Software for Java courses
The CD used in the Java courses at DTU contains the following software:
-
Acroread-5.0.5 : Adobe Acrobat
Reader is free software that lets you view and print Adobe Portable
Document Format (PDF) files. With Acrobat Reader, you can also fill in
and submit Adobe PDF forms online.
-
BlueJ-1.2.1 : BlueJ is an
integrated Java environment specifically designed for introductory
teaching.
-
Cygwin : Is an GNU Unix
environment for Windows. This package includes the great editor
'XEmacs' and at LOT of usefull tools. A special package af Cygwin has
been created, for more information, see here.
-
GhostView-4.3 : GhostView
and GhostScript are both used to display postscript files. GhostView
is the viewer and GhostScript is the interpreter. GhostView and
GhostScript are included in every standard Linux distribution.
-
Java2-SDK-1.4 : Sun's version af the
Java2 develoment kit and documentation.
-
JZip-1.0.0.192 : A free
WinZip clone for Windows. The Linux equivalent for ZIP files is called
zip/unzip.
-
MiKTeX-2.2 : MiKTEX (pronounced
mick-tech) is an up-to-date implementation of TEX and related programs
for Windows (all current variants) on x86 systems. TEX is a
typesetting system invented by D. E. Knuth. TeX are included in every
standard Linux distribution.
-
Netbeans-3.3.2 : NetBeans is a
modular, standards-based integrated development environment (IDE),
written in Java. It currently has support for Java, but its
architecture lends itself to supporting other languages as well.
-
OpenOffice-1.0.1 : OpenOffice
is an free open-source office suite. Includes word processor
spreadsheet and a presentation program.
-
SSH/OpenSSH/Putty :
A free SSH protocol suite of network connectivity tools that
increasing numbers of people on the Internet are coming to rely
on. Many users of telnet, rlogin, ftp, and other such programs might
not realize that their password is transmitted across the Internet
unencrypted, but it is. SSH encrypts all traffic (including passwords)
to effectively eliminate eavesdropping, connection hijacking, and
other network-level attacks. Additionally, SSH provides a myriad of
secure tunneling capabilities, as well as a variety of authentication
methods.