KTools: KreetingKard Designing greetings cards with KreetingKardMar 31, 2006
If you want to send your friends birthday greetings or a personalized picture postcard, KreetingKard can help.more »
Stellarium Stargazing with StellariumMar 31, 2006
If you like astronomy but you don’t like sitting outside on cold nights, try stargazing from a virtual planetarium.more »
pstoedit Converting PS and PDF files with pstoeditJan 31, 2006
pstoedit lets you convert Postscript and PDF files to vector-based image formats.more »
Gimp and Photos Rescuing your vacation snapshots with GimpJan 31, 2006
Gimp will help you dial up the quality on your less-than-perfect digital
Free 3D animation Open Source 3D animationDec 31, 2005
You need good software and plenty of CPU power to create virtual worlds. Luckily for today’s animators, powerful PCs are inexpensive, and some excellent animation tools are absolutely free.more »
Digital_Photo_Intro.pdf Managing digital images in LinuxNov 30, 2005
The Linux environment includes some powerful tools for editing, managing, and scanning digital images.more »
Image Processing with EXIF JPEG renaming and loss-free processingNov 30, 2005
You can rename and modify JPEG files without touching the graphics by manipulating settings in the file header.more »
imgSeek The imgSeek image viewerNov 30, 2005
The imgSeek image viewer offers a unique alternative to the non-intuitive norm of searching by filename: you can find an photo based on motif.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.