Language Selection

English French German Italian Portuguese Spanish

Creating appealing video software demos in Linux

Filed under

A software product description is nothing without screenshots. They are the most-clicked links on almost every free software page -- much more than "Download." Screenshots carry information about the software's appearance, maturity, user interface, user friendliness, and feature set in a much more immediate way than paragraphs of text description. You can't show some software characteristics with still images, however. That's why, in recent months, the screencast has seen growing popularity. And when you need to creating screencasts, Istanbul and Wink make the process easy for Linux users.

Just as a screenshot is a picture of a user's screen, a screencast is essentially a movie of what a user sees on his monitor. And if a picture is worth a thousand words, a movie is worth a thousand pictures.

Screencasts have a number of different uses. Mainly, the FLOSS community has adopted them to preview UI-related software features and to create short demos.

Screencasts are useful for demonstrating features of both simple and complicated software. In the open source community, projects have used screencasts to show improvements to the popular Blender 3D modeling tool, to present the Beagle search system to impatient users, and on a number of other occasions where demonstrating the interaction patterns or complex features of software was the primary goal.

Creating a screencast helps software developers show off their work. It is a useful skill for ordinary software users as well, to help report bugs (the movie takes the place of potentially unclear written explanations) or to show others how a given task is accomplished in a specific software environment.

Full Article.

More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Secure Server Deployments in Hostile Territory, Part II
    There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
  • Hackers Can Disable a Sniper Rifle—Or Change Its Target
    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
  • Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
    Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser. It's all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages. If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.

Open-Source CMSs Appeal To Control-Oriented Media

Snubbed by local media in their infancy for being too rudimentary, news outlets are taking a growing interest in using open-source content management systems like WordPress and Drupal. Media companies’ tech execs say they like the open-source CMS platforms because the software now offers all the extras and options that managed CMS platforms do, while also allowing them more creativity and control. Read more Also: Execs from Kentico and HIPPO debate pros and cons of open source CMS Jahia Provides Open Source User Experience Platform to Samsung Subsidiaries as a Global Platform Partner

Fedora's Rawhide Kernel Adds In KDBUS Support, Ready For Testing

Lennart Poettering announced today that KDBUS is now in Rawhide. "Josh [Boyer] thankfully added it to the Rawhide kernel packages, and our systemd RPMs come with built-in support, too now. If you are running an up-to-date Rawhide system adding "kdbus=1" to your kernel command line is hence everything you need to run kdbus instead of dbus-daemon. (No additional RPMs need to be installed.) If you do, things should just work the same way as before, if we did everything right. By adding or dropping "kdbus=1" to/from the command line you can enable kdbus or revert back to dbus1 on each individual boot." Read more