Create and manage ISO images


Article from Issue 157/2013

Special tools are required to create and process ISO images. AcetoneISO offers this functionality, even making it possible to handle multimedia files.

ISO images have become part and parcel of the Linux universe, offering the capability of burning a complete distribution onto CDs and DVDs and thus becoming one of the most important means of distribution.

ISOs also form the basis of creating a bootable USB stick and can be used directly inside virtual machines as well. AcetoneISO lets you adapt ISO images to your personal requirements, allowing you to derive a highly individualized operating system from a standard image; however, AcetoneISO can do considerably more.

This small program can be found in the repositories of popular distributions, from which you can easily install it and all dependent packages via your distribution's package manager. If necessary, you will find the source code on SourceForge [1].


Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • KDE Image Menu (Kim)

    With a Konqueror-integrated service menu called Kim, you can modify and manipulate image files through a handy context menu.

  • Burning with Brasero

    Gnome’s integrated burning tool is fine for simple tasks, but if you need to do more than just back up a couple of documents on a CD, you might prefer a more powerful program like Brasero.

  • Command Line: CD Images

    Before you burn a data CD in Linux, you need an ISO image – mkisofs

    helps you create an Iso image. To save disks, you might like to check

    the image before you burn it with md5sum.

  • Digital_Photo_Intro.pdf

    The Linux environment includes some powerful tools for editing, managing, and scanning digital images.

  • Perl: Optical Character Recognition

    SecurID tokens use an authentication system by RSA Security to give the user a valid key for logging onto the target system. A home-grown optical character recognition tool in Perl monitors the key generator.

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95