Photo viewer F-Spot is now available in the version 0.5.0. with ‘‘a countless amount of enhancements, polish and bugfixes.’’ Says Ruben Vermeersch in his blog.more »
Adobe has issued its second release candidate of Flash Player 10, which should be approaching the finish line. Developers have not only fixed a number of bugs, but added a few new features.more »
Canonical, the company behind Ubuntu, wants a more elegant and user-friendly Linux-Desktop for it's users. In a full blown statement at this year’s OSCON, Ubuntu grounder Mark Shuttleworth proclaimed: ‘'The great task in front of us over the next two years is to lift the experience of the Linux desktop from something that is stable and robust and not so pretty, into something that is art'’.more »
Fotoxx v35 Image manipulation with FotoxxAug 31, 2008
The Fotoxx image manipulation program offers highlights such as HDR and panorama functions, but where there is light, there is also shadow.more »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
Version 2.6 of Gimp uses the Gegl library, which can display up to 32 bit color depth.
A tutorial on the Gimpusers.com community website gives visitors the lowdown on next generation Gimp features.more »
GIMP Improving digital images with the GNU Image Manipulation ProgramJul 10, 2008
GIMP is great for fixing digital images. We’ll show you how to correct washed-out or under-exposed images and white balance.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm