Creating training videos with recordMyDesktop
A training video of a new application can really reduce the learning curve. The recordMyDesktop program is at an early stage of development but already stable enough for everyday use. We'll show you how to use the program to capture custom procedures in a desktop video.
IT trainers understand that the best way to teach a desktop procedure is to help the user visualize each step. Overhead projectors were long regarded as the best approach; in recent years, computer-based slideshows and video projectors have extended this philosophy. But even these "modern" teaching aids suffer from the fact that they are static: In the best case, all you can show your students is a short text segment and a couple of screenshots.
Educational videos, typically implemented as Flash animations, are a relatively recent innovation. To play the video, all the student needs is a web browser with a suitable Flash plugin. Because a native Linux application for Macromedia's proprietary Flash format did not exist at first, trainers and teachers had no alternative but to create their own tools for building training videos.
A number of Linux developers rose to this challenge and programmed recordMyDesktop  and Istanbul . Both programs are currently at an early stage of development, but lab tests reveal that recordMyDesktop is certainly mature and stable enough for everyday use.
To run recordMyDesktop, all you need is a working Linux PC with one of the major video players (Totem, Xine, MPlayer). If you want the recording to be professional, the system also must have a sound card, and you will need a microphone for sound recording. If you intend to use the GUI to control the software, you need both the free Theora codec and a complete Python environment, including matching Qt and Gtk modifications.
RecordMyDesktop is available in binary format for almost any Linux distribution, which considerably simplifies the installation. Users with Fedora and Mandriva, or their derivatives, will find pre-built packages at Rpmfind ; packages for Slackware and its derivatives are available from Linuxpackages . Debian and Ubuntu offer the package in their own repositories, and fans of openSUSE can turn to Rpmseek . If you use any other distribution or prefer to build the program yourself, Sourceforge  has a tarball with the current source code package.
Although recordMyDesktop is a command-line program, the developers have programmed two almost identical front ends for Gnome/XFCE and KDE: Gtk-recordmydesktop and Qt-recordmydesktop. Both are available as pre-built binary packages for most distributions.
Synaptic, Rpmdrake, and YaST will also set up the required menu entries when they install the programs, allowing users to launch the software in next to no time.
Sound and Vision
Modern computers typically have a sound card. To avoid reinventing the silent movie with recordMyDesktop, just attach a microphone to your sound card's microphone input jack.
In our lab, I achieved the best results with a simple clip microphone clipped onto the collar of my shirt or attached to a buttonhole (Figure 1).
The microphone needs a stereo jack; if you use a mono jack, a modern sound card will only record on one channel. On top of this, PC sound cards are not designed to support just any input impedance.
Microphones with just a couple of hundred ohms impedance are not suitable: You will achieve the best results with a device that offers about 2.5 to a maximum of 10kohms.
To avoid feedback through your PC's loudspeakers, most distributions disable the microphone input by default; you might need to enable it in the ALSA Mixer. To do so, check the Rec. checkbox in the Mic slider window.
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm