Solved

JDK and Eclipse

Posted on 2013-05-13
6
322 Views
Last Modified: 2013-05-13
I just set up JDK and Eclipse on my Win7 64bit Development Machine

I am a .Net developer and I need to import a jar file
Make changes
Save/Complie?/Export the same jar file

I'm fairly sure I can get through the code (if I can remember my college Java...)
I just want to know the process.

The m5.jar is run with from a command line and I can execute it now
I just need to add some variables
0
Comment
Question by:lrbrister
  • 2
  • 2
  • 2
6 Comments
 
LVL 86

Expert Comment

by:CEHJ
ID: 39161628
I am a .Net developer and I need to import a jar file
Make changes
That jar would need to contain source code to do that. Usually, if that's the case, the file would have a .zip extension. jar files usually contain binaries only
0
 
LVL 8

Expert Comment

by:stmani2005
ID: 39161671
eclipse right click project go to add jar file or add exteral jar to import the jar

what do u want exactly

i dont understand your question
0
 

Author Comment

by:lrbrister
ID: 39161677
I have Eclipse working and my JDK working

I watched a YouTube video and have the m5.jar imported

You can see from my screen print I have isolated the variables I need to modify...
Actually, I just need to add 100 more variables

Once I do that...how to I export?  complie?  save as ?  the m5.jar file?

sp
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 86

Accepted Solution

by:
CEHJ earned 500 total points
ID: 39161709
Once I do that...how to I export?  complie?  save as ?  the m5.jar file?
You should be able to export as an executable jar through (iirc) the file menu
0
 
LVL 8

Expert Comment

by:stmani2005
ID: 39161763
right click project export as jar
0
 

Author Closing Comment

by:lrbrister
ID: 39161911
You were first.
Watch for followup questions
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Basic understanding on "OO- Object Orientation" is needed for designing a logical solution to solve a problem. Basic OOAD is a prerequisite for a coder to ensure that they follow the basic design of OO. This would help developers to understand the b…
Viewers will learn about arithmetic and Boolean expressions in Java and the logical operators used to create Boolean expressions. We will cover the symbols used for arithmetic expressions and define each logical operator and how to use them in Boole…
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now