DeskTOPia: JWM JWM Window ManagerJul 31, 2005
JWM is a window manager for Linux users who demand an efficient GUI and are not afraid to fire up an editor to get it. If this sounds like the kind of tool you are looking for, read on to discover more about JWM.more »
Metapixel Photomosaics with MetapixelJul 31, 2005
If you're looking for more than a convention tile design, try Metapixel, a free tool that creates attractive photomosaics from a collection of digital images.more »
Inkscape Vector Graphics Vector graphics with InkscapeJun 30, 2005
When it comes to drawing with the computer, professionals often opt for vector graphics. Inkscape brings the power of vector graphics to Linux users. Our workshop demonstrates how to use the program.more »
Command Line: CD Images mkisofs, mount, md5sumMay 31, 2005
Before you burn a data CD in Linux, you need an ISO image – mkisofs
helps you create an Iso image. To save disks, you might like to check
the image before you burn it with md5sum.more »
KDE Image Menu (Kim) Converting images with KimApr 30, 2005
With a Konqueror-integrated service menu called Kim, you can modify and manipulate image files through a handy context menu.more »
Gimp Scripting Writing GIMP scriptsFeb 28, 2005
Many users turn to GIMP for pictures in the window, but some may not realize GIMP also has scripting capabilities that allow you to automate recurring tasks. The Python scripting language is a useful alternative to the GIMP’s integrated Lisp dialect.more »
GIMP 2.2 What’s New in GIMP 2.2Feb 28, 2005
The GNU Image Manipulation Program (GIMP) is often called the premium open source image manipulation project. Version 2.0 was released in February 2004, and now GIMP 2.2 is available. This article looks at GIMP’s progress over the past year.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm