Alternative file manager for Gnome
Bookmarks and Plugins
As with all current Web browsers and file managers, Gnome Commander can handle bookmarks (see Figure 2). Either enter new addresses in the Bookmarks menu Add bookmark… section, or just click the bookmark icon above a directory window.
If you select Edit bookmarks …, you can easily edit and group your existing bookmarks.
Gnome Commander has much more in the line of features than I can cover in this article. For example, the program lets you define individual keyboard mappings or add plugins to extend functionality.
Currently, only two plugins appear to be available, but programmers should feel free to contribute more.
The roadmap for the next major version includes a shift to the new virtual filesystem library, Gio/GVFS, which Nautilus uses heavily. This might improve interaction with the virtual folder when writing CDs or DVDs.
The interface also needs some tender loving care: Display errors with too-narrow windows spoil what is otherwise a very usable interface.
If you are looking for a useful alternative to Nautilus and already have some experience with, for example, Midnight Commander, you will have no trouble at all moving to Gnome Commander.
- Gnome Commander: http://www.nongnu.org/gcmd/index.html
- Split view in Nautilus: http://mail.gnome.org/archives/nautilus-list/2008-February/msg00051.html
- Midnight Commander: http://www.ibiblio.org/mc
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm