Feeds

Ten Linux apps you must install

Here is the GNUs

Providing a secure and efficient Helpdesk

Shutter

RH Numbers

No matter what your purpose is, when it comes to taking screenshots, Shutter is the only option. It is incredibly feature-rich and very fast – unless you enable the timer mode, of course. You can capture certain areas, individual windows, the entire desktop or even menus and tooltips.

Shutter isn't limited to just capture either, once the shot is taken, it can be transferred directly into the editor where you can add shapes or text, censor private information or crop some more if you got it wrong the first time. From there, you can even upload directly to a number of image hosts without leaving Shutter.

Shutter

More info Shutter

SMPlayer

RH Numbers

On Mac OS or Windows, I will always use VLC Player for media playback. Under Linux, however, I have the option of using SMPlayer. Given that its back-end MPlayer is standard on just about all distributions, SMPlayer is highly compatible wherever you want to run it. Not only that, but it supports just about every possible format imaginable.

The real key to SMPlayer's success though, is its ability to remember settings on a per-file basis. It will remember where you stopped playing, and resume with the same audio track, volume or subtitle settings as before. Perfect.

SMPlayer

Internet Security Threat Report 2014

Next page: Synapse

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.