Compile and Run Syncany on Ubuntu 11.04
Syncany is a relatively young project, but it already garnered the attention of the open source crowd as a potential replacement for Dropbox. Syncany's major attraction is its support for a wide range of storage back-ends: from good old FTP, to Amazon S3, WebDAV, and even Picasa. Better yet, additional back-ends can be easily added via plugins.
While Syncany is far from ready for prime time, you can compile the current version of it from the source code to see for yourself what all this buzz is about.
First off, install the required packages using the following command (don't forget to enable Canonical Partners' repository in Synaptic first):
sudo apt-get install bzr sun-java6-jdk sun-java6-javadb ant libcommons-codec-java libcommons-cli-java libcommons-lang-java libcommons-collections3-java libcommons-logging-java libcommons-vfs-java libdom4j-java liblog4j1.2-java libjava-gnome-java libappframework-java libcommons-httpclient-java libj2ssh-java libcommons-net2-java
Next, you have to switch to Sun JRE as the default Java runtime environment. To do this, run the sudo update-alternatives --config java command and select the appropriate item. Fetch then Syncany's source code by running the bzr branch lp:syncany command. In the terminal, use the cd syncany/syncany command to switch to the syncany directory. Finally, build Syncany,and start the application using the following commands:
If everything works properly, you should see Syncany's configuration wizard that guides you through the process of creating a synchronization profile. That's all there is to it.comments powered by Disqus
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm