Fotoxx v35 Image manipulation with FotoxxSep 01, 2008
The Fotoxx image manipulation program offers highlights such as HDR and panorama functions, but where there is light, there is also shadow.more »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
Version 2.6 of Gimp uses the Gegl library, which can display up to 32 bit color depth.
A tutorial on the Gimpusers.com community website gives visitors the lowdown on next generation Gimp features.more »
GIMP Improving digital images with the GNU Image Manipulation ProgramJul 10, 2008
GIMP is great for fixing digital images. We’ll show you how to correct washed-out or under-exposed images and white balance.more »
Graphviz Graph visualization with GraphvizJul 10, 2008
Using drawing tools to manually create graphs and diagrams can be a slow and convoluted process. The Graphviz toolbox offers a faster way. Based on a short text with the information for the graph, Graphviz quickly generates a neat drawing.more »
GIMP: Part 2 Enhance less than perfect images with the GIMPJul 09, 2008
GIMP is a powerful tool for improving digital photos. We’ll explain how to crop pictures, simulate depth of field, and correct perspective.more »
TeXmacs TeXmacs – A convenient layout program for your text documentsJul 09, 2008
If you need to lay out a text document, you can opt for a WYSIWYG application, like OpenOffice, or a genuine layout system such as TeX. TeXmacs combines the advantages of both approaches: premium document quality and intuitive controls.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.