Cookie

Shutter, utility for screenshots

I often find myself coming to terms with the screenshot, especially when I write a tutorial, or when I write about a new program the little known.

Until some time ago I used the internal utilities Gimp (“File” – “Create” – “Screenshot“), whose options allow you to choose to “photograph” whole screen, or window with the senza decorations, or to set a delay in the event that we “photograph” of menu in sistema. (more…)

NoMachine NX, remote login

Many people Il logo della NoMachinereaders of the blog will know almost certainly VNC, the remote access software to display (the operare) the remote computer. Today, however, we are talking about NoMachine NX, software developed by NoMachine which deals with the “login” remote. A differenza di VNC non avremo la possibilità di vedere le operazioni eseguite dall’utente in remoto, ma la possibilità di loggarci come se fossimo un’utente della macchina a cui ci colleghiamo. (more…)

Gnome 3 and possible changes to the “System Status Area”

gnome_logo.jpg It 'available in a few days Gnome 2.30, this means that the next version will (the may be) Gnome 3 (which will include Gnome Shell). Wandering in the project are casually aware of some changes to the "System Status Area"That probably will come to life.

There is a possibility that in the "System Status Area” di Gnome 3 are used black and white icons "Ubuntu style” (or perhaps we should call them "Mac OSX style”). (more…)

“Prey” for your laptop

In the previous post we have already talked about how important it is to maintain a certain amount of security on your PC, especially if there are within sensitive data the Personal Information we do not want to disclose.

As already said Prey is the best program that I have been able to find among the programs for tracking stolen pc. E’ un software open source, released under the GNU Public License v3.0 and developed natively for Linux, but also supported by Microsoft and Mac OS X. Prey helps us to rediscover our computer stolen sending emails to our address containing a real "photography"The status of the pc. Prey sends us information about: (more…)