Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible reporting. It is a portable, well supported and very active Open Source project.
Installing
Thanks to the community, there are binary packages available here.
Building Timewarrior yourself requires
git
cmake
make
C++ compiler, currently gcc 4.8.1+ or clang 3.3+ for full C++11 support
Python 3, for running the testsuite
There are two ways to retrieve the Timewarrior sources:
git clone --recurse-submodules https://github.com/GothenburgBitFactory/timewarrior cd timewarrior
curl -O https://github.com/GothenburgBitFactory/timewarrior/releases/download/v1.4.2/timew-1.4.2.tar.gz
and expand the tarball tar xzf timew-1.4.2.tar.gz cd timew-1.4.2
Build Timewarrior, optionally run the test suite (note: the tarball does not contain tests), and install it.
cmake -DCMAKE_BUILD_TYPE=release
make
[make test]
sudo make install
This copies files into the right place (default under /usr/local
), and installs man pages.
Add the optional parameter -DCMAKE_INSTALL_PREFIX=/path/to/your/install/location
to the cmake
command if you want to install Timewarrior at a location other than /usr/local
. The make install
command may not require sudo
depending on your choice of install location.
Documentation
There is extensive online documentation. You’ll find all the details at timewarrior.net/docs/.
There you will find the documentation, downloads, news and more.
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…
Introduction In the vast ocean of the internet, the most powerful tool you already have…
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…