For anyone who deals with images on a regular basis—whether they’re photographers, bloggers, or digital artists—Adobe Photoshop is an indispensable tool. And while the program can be used to make extensive alterations to a single photo, there are times when what you want is to make more simple alterations to lots of photos. Fortunately, Photoshop makes that easy. Here’s how you can use the batch-processing capabilities in Photoshop to kick-ass-ify all your photos at once.
Using a pen and paper is so yesterday. The same goes for typing. Come on people: We’ve been hunting and pecking for more than 100 years! Where’s the progress? Our thoroughly modern civilization deserves a progressive method for data input. If you haven’t already embraced the speech-recognition features baked into Windows 7, it’s about time that you did. The future is now. Let us show you the way.
As a Windows user, you’re probably used to software that comes in a user-friendly package. If you want to install a new program, it’s usually a matter of running setup.exe, or occasionally a .msi installer. Because of this, a lot of Windows users panic when faced with the prospect of installing a file from source code. Well fear not, because it’s not that difficult. We’ll walk you through a source code install, step by step.
Sharing the spotlight with ZA’s well-known firewall is Kaspersky’s integrated scan engine. Kaspersky earned a 9 verdict and a Kick Ass award last year, and in our eyes, pairing its scan engine with ZA’s firewall is like hiring Chuck Norris and Bruce Lee as your personal bodyguards. If only they had come dressed for the job.
Like Norton, McAfee’s struggling to overcome an unflattering reputation among the tech-literate in hopes of expanding its user base beyond the OEM crowd, and last year’s completely retooled version went a long way toward that goal.
With the release of NIS 2011, it’s apparent Symantec is still trying to shed its lingering image in power-user circles as a resource pig, perhaps a little too hard at times. The new user interface is sleek and sexy with plenty of configuration options to drill into, but it’s also a little daunting for less savvy PC users. It’s the polar opposite of Microsoft Security Essentials, and if you’re experienced with computers, that’s great. Your Aunt Agnes, however, probably won’t make heads or tails out of it all.
Microsoft didn’t even bother to announce a version upgrade from 1.0 to 2.0, and at a glance, you wouldn’t be able to tell the difference. But make no mistake, Microsoft’s team of mechanics tweaked the scan engine and made some other changes underneath the hood.
In some ways, visiting cyberspace is kind of like entering a crowded subway car during the peak of flu season. You’re surrounded by all sorts of germs—in the form of trojans, spyware, viruses, rootkits, etc.—just looking for a vulnerable host to invade and feed on. Once you’re infected, these pests can wreak havoc on your system, swiping your personal information and passwords, annihilating your credit rating, and stealing your identity. To avoid a potentially virulent attack, you need to take precautions.