BlogStats offers ability for user to make blog by editing and storing blog records at his personal computer, to link pictures with records and to set tags of records.

BlogStats' master of diagrams can make 6 types of diagrams. They are very useful for blogger who want to know:

1. what tags and when blogger writes more than others,
2. how tags of records impress to the time between records,
3. how the time since previous record impress to tag of next record,
4. and also how tags of records impress one to others.

BlogStats distributes as source code package, requiring from customer to have possibility to compile and install programs in order to make BlogStats installation.
Also compiled Debian package available to easy install on Ubuntu.

The program is written and works under Linux operating system. The possibility to install and use the program in Cygwin environment was not tested by the author. In theory it could work with Cygwin.

Features

  • Create, open and save the blog data file.
  • The one blog, the one blog database (SQLite3).
  • Add, edit and delete records of the blog.
  • Records are sorted by their date/time (asc/desc. order).
  • Add or remove picture files to blog records.
  • Pictures are copying to the blog pictures folder.
  • Texts of records are stored at the blog texts folder.
  • Add, rename or remove the blog tags (themes).
  • Choose and set color for each tag to draw diagrams.
  • Six different types of diagrams.

Project Samples

Project Activity

See All Activity >

Categories

Blogging

License

GNU General Public License version 3.0 (GPLv3)

Follow BlogStats

BlogStats Web Site

Other Useful Business Software
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of BlogStats!

Additional Project Details

Operating Systems

Linux

Languages

English, Russian, Ukrainian

Intended Audience

End Users/Desktop

User Interface

OpenGL, Qt

Programming Language

C++

Database Environment

SQLite

Related Categories

C++ Blogging Software

Registered

2012-07-14