores of subtle CMOS configuration
settings back the way they were.
Power surges can corrupt CMOS. We need a way for a naive
user to quickly restore all the CMOS settings.
If the battery fails, the contents will be los...
|
|
SortedArrayList 1.3 (Downloads: 242)
Sort and Merge ArrayLists efficiently. This is a pair of library classes to include in your own
code for manipulating ArrayLists.
It consist of two classes: SortedArrayList and Merge.
SortedArrayList is an ArrayList that remembers how it is
sorted, so that if you ask it to sort, it can sometimes
bypass the work when it is already in order. You declare the
order you want and it keeps the list sorted, You just call
sort whenever you need the list to ...
|
|
Splice 1.5 (Downloads: 456)
SPLICE splices bits of files together SPLICE splices bits of files together e.g.
SPLICE Cut MyFile.Txt Start 99 Length 99 Insert MyFile2.txt At 99
SPLICE Copy MyFile.Txt Start 99 Length 99 Overlay MyFile2.txt At 99
Uses for SPLICE:
1. excising a section of a file.
2. replacing a section of a file.
3. inserting a section into a file.
4. extracting a section of a file.
5. appending a section onto a file.
This program may be freel...
|
|
Batik 2.2 (Downloads: 515)
Java to let you create a custom utility to find and delete all junk files. Java classes to let you create a custom utility to find and
delete all junk files on your machine. Use one of the three
scripts supplied as an example, to create your own XXX.java
source code file then compile and use to rapidly clean your
drive of junk.
This program requires some elementary Java programming skill.
To compile
E:
cd \com\mindprod\batik
javac *.java
to run, make s...
|
|
SiteMap 1.9 (Downloads: 324)
Prepare Spidering Sitemap for Google and other search engines. You use a sitemap to encourage Google or other search
engines to more frequently and efficiently index your
website.
For overview information about Google sitemaps see:
mindprod.com/jgloss/google.html#SITEMAPS
For overview information about this utility see:
mindprod.com/jgloss/google.html#SITEMAPUTILITY.
You use this sitemap utility because it is so quick you can
use it before every upload so that...
|
|
FileFilters 2.7 (Downloads: 432)
Colllecton of Java FilenameFilters. FilenameFilters you can use in your own Java programs with
File.list( FilenameFilter f ). They can also be used
standalone as fancy dir commands.
They come with Java source and include:
AllDirectoriesFilter gets all directories
AllFilesFilter gets all files
ClamFilter simple wildcard
DirListFilter gets a list of directories
EndsWithFilter gets files whose names end with a...
|
|
FileTimes 1.9 (Downloads: 275)
Read and set Windows file/dir times from Java: Create/LastModified/LastAccessed Java class library to get/set file and directory times: Create/LastModified/LastAccessed. For Windows only.
Create time is when the file was first written. Modified
time (sometimes called lastModified) is when the file was
last written. Accessed time is when the file was last read
or written. Checking its date, looking at its attributes or
checking to see if it exists does not count as reading it.
Get/Set Windows Fil...
|
|
Password 1.7 (Downloads: 558)
Generates random passwords that are hard to guess. Generates random passwords that are hard to guess. It uses a crytographic quality random number generator. The passwords are generated locally in a Java Applet. They are never transmitted over the Internet, even in encrypted form.
You can also run it as a standalone program, invoking it with
java com.mindprod.password.Password
or
password.jar
You can also run it online at the mindprod.com website without installing it....
|
|
Amper 1.9 (Downloads: 449)
Safely converts ampersands to !amp; entities In the following, pretend ! is an ampersand. PAD files don't let me give literal examples. Amper converts ! to !amp; in HTML files and back, but does not convert it when the ! is already in an entity e.g. !lt; !thetasym; !eacute;
The main use for this is to pass HTMLValidator verification of your HTML, which is very picky about !, especially inside URLs.
As a side effect, it also ensures all your comment delimiters balance.
It ...
|
|
JDisplay 4.5 (Downloads: 427)
JDisplay displays colorised program listings in web pages. JDisplay displays Java, HTML, bat, SQL, ini, csv, xml, mft
properties... files a variety of colours, fonts, sizes
and weights to help make them more presentable and readable.
Why would you use it? For the same sorts of reasons you use
colours and fonts in an IDE like IntelliJ or Eclipse. They
make the code much easier to understand.
There is no server-side code used. Java utilities parse the
code snippets i...
|
|
Transporter 1.4 (Downloads: 248)
Lightweight Java classes to let you encrypt/sign/armour for secure transmission. The Transporter acts like an electronic secure courier to
deliver your data and documents in encrypted form safe from
prying eyes or those who would tamper with them.
It Encrypts, digitally signs and armours to send sensitive
information over the Internet without SSL.
Typically you would embed it in your own Internet
applications....
|