Other listings by this author |
|
File Splitter 1.3 (Downloads: 321)
Split large text/html files into smaller files using embedded split commands. Split large text/html files into smaller files. I find it
much faster and more accurate than cut and paste.
You embed commands in the big file telling it which pieces
of it are to go where, then let Splitter do the work. It is
much faster and more accurate than trying to select huge
blocks of text in an editor. You don't accidentally lose or
duplicate text. Keeping files small makes the site more
responsive.
|
|
Honk 1.5 (Downloads: 245)
Plays one or more of the Standard Windows sounds or wav files. Plays one or more of the Standard Windows sounds, triggered
purely from the command line.
use:
honk
- Plays the default system sound.
honk SystemStart SystemHand SystemQuestion
- Plays the given list of standard system sounds (usually just one).
- they are case-insensitive (you can get the case wrong and it will still work).
Possible sound names are listed in the registry...
|
|
Insult 1.9 (Downloads: 334)
Generates insults typical of those posted by Republicans in newsgroups. Generates insults typical of those posted by Republicans in
the alt.politics.bush newsgroup.
Java Applet that can also be run as an application.
You can run it without installing it at
mindprod.com/applet/insult.html
To install, Extract the zip download with WinZip, (or similar unzip utility) into
any directory you please, often C:\ -- ticking off the (user
folder names) option. To run as an application,...
|
|
RadixSort 1.6 (Downloads: 220)
RadixSort is a fast internal sort written in Java that mimics a card sorter. RadixSort is a fast internal sort written in Java that
mimics a card sorter. Source provided. It is faster than
both HeapSort and QuickSort. It sorts using a comparision
routine you provide to compare two elements to be sorted
plus a method to extract individual bytes from the keys to
be sorted. The time to sort each item unlike most sorts,
does not increase with larger sorts. It depends rather on
the key length.
|
|
Dedup 1.5 (Downloads: 230)
Java command line utility to removes duplicate lines from text files. DeDup is a Java command-line utilty for removing duplicate
lines in text files.
The dedup process compares adjacent lines only. It does not
sort first. The comparison is case sensitive. It removes
adjacent indentical lines. It replaces the original file, so
do a backup first. You can dedup 1 to N files in one
execution, just put their names on the command line.
DeDup deletes blank lines from both the beginning...
|
|
ISBN 2.5 (Downloads: 340)
Tidies, interconverts and Validates ISBN-10 and ISBN-13 book numbers. Helps you proofread, interconvert, validate and tidy ISBN-10 and ISBN-13 (International Standard Book Number) references in your HTML or other documentation. It validates the checkdigit, inserts dashes, interconverts ISBN-10 and ISBN-13. It displays them both with and without dashes....
|
|
Rgrow 1.3 (Downloads: 212)
RGrow resizes fixed length records padding or chopping. RGrow resizes fixed length records e.g.
RGrow.exe MyFile.seq 500 600
will grow each record from 500 to 600 bytes by padding binary zeros.
Will also truncate records.
These are not the old and new sizes of the file, but of the fixed length records
in the file. If you increase the record size, each record will be padded
with nulls. The entire file will grow as a result.
This program may be freely copied and us...
|
|
SiteMap 1.9 (Downloads: 319)
Prepare Spidering Sitemap for Google and other search engines. You use a sitemap to encourage Google or other search
engines to more frequently and efficiently index your
website.
For overview information about Google sitemaps see:
mindprod.com/jgloss/google.html#SITEMAPS
For overview information about this utility see:
mindprod.com/jgloss/google.html#SITEMAPUTILITY.
You use this sitemap utility because it is so quick you can
use it before every upload so that...
|
|
FourTidy 3.1 (Downloads: 320)
Tidies Take Command/TCC/4NT/4DOS DESCRIBE file descriptors To tidy, sort, prune and dedup a JP Software
Take Command/TCC/4NT/4DOS hidden descript.ion file. These files are used by
the DESCRIBE utility to track what your various files
are for.
First make the directory containing the usually-hidden descript.ion file
current. e.g.
C:
cd \env
Then invoke the java program with:
java.exe -jar C:\com\mindprod\fourtidy\fourtidy.jar
If you...
|
|
Password 1.7 (Downloads: 552)
Generates random passwords that are hard to guess. Generates random passwords that are hard to guess. It uses a crytographic quality random number generator. The passwords are generated locally in a Java Applet. They are never transmitted over the Internet, even in encrypted form.
You can also run it as a standalone program, invoking it with
java com.mindprod.password.Password
or
password.jar
You can also run it online at the mindprod.com website without installing it....
|
|
Screws 1.3 (Downloads: 241)
CMP Screws and Screwdrivers draws eight types of screw heads. CMP Screws and Screwdrivers draws eight types of screw
heads. It is a teaching example for how to use Java Canvas,
fillRect, fillOval, fillPoly and AffineTransform to draw.
Java source is included for you to cannibalise.
It draws 8 types of screw heads.
To run as an application, type:
java -jar C:\com\mindprod\screws\screws.jar
adjusting as necessary to account for where the jar file is....
|
|
BOOTSave 2.8 (Downloads: 282)
BootSave saves/restores the master boot sector BootSave saves/restores the master boot sector on the
hard disk. Suite of three utilities BootSave, BootRest and
BootChk. Protects against damage to the partition table or
boot sector done by rogue programs, viruses or accidents
with tools like Norton NU.
The BootSave suite will work under DOS, Windows 3.x, Windows
95/98/ME, OS/2, but not NT, Windows 2000, XP, Vista or Windows 7.
These OSes block low level disk I/O as...
|
|
Pws 2.0 (Downloads: 232)
PWS (the pathway amanuensis) helps you with personal problems. PWS (the pathway amanuensis) helps you with personal
problems. You describe your problem and it prescribes some
sage advise based on Ken Keyes' twelve pathways from the
book Handbook To Higher Consciousness.
To install, Extract the zip download with WinZip, available from
winzip.com (or similar unzip utility) into any
directory you please, often C:\ -- ticking off the (user
folder names) option. To run as an applicat...
|
|
Accumulate 1.3 (Downloads: 194)
Used to accumulate values by category. Used to accumulate values by category. It might be useful
for example in a billing program to accumulate hours by
various categories.
It could be used to count how many times various words
occurred in a document.
All you need is:
buckets.accumulate( "somecategory", someamount );
And Accumulate looks after creating the buckets to
accumulate new categories for you.
e....
|
|
Echoserver 1.3 (Downloads: 241)
See what browsers and programs are sending to an HTTP Server. See what browsers and programs are sending to an HTTP Server.
Simple server just dumps whatever it receives on the console.
Echoserver is misnamed because it does not actually echo what it receives
back to the browser....
|
|
Masker 1.9 (Downloads: 291)
Hides email addresses from spammers as PNG image files. Produces PNG files (image files similar to GIFs, but
smaller) that contain your email address. When you post them
on your website, it is harder for spammer to harvest them.
You can include the generated image files in the HTML on
your website with: code like this:
[a href="../image/mailto/roedy.png"]email me[/a]
(pretend [] are angle brackets)
or
[mg src="image/mailto/r...
|
|
Wassup 2.5 (Downloads: 468)
Wassup let's you know what's up with your Java environment. Wassup let's you know what's up with your Java environment.
It will tell you the System Properties, as many as the
Security system will let you peek at. This includes such
things as which JVM is running, which version of Java, which
vendor. It may be run as either an Applet or an application.
When you run Wassup as an application it shows you
considerably more information. The Java sandbox considers it
a security risk to rev...
|