Posted by John R Hudson
( 4 minute read )
A new report on the cost of cybercrime commissioned by the MoD suggests that we should spend a lot less on prevention and a lot more on detection.
Posted by John R Hudson
( 2 minute read )
Kriss and Shi introduced the co-operative
Spies vs Ghosts game they had devised for the Raspberry PiRaspberry Pi Hack Day.
Posted by John R Hudson
( 1 minute read )
David C gave us a photographic tour of Airedale
Fab Lab and suggested that we should organise a trip there one Saturday.
Posted by John R Hudson
( 1 minute read )
Andy kicked us off with a look at GIMP 2.8 and some of the new features. We also got a demo on using the GIMP to produce simple web graphics and for photo enhancement. There was some interesting discussion about how this versions allows GIMP to look and feel more like Photoshop, but also about how the integration of Photoshop into the Adobe suite of tools means that, while GIMP can easily create print ready artwork, hard core Photoshopers are still not likely ot make the switch.
Gimp 2.8 is not available in some distros, so the PPA for Ubuntu 12.04 (also works on Mint 13 (Maya) is:
http://www.ubuntugeek.com/how-to-install-gimp-2-8-2-in-ubuntu-12-04-precise.html
David gave us the 4th instalment in his series on the introduction to the command line. Alice pre-empted much of his talk as becoming customary, and as usual, 'we all learned something'
Downloads:
Posted by Dave Carpenter
( 1 minute read )
Alice showed us how to use Selenium to record actions on a webpage and turn them into tests.
These are the links you need:
Some talk about Cuttlefish:
https://apps.ubuntu.com/cat/applications/cuttlefish/ - which will adapt your environment to your changing circumstances.
Dave continued his command line talk which was NOT called the Human Centipede, but had a lot to do with
pipes.
Also it was our Birthday. Thanks to Richard for the Cake (it was not a lie!).
Posted by John R Hudson
( 1 minute read )
David pointed out that in Unix everything is either an operation or something being operated on.
The things being operated on are files in the filesystem which he pointed out resembles the humble potato.
Posted by John R Hudson
( 5 minute read )
Pros: No need for virus software It is more difficult to write viruses and easier to spot them with FOSS. However, most malware now comes through web browsers; so the main advantage is not having to wait for virus software to do its thing.
Posted by John R Hudson
( 1 minute read )
The first instalment of David's introdution to the command line and the latest adventures with Raspberry-Pi followed by a look at Ada Lovelace's contribution to computing are among items on the agenda.
Posted by Dave Carpenter
( 3 minute read )
I spend a lot of time helping people get their information onto the web, and Wordpress is a great tool for doing just that.