Treasure Box is a free standalone java application that documents, displays and searches user-defined items arranged in a hierarchy or tree structure. The system is similar to how a file management system organizes files and folders on your computer's storage devices. Items can be associated with zero, one or more images. All the data associated with an item as well as the names of the item images are stored in a MySQL database on the users PC.

Other things I found useful to photograph were items on shelves like books or CDs. By providing a zoom and rotate features I was able to browse my books or CDs on my shelves anywhere in the house. The more I used the program the more features I wanted to add.

The program is fairly generic and can be used for a variety of collections within a tree structure. Digital images are easy to take and cost very little to store. Treasure Box can help you organize your treasures and help you find them when you need them.

Features

  • SQL database interface for select, insert, update, delete and search functions
  • dynamic tree structure, display and handling
  • image manipulation, resizing, zoom and display
  • print interface
  • support for multiple projects
  • full screen display
  • browse / maintenance modes
  • free java source code

Project Samples

Project Activity

See All Activity >

License

Public Domain

Follow TreasureBox

TreasureBox Web Site

Other Useful Business Software
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of TreasureBox!

Additional Project Details

Operating Systems

Linux, Windows

Intended Audience

Advanced End Users, Developers, Education, End Users/Desktop, Information Technology

User Interface

Java Swing

Programming Language

Java

Database Environment

JDBC, SQL-based

Related Categories

Java Front-Ends, Java User Interface (UI) Software, Java Collection Management Software

Registered

2013-03-04