Helma JavaScript Web Application Framework 1.6.3-rc3


 
Thread Tools Search this Thread
Operating Systems OS X (Apple) OS X OpenSource RSS Helma JavaScript Web Application Framework 1.6.3-rc3
# 1  
Old 11-15-2008
CPU & Memory Helma JavaScript Web Application Framework 1.6.3-rc3

ImageAbout Helma JavaScript Web Application Framework
Helma is written in Java and employs JavaScript for its server-side scripting environment, removing the need for compilation cycles and reducing development costs while giving you instant access to leverage the whole wealth of Java libraries out there.

Helma offers simple and codeless mapping of application objects to database tables. In addition, an embedded object-oriented database performs automatic data persistence of unmapped objects.

More from Apple...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

How to call perl web service from javascript?

Hi, I would like to call the below perl web service from javascript .Any help would be appreciated.I am new to web services.Please do the needful. Server Program(Perl Web Service) #!/usr/bin/perl use lib '/usr/lib/perl5/5.8.8/SOAP-Lite-0.65_3/lib'; use SOAP::Transport::HTTP; use Demo;... (3 Replies)
Discussion started by: liyakathali
3 Replies
Login or Register to Ask a Question
w3af(1) 						w3af console user interface manpage						   w3af(1)

NAME
w3af_console - Web Application Attack and Audit Framework with console interface SYNOPSIS
w3af_console [-h] [-s <script-file>] [-p <profile-file>] [-i <metasploit-path>] DESCRIPTION
w3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulner- abilities that is easy to use and extend. This is the console user interface manpage. OPTIONS
-h Print help message. -s <script-file> Execute a script file. Example: "w3af_console -s script/web_spider.w3af". -p <profile-file> Run with the selected profile. Example: "w3af_console -p profiles/OWASP_TOP10.pw3af". -i <metasploit-path> Directory where MSF is installed (only used to install the virtual daemon) SEE ALSO
w3af(1), w3af_gui(1) User Guide To learn more about w3af please read the w3af users guide, which is available with your installation (readme/w3afUsersGuide.pdf) and also online at http://w3af.sourceforge.net/documentation/user/w3afUsersGuide.pdf . BUGS
The framework is still under development and has reported bugs. To read a complete list of them, or to submit a bug, please point your browser to https://sourceforge.net/tracker/?group_id=170274&atid=853652 . w3af 01 September 2008 w3af(1)