Fine Art HDR Processing Luminance HDR offers top-notch high dynamic range imagingMay 31, 2013
Processing images with a high dynamic range – that is, an image with a wide range of values between its bright and dark areas – is possible with open source Luminance HDR.more »
Workspace – Gallery Apps Lightweight web-based gallery applicationsApr 30, 2013
Sometimes full-blown photo sharing solutions are more than you need. We look at some lightweight alternatives that still get the job done.more »
Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Flam3 and Fractal Fr0st Generate unusual fractals with Fr0st and Flam3Apr 30, 2013
Few fractal algorithms create as beautiful and ethereal structures as Flam3. The Fr0st GUI helps you master the complex software.more »
Is Wayland the New X? Looking into the Future of Display Server ProtocolsMar 25, 2013
Display server expert Daniel Stone explains what is really happening with the future of graphical display protocols on Linux.more »
2D Animation Tools Overview of 2D animation programsMar 15, 2013
With the right tool and a bit of artistic talent, you can create two-dimensional cartoons, even without Flash. In this article, we present four animation programs and look at how well they perform in practice.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
PaintSupreme PaintSupreme image editor testedFeb 22, 2013
The market for good image editing programs for Linux is pretty much saturated. Despite this, BrainDistrict has dared to launch two commercial programs: IFX-Supreme and PaintSupreme.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.