Metapixel Photomosaics with MetapixelJul 31, 2005
If you're looking for more than a convention tile design, try Metapixel, a free tool that creates attractive photomosaics from a collection of digital images.more »
Inkscape Vector Graphics Vector graphics with InkscapeJun 30, 2005
When it comes to drawing with the computer, professionals often opt for vector graphics. Inkscape brings the power of vector graphics to Linux users. Our workshop demonstrates how to use the program.more »
Command Line: CD Images mkisofs, mount, md5sumMay 31, 2005
Before you burn a data CD in Linux, you need an ISO image – mkisofs
helps you create an Iso image. To save disks, you might like to check
the image before you burn it with md5sum.more »
KDE Image Menu (Kim) Converting images with KimApr 30, 2005
With a Konqueror-integrated service menu called Kim, you can modify and manipulate image files through a handy context menu.more »
Gimp Scripting Writing GIMP scriptsFeb 28, 2005
Many users turn to GIMP for pictures in the window, but some may not realize GIMP also has scripting capabilities that allow you to automate recurring tasks. The Python scripting language is a useful alternative to the GIMP’s integrated Lisp dialect.more »
GIMP 2.2 What’s New in GIMP 2.2Feb 28, 2005
The GNU Image Manipulation Program (GIMP) is often called the premium open source image manipulation project. Version 2.0 was released in February 2004, and now GIMP 2.2 is available. This article looks at GIMP’s progress over the past year.more »
Linux for Layout: Preparing for Print Templates and PDFs in ScribusJan 31, 2005
In this final part of our three-part series ,we’ll put the finishing touches on our Linux newspaper. You’ll learn how to generate a PDF,and you’ll find out what a real pre-press professional thinks about our project.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.