Codetown ::: a software developer's community
$ scala searchjar.scala ServerInfo /opt/tomcat6/lib /opt/tomcat6/lib/catalina.jar org/apache/catalina/util/ServerInfo.classThe script can walk over one or more directory and search all jar files for you.
/opt/tomcat6/lib/catalina.jar org/apache/catalina/util/ServerInfo.properties
$ scala displayjar.scala /opt/tomcat6/lib/catalina.jar org/apache/catalina/util/ServerInfo.properties # Licensed to the Apache Software Foundation (ASF) under one or moreYou can even run the displayjar.scala with just a jar file, and it default to print out the Manifest file content.
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
server.info=Apache Tomcat/6.0.18
server.number=6.0.18.0
server.built=Jul 22 2008 02:00:36
Tags:
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The team behind Google Kubernetes Engine (GKE) revealed that they successfully built and operated a Kubernetes cluster with 130,000 nodes, making it the largest publicly disclosed Kubernetes cluster to date.
By Craig Risi
Andra Lezza explains the criticality of data security for AI copilots, detailing the OWASP AI Exchange threat model and the OWASP Top 10 LLM risks. She reviews two copilot architectures - independent (single domain) and integrated (multi-tenant) - listing specific threats, controls, and best practices like granular authorization, templates, and DevSecOps to secure the entire AI data supply chain.
By Andra LezzaQCon AI New York Chair Wes Reisz talks with LinkedIn’s Karthik Ramgopal and Prince Valluri about enabling AI agents at enterprise scale. They discuss how platform teams orchestrate secure, multi-agentic systems, the role of MCP, the use of foreground and background agents, improving developer experience, and reducing toil.
By Karthik Ramgopal, Prince Valluri
The 2025 edition of re:Invent recently took place in Las Vegas. As anticipated, AI was a significant focus of the keynotes, but the community was more intrigued by announcements in the serverless space, including Lambda Managed Instances and Lambda Durable Functions. The conference marked the final keynote for Amazon CTO Werner Vogels after 14 years.
By Renato Losio
An unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC) was recently reported with the highest severity (10.0). Amazon threat intelligence teams report active exploitation attempts by multiple China state-nexus threat groups. The critical vulnerability affects React versions 19.0.0 through 19.2.0 and Next.js versions 15.x and 16.x when using App Router.
By Bruno CouriolSwitch to the Mobile Optimized View
© 2025 Created by Michael Levin.
Powered by