3D Molecular Visualizer Four 3D molecular visualizers comparedMay 31, 2013
Modern chemistry and biochemistry are hard to understand without 3D models. In this article, we look at programs that bring order to the chaos of connected atoms by arranging them in functional sections and in three dimensions.more »
Fine Art HDR Processing Luminance HDR offers top-notch high dynamic range imagingMay 31, 2013
Processing images with a high dynamic range – that is, an image with a wide range of values between its bright and dark areas – is possible with open source Luminance HDR.more »
Workspace – Gallery Apps Lightweight web-based gallery applicationsApr 30, 2013
Sometimes full-blown photo sharing solutions are more than you need. We look at some lightweight alternatives that still get the job done.more »
Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Flam3 and Fractal Fr0st Generate unusual fractals with Fr0st and Flam3Apr 30, 2013
Few fractal algorithms create as beautiful and ethereal structures as Flam3. The Fr0st GUI helps you master the complex software.more »
Is Wayland the New X? Looking into the Future of Display Server ProtocolsMar 25, 2013
Display server expert Daniel Stone explains what is really happening with the future of graphical display protocols on Linux.more »
2D Animation Tools Overview of 2D animation programsMar 15, 2013
With the right tool and a bit of artistic talent, you can create two-dimensional cartoons, even without Flash. In this article, we present four animation programs and look at how well they perform in practice.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm