Cookie

Tutorial: Rounded letters with GIMP

On the net there are a wide range of are free and often can also be used for commercial purposes, and for "Vasta gamma"I mean that there is something for all tastes. What we will do today is "smooth edges"The letters written in arial with GIMP.

Create a new image, on which we write the text to be "round"With the tool"text”: (more…)

“Prey” for your laptop

In the previous post we have already talked about how important it is to maintain a certain amount of security on your PC, especially if there are within sensitive data the Personal Information we do not want to disclose.

As already said Prey is the best program that I have been able to find among the programs for tracking stolen pc. E’ un software open source, released under the GNU Public License v3.0 and developed natively for Linux, but also supported by Microsoft and Mac OS X. Prey helps us to rediscover our computer stolen sending emails to our address containing a real "photography"The status of the pc. Prey sends us information about: (more…)

Security: Truecrypt, rSync, Prey

Caution: This article or part of it It was integrated in 2017.

Today we are computer security. Maybe we do not know, but for those who do not use special devices to your pc is risk. If it is stolen, the thief would have free access to all sensitive data content. For this it is important to use some small measure. In the article we will deal with:

  • security not to lose the important data,
  • security not to disclose the sensitive data,
  • safety in case of theft data.

For each of these points there is a program suitable, indeed.. esise a program specially. Of course open-source. (more…)