Image Processing with EXIF JPEG renaming and loss-free processingNov 30, 2005
You can rename and modify JPEG files without touching the graphics by manipulating settings in the file header.more »
imgSeek The imgSeek image viewerNov 30, 2005
The imgSeek image viewer offers a unique alternative to the non-intuitive norm of searching by filename: you can find an photo based on motif.more »
Scanning with XSane The XSane scanner front-end for LinuxNov 30, 2005
The Sane interface provides access to image processing devices such as scanners. You can manage your Sane-supported scanner from Linux with the handy XSane front-end.more »
Xnview Viewing and editing digital images with XnviewNov 30, 2005
Xnview is a handy image viewing and editing tool that is free for private use. We’ll show you around some of the program’s best features.more »
F-Spot The F-Spot image managerOct 31, 2005
Chaos is inevitable when your hard disk fills up with digital photos. The F-Spot image man agement program helps you manage your photo archives effectively and without time consuming sorting.more »
Web Design with GIMP Web page layouts with the GIMPSep 30, 2005
Good homepage design is a question of the layout. Sometimes the best option is to use a graphics program to design the page, then translate the result into HTML code. The versatile image manipulation program GIMP can help.more »
Tiling in GIMP Creating a seamless, tileable texture in GIMPAug 31, 2005
Graphic artists often face the problem of turning a photograph into an image that will tile over a larger surface. This task is not as easy as it sounds, but if you’re up for the challenge, this tutorial will give you a first-hand look at some advanced tools in the GIMP toolkit.more »
Celestia Touring the galaxy with CelestiaAug 31, 2005
Space, the final frontier, is a bit too expensive for a short vacation. If a trip to the moon is beyond your budget, why not try Celestia, a free program that brings the galaxy to the comfort of your home.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm