Four 3D molecular visualizers compared
Avogadro, the Master Builder
Avogadro  does not aim to represent known structures, even though the application can do so; instead, you build your own molecule with Avogadro without having to know the coordinates of the individual atoms.
To begin, you just start to draw the rough structure from atom to atom. Then, you can start optimization mode and let Avogadro optimize the geometry of the molecule in line with energetic considerations: The lower the binding energy, the more dense the molecule is in the real structure. After composing the molecule, you then measure it and tell Avogadro to output the atom coordinates (Figure 5).
PyMOL, the All-Rounder
PyMOL's  capabilities are demonstrated in Figure 2; the program computes and shows the electron density incrementally in line with the instructions . PyMOL is as complex as it is powerful and consists of a script window and an image window, where it shows the computed image.
If you load multiple images, such as the molecule and the electron density space, as in Figure 2, then you can label the individual views by using the buttons labeled to the right of the image window. In my experience, masterful use of the PyMOL program is unlikely to be achieved without occasionally referring to the manual  – performance has its price.
GChemPaint, the Outsider
Strictly speaking, GChemPaint  is not in fact a visualization program. It made its way into our lab by virtue of one neat property: It can read data in the popular PDB molecule format of the Protein Data Bank , a freely accessible database that contains resources contributed by international biologists and biochemists in the form of 3D structures of proteins and nucleic acids.
The GChemPaint program shows the structural formula directly from the PDB coordinate files. This structural formula is then more useful in scientific documentation than a 3D visualization – as long as the molecules are not too big (Figure 6).
Buy this article as PDF
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems