GNU Image Manipulation Program Vodiˇc Za

Total Page:16

File Type:pdf, Size:1020Kb

GNU Image Manipulation Program Vodiˇc Za GNU Image Manipulation Program 1 / 19 GNU Image Manipulation Program Vodicˇ za korisnike GNU Image Manipulation Program 2 / 19 Copyright © 2002, 2003, 2004, 2005, 2006, 2007 The GIMP Documentation Team Pravna upozorenja Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section enphrased GNU Free Documentation License. GNU Image Manipulation Program 3 / 19 COLLABORATORS TITLE : REFERENCE : GNU Image Manipulation Program ACTION NAME DATE SIGNATURE WRITTEN BY July 26, 2007 REVISION HISTORY NUMBER DATE DESCRIPTION NAME $Revision: 1985 $ 2007-07-15 romanofski GNU Image Manipulation Program 4 / 19 Contents I Prvi GIMP koraci 5 1 First Steps With Wilber 6 1.1 Osnovni GIMP koncepti . 6 1.2 Uvod ......................................................... 8 1.2.1 Glavna Alatna kutija . 9 2 Bibliografija 11 2.1 Knjige . 11 2.2 Internet izvori . 11 A GNU Free Documentation License 13 A.1 PREAMBLE . 13 A.2 APPLICABILITY AND DEFINITIONS . 13 A.3 VERBATIM COPYING . 14 A.4 COPYING IN QUANTITY . 14 A.5 MODIFICATIONS . 15 A.6 COMBINING DOCUMENTS . 16 A.7 COLLECTIONS OF DOCUMENTS . 16 A.8 AGGREGATION WITH INDEPENDENT WORKS . 16 A.9 TRANSLATION . 17 A.10 TERMINATION . 17 A.11 FUTURE REVISIONS OF THIS LICENSE . 17 A.12 ADDENDUM: How to use this License for your documents . 17 B Joooooj nedostaje pomoc´ 18 C Index 19 GNU Image Manipulation Program 5 / 19 Part I Prvi GIMP koraci GNU Image Manipulation Program 6 / 19 Chapter 1 First Steps With Wilber 1.1 Osnovni GIMP koncepti Ovo je kratki uvod u osnovne koncepte i terminologiju koja ce´ vam biti potrebna za razumijevanje ostalog dijela dokumentacije o Gimpu. Ovdje cete´ naci´ objašnjenja podrobnije opisana nego bilo gdje drugde. Brojnim linkovima i ostalim unakrsnim referencijama pokušali smo izbjeci´ nejasnoce,´ uz koje sitne iznimke, naravno. Sve što je ovdje spomenuto lako se može naci´ u indexu Slike Slike su osnovna cjelina Gimpa. Grubo recenoˇ jedna ‘slika’ je jednostavna datoteka, kao što je TIFF ili JPEG. Sliku možete shavtiti i kao jedan prozor, medutim¯ to baš i nije tocno:ˇ moguce´ je imati više otvorenih prozora jedne te iste slike ali nije moguce´ imati samo jedan prozor koji ce´ prikazivati nekoliko slika. Osim toga jedna slika može biti i neprikazana. GIMP slika je nešto kompliciranija. Umjesto da ju predociteˇ kao list papira sa crtežom, trebali bi ste ju shvatiti kao knjigu cijeˇ se stranice nazivaju ‘slojevi’ Osim hrpe slojeva, jedna GIMP slika može sadržavati masku selekcuije, skupinu kanala i putanje. U Gimpu možete otvoriti više slika u isto vrijeme. Ukoliko su velike, svaka ce´ koristiti više megabajtova memorije, no GIMP koristi usavšenu proceduru upravljanja memorijom, tzv. "title-based memory management systhem" koja mu omogucuje´ skladno rukovanje cakˇ i vrlo velikim slikama. Dakako postoje i granice. Kad radite sa slikama preporucljivo´ je u svoj sistem staviti najvecu´ mogucu´ kolicinuˇ memorije. Slojevi Ako si sliku predocimoˇ kao knjigu, onda je sloj jedna njezina stranica. Najjednostavnija slika sadrži samo jedan sloj i biti ce´ tretirana kao jedan list papira, medutim¯ upuceniji´ korisnici Gimpa cestoˇ upotrebljavaju slike sa više slojeva. Oni mogu biti prozirni i nemoraju pokrivati cijelu površinu slike, dakle kad gledate sliku možete vidjeti ne samo najgornji sloj nego i odredene¯ dijelove drugih slojeva koji se nalaze ispod njega. Kanali JOŠ NIJE NAPISANO Odabir Kada radite na slici cestoˇ dolazite u situaciju da promijenite samo jedan njezin dio. Mehanizam ‘Odabir’ vam to omogucuje.´ Svaka slika ima svoj vlastiti odabir, koji možete vidjeti kao isprekidanu pomicnuˇ liniju. Ona odvaja odabrani dio slike od neodabranog dijela. No to nije sve: odabir u Gimpu je postupan i nije ogranicenˇ na sistem odabrati sve ili ništa. On je zapravo predstavljen kao kanal u sivim nijansama. Linija koju vidite je obris srednjeg nivoa odabira (50%). Kanal odabira i sve njegove detalje možete proucitiˇ ako aktivirate Brzu masku. Dobro korištenje GIMP podrazumjeva i vladanje umjetnošcu´ izabiranja odabira (odabir koji sadrži samo ono što želite i ništa drugo). Zato što je rukovanje selekcijama od kapitalne važnosti GIMP vam nudi veliki broj alata: izbor alata za selekciju, izbornik za operaciju selekcije i mogucnost´ lakog prelaženja u ‘Brzu masku’ u kojoj možete raditi na kanalu odabira kao da se radi o kanalu boje i na taj nacinˇ ‘bojati odabir’ Poništavanje Kada pogriješite, greške možete poništiti. Više-manje sve što je moguce´ napraviti na jednoj slici moguce´ je i poništiti. Zapravo možete poništiti dobar dio zadnjih radnji ukoliko smatrate da su nepotrebne. GIMP cuvaˇ povijest vaših radnji. Ta povijest zahtjeva i dio memorije zbog cegaˇ nije moguce´ u nedogled poništavati. Neke radnje koriste samo mali dio memorije tako da ih možete napraviti desetke prije no što prva bude izbrisana iz povijesti. Kolicinuˇ memorije koju ce´ GIMP koristiti za povijest svake slike možete sami postaviti, no u svakom slucaju,ˇ uvijek je moguce´ poništiti 2 ili 3 GNU Image Manipulation Program 7 / 19 zadnje radnje („zatvaranje slike“ je najvažnija radnja medu¯ njima i ne može biti poništena. Ukoliko ste na slici napravili bilo kakve promjene GIMP ce´ vas tražiti potvrdu želite li stvarno zatvoriti sliku). Dodaci (Plug-ins) Vecina´ stvari, sasvi sigurno sve, koje cete´ napraviti na jednoj slici ucinitiˇ ce´ sâm GIMP. Ipak on može biti nadopunjen dodacima (plug-ins). To su vanjske aplikacije koje rade u bliskoj interakciji sa Gimpom, a sposobne su rukovati slikama i drugim predmetima u Gimpu na vrlo sofisticirani nacin.ˇ Brojni plug-inovi se vec´ nalaze u paketu Gimpa ali moguce´ je do njih doci´ i na drugi nacin.ˇ Ako niste clanˇ ekipe koja se bavi razvojem Gimpa najlakše cete´ dodati druge funkcije u GIMP ako sami napišete plug-in (ili skriptu), a možete ih naci´ vec´ gotove i na mreži. Svi dijelovi izbornika Filters (Filteri) i dobra dio drugih izbornika su zapravo ubaceniˇ uz pomoc´ dodataka (plug-ins). Skripte Uz dodatke (plug-ins), aplikacije koje su pisane u jeziku C, GIMP može koristiti i skripte. Vecina´ skripti je pisana u jeziku koji zovemo Script-Fu, a koji je specificanˇ za GIMP (za one koje to zanima, radi se o jeziku Scheme koji je inspiriran Lispom). Moguce´ je napisati skriptu za GIMP i u Python jeziku ili u Perl-u. Ovi informatickiˇ jezici su fleksibilniji i mocniji´ od Script-Fu jezika. Nezgodno je to što ovise o aplikacijama koje necete´ dobiti u paketu zajedno sa Gimpom, a ne postoji ni garancija za ce´ dobro funkcionirati na svim instalacjama u Gimpa. GNU Image Manipulation Program 8 / 19 1.2 Uvod Figure 1.1: Slika ekrana prikazuje standardne GIMP prozore Kopija ekrana prikazuje najjednostavniji i najkorišteniji raspored prozora u GIMPU. Prikazana su tri prozora : 1 Glavna Alatna kutija : Ovo je samo srce GIMPA. Ona sadrži glavni izbornik i set ikona za odabir alata, itd ... v 2 Izbornici alata : Ispod Alatne kutije nalazi se, pricvršˇ cen´ za dok, dijalog Izbornici alata. Ovaj dijalog prikazuje opcije v izabranog alata. 3 Prozor slike : Svaka slika koju otvorite sa Gimpom biti ce´ prikazana u jednom izdvojenom prozoru. Moguce´ je otvoriti v više slika u isto vrijeme, ogranicenjeˇ vam postavlja jedino vaš sistem. GIMP je moguceˇ lansirati bez da se otvori bilo kakva slika, medutim¯ ne postoji puno korisnih stvari koje u tom slucajuˇ možete napraviti. 4 Dijalog slojeva : Ovaj dijalog prikazuje strukturu slojeva aktivne slike i pruža mogucnost´ uptravljanja na razliciteˇ nacine.ˇ v Moguceˇ je raditi i bez ovog dijaloga medutim¯ cakˇ i korisnici koji nemaju puno iskustva nalaze da je važno uvijek ga imati pri ruci. GNU Image Manipulation Program 9 / 19 5 Kistovi, Motivi i Gradijenti : Ovaj dialog sa tabovima nalazi se pricvršˇ cen´ ispod dijaloga Slojeva, a sadržava tri dijaloga v za kontrolu kistova, motiva i gradijenata. Ovo je minimalna konfiguracija. U GIMPU postoji nešto više od dvanaestak drugih dijaloga ali ih korisnici otvaraju i zatvaraju prema vlastitoj potrebi. Oni napredniji obicnoˇ cuvajuˇ Alatnu kutiju (sa izbornicima alata) i dijalog slojeva konstantno otvorene. Alatna kutija je osnovni alat za izvršavanje brojnih operacija u GIMPU; usput recenoˇ ukoliko zatvorite alatnu kutiju i sam GIMP ce´ se zatvoriti (biti cete´ zapitani je li to zaista ono što želite napraviti). Dijalog Izbornici alata je od sada zaseban dijalog, a na slici je prijkazan ispod alatne kutije. Na ovja nacinˇ upuceniji´ korisnici konfiguriraju dijaloge. Zaista je teško koristiti alate bez uvida u njihove opcije; na primjer Dijalog slojeva postaje aktivan cimˇ radite na slici koja sadrži više slojeva. Kada savladate osnove korištenja GIMPA vidjet cete´ da je gotovo uvijek neophodno imati pri ruci opcije alata. I na kraju, ocitoˇ je da trebate imati otvorenu barem jednu ili više slika kako bi na njima radili. Note Ako izgubite raspored prozora GIMPA vrlo je lako opnovo konfigurirati prozore kako je to prikazano na slici gore. U Izborniku File (Datoteka) Alatne kutije, izaberite : File(Datoteka) → Dialogs (Dijalozi) → Create New Dock (Napravi novi Dok) → Layers, Channels, and Paths (Slojevi, Kanali i Gradijenti). Time cete´ dobiti dijalog Slojeva. U istom izborniku izaberite : File (Datoteka) → Dialogs (Dijalozi) → Tool Options (Izbornici Alata) kako bi izvjesili novi Dijalog Izbornici alata koji zatim možete pricvrstitiˇ u glavni prozor (u dijelu prirucnikaˇ Dijalozi i pricvršˇ civanje´ naci´ cete´ više informacija kako pricvrstitiˇ dijaloge). Nije potrebno kreirati jednu novu glavnu alatnu kutiju jer zapravo niti ne možete zatvoriti ovu koju vec´ imate, a da pri tome ne zatvorite i sam GIMP. Za razliku od ostalih programa, GIMP vam ne dozvoljava sve zajedno grupirati (prozor slike i dijaloge) u jednom jedinom glavnom prozoru. Programeri GIMPA oduvijek smatraju da je to zapravo jedan loš nacinˇ rada jer prisiljava program na izvrša- vanje odredenog¯ broja funkcija koje su puno bolje izvršavaju uz pomoc´ upravitelja prozora.
Recommended publications
  • Practice Tips for Open Source Licensing Adam Kubelka
    Santa Clara High Technology Law Journal Volume 22 | Issue 4 Article 4 2006 No Free Beer - Practice Tips for Open Source Licensing Adam Kubelka Matthew aF wcett Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Adam Kubelka and Matthew Fawcett, No Free Beer - Practice Tips for Open Source Licensing, 22 Santa Clara High Tech. L.J. 797 (2005). Available at: http://digitalcommons.law.scu.edu/chtlj/vol22/iss4/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. ARTICLE NO FREE BEER - PRACTICE TIPS FOR OPEN SOURCE LICENSING Adam Kubelkat Matthew Fawcetttt I. INTRODUCTION Open source software is big business. According to research conducted by Optaros, Inc., and InformationWeek magazine, 87 percent of the 512 companies surveyed use open source software, with companies earning over $1 billion in annual revenue saving an average of $3.3 million by using open source software in 2004.1 Open source is not just staying in computer rooms either-it is increasingly grabbing intellectual property headlines and entering mainstream news on issues like the following: i. A $5 billion dollar legal dispute between SCO Group Inc. (SCO) and International Business Machines Corp. t Adam Kubelka is Corporate Counsel at JDS Uniphase Corporation, where he advises the company on matters related to the commercialization of its products.
    [Show full text]
  • ROADS and BRIDGES: the UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface
    Roads and Bridges:The Unseen Labor Behind Our Digital Infrastructure WRITTEN BY Nadia Eghbal 2 Open up your phone. Your social media, your news, your medical records, your bank: they are all using free and public code. Contents 3 Table of Contents 4 Preface 58 Challenges Facing Digital Infrastructure 5 Foreword 59 Open source’s complicated relationship with money 8 Executive Summary 66 Why digital infrastructure support 11 Introduction problems are accelerating 77 The hidden costs of ignoring infrastructure 18 History and Background of Digital Infrastructure 89 Sustaining Digital Infrastructure 19 How software gets built 90 Business models for digital infrastructure 23 How not charging for software transformed society 97 Finding a sponsor or donor for an infrastructure project 29 A brief history of free and public software and the people who made it 106 Why is it so hard to fund these projects? 109 Institutional efforts to support digital infrastructure 37 How The Current System Works 38 What is digital infrastructure, and how 124 Opportunities Ahead does it get built? 125 Developing effective support strategies 46 How are digital infrastructure projects managed and supported? 127 Priming the landscape 136 The crossroads we face 53 Why do people keep contributing to these projects, when they’re not getting paid for it? 139 Appendix 140 Glossary 142 Acknowledgements ROADS AND BRIDGES: THE UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface Our modern society—everything from hospitals to stock markets to newspapers to social media—runs on software. But take a closer look, and you’ll find that the tools we use to build software are buckling under demand.
    [Show full text]
  • An Introduction to Software Licensing
    An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories.
    [Show full text]
  • ** OPEN SOURCE LIBRARIES USED in Tv.Verizon.Com/Watch
    ** OPEN SOURCE LIBRARIES USED IN tv.verizon.com/watch ------------------------------------------------------------ 02/27/2019 tv.verizon.com/watch uses Node.js 6.4 on the server side and React.js on the client- side. Both are Javascript frameworks. Below are the licenses and a list of the JS libraries being used. ** NODE.JS 6.4 ------------------------------------------------------------ https://github.com/nodejs/node/blob/master/LICENSE Node.js is licensed for use as follows: """ Copyright Node.js contributors. All rights reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. """ This license applies to parts of Node.js originating from the https://github.com/joyent/node repository: """ Copyright Joyent, Inc. and other Node contributors.
    [Show full text]
  • Downloads." the Open Information Security Foundation
    Performance Testing Suricata The Effect of Configuration Variables On Offline Suricata Performance A Project Completed for CS 6266 Under Jonathon T. Giffin, Assistant Professor, Georgia Institute of Technology by Winston H Messer Project Advisor: Matt Jonkman, President, Open Information Security Foundation December 2011 Messer ii Abstract The Suricata IDS/IPS engine, a viable alternative to Snort, has a multitude of potential configurations. A simplified automated testing system was devised for the purpose of performance testing Suricata in an offline environment. Of the available configuration variables, seventeen were analyzed independently by testing in fifty-six configurations. Of these, three variables were found to have a statistically significant effect on performance: Detect Engine Profile, Multi Pattern Algorithm, and CPU affinity. Acknowledgements In writing the final report on this endeavor, I would like to start by thanking four people who made this project possible: Matt Jonkman, President, Open Information Security Foundation: For allowing me the opportunity to carry out this project under his supervision. Victor Julien, Lead Programmer, Open Information Security Foundation and Anne-Fleur Koolstra, Documentation Specialist, Open Information Security Foundation: For their willingness to share their wisdom and experience of Suricata via email for the past four months. John M. Weathersby, Jr., Executive Director, Open Source Software Institute: For allowing me the use of Institute equipment for the creation of a suitable testing
    [Show full text]
  • GNU Wget 1.10 the Non-Interactive Download Utility Updated for Wget 1.10, Apr 2005
    GNU Wget 1.10 The non-interactive download utility Updated for Wget 1.10, Apr 2005 by Hrvoje Nikˇsi´cand the developers Copyright c 1996–2005, Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being “GNU General Public License” and “GNU Free Documentation License”, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Chapter 1: Overview 1 1 Overview GNU Wget is a free utility for non-interactive download of files from the Web. It supports http, https, and ftp protocols, as well as retrieval through http proxies. This chapter is a partial overview of Wget’s features. • Wget is non-interactive, meaning that it can work in the background, while the user is not logged on. This allows you to start a retrieval and disconnect from the system, letting Wget finish the work. By contrast, most of the Web browsers require constant user’s presence, which can be a great hindrance when transferring a lot of data. • Wget can follow links in html and xhtml pages and create local versions of remote web sites, fully recreating the directory structure of the original site. This is sometimes referred to as “recursive downloading.” While doing that, Wget respects the Robot Exclusion Standard (‘/robots.txt’). Wget can be instructed to convert the links in downloaded html files to the local files for offline viewing.
    [Show full text]
  • Open Source Software Notice
    Open Source Software Notice This document describes open source software contained in LG Smart TV SDK. Introduction This chapter describes open source software contained in LG Smart TV SDK. Terms and Conditions of the Applicable Open Source Licenses Please be informed that the open source software is subject to the terms and conditions of the applicable open source licenses, which are described in this chapter. | 1 Contents Introduction............................................................................................................................................................................................. 4 Open Source Software Contained in LG Smart TV SDK ........................................................... 4 Revision History ........................................................................................................................ 5 Terms and Conditions of the Applicable Open Source Licenses..................................................................................... 6 GNU Lesser General Public License ......................................................................................... 6 GNU Lesser General Public License ....................................................................................... 11 Mozilla Public License 1.1 (MPL 1.1) ....................................................................................... 13 Common Public License Version v 1.0 .................................................................................... 18 Eclipse Public License Version
    [Show full text]
  • Are Projects Hosted on Sourceforge.Net Representative of the Population of Free/Open Source Software Projects?
    Are Projects Hosted on Sourceforge.net Representative of the Population of Free/Open Source Software Projects? Bob English February 5, 2008 Introduction We are researchers studying Free/Open Source Software (FOSS) projects . Because some of our work uses data gathered from Sourceforge.net (SF), a web site that hosts FOSS projects, we consider it important to understand how representative SF is of the entire population of FOSS projects. While SF is probably hosts the greatest number of FOSS projects, there are many other similar hosting sites. In addition, many FOSS projects maintain their own web sites and other project infrastructure on their own servers. Based on performing an Internet search and literature review (see Appendix for search procedures), it appears that no one knows how many Free/Open Source Software Projects exist in the world or how many people are working on them. Because the population of FOSS projects and developers is unknown, it is not surprising that we were not able to find any empirical analysis to assess how representative SF is of this unknown population. Although an extensive empirical analysis has not been performed, many researchers have considered the question or related questions. The next section of this paper reviews some of the FOSS literature that discusses the representativeness of SF. The third section of the paper describes some ideas for empirically exploring the representativeness of SF. The paper closes with some arguments for believing SF is the best choice for those interested in studying the population of FOSS projects. Literature Review In one of the earliest references to the representativeness of SF, Madley, Freeh and Tynan (2002) mention that they assumed that SF was representative because of its popularity and because of the number of projects hosted there, although they note that this assumption “needs to be confirmed” (p.
    [Show full text]
  • Name Synopsis Description Options
    GPGTAR(1) GNU Privacy Guard 2.2 GPGTAR(1) NAME gpgtar −Encrypt or sign files into an archive SYNOPSIS gpgtar [options] filename1 [ filename2, ... ] directory1 [ directory2, ... ] DESCRIPTION gpgtar encrypts or signs files into an archive.Itisangpg-ized tar using the same format as used by PGP’s PGP Zip. OPTIONS gpgtar understands these options: --create Put givenfiles and directories into a vanilla ‘‘ustar’’archive. --extract Extract all files from a vanilla ‘‘ustar’’archive. --encrypt -e Encrypt givenfiles and directories into an archive.This option may be combined with option --symmetric for an archive that may be decrypted via a secret key orapassphrase. --decrypt -d Extract all files from an encrypted archive. --sign -s Makeasigned archive from the givenfiles and directories. This can be combined with option --encrypt to create a signed and then encrypted archive. --list-archive -t List the contents of the specified archive. --symmetric -c Encrypt with a symmetric cipher using a passphrase. The default symmetric cipher used is AES-128, but may be chosen with the --cipher-algo option to gpg. --recipient user -r user Encrypt for user id user.For details see gpg. --local-user user -u user Use user as the key tosign with. Fordetails see gpg. --output file -o file Write the archive tothe specified file file. --verbose -v Enable extra informational output. GnuPG 2.2.12 2018-12-11 1 GPGTAR(1) GNU Privacy Guard 2.2 GPGTAR(1) --quiet -q Trytobeasquiet as possible. --skip-crypto Skip all crypto operations and create or extract vanilla ‘‘ustar’’archives. --dry-run Do not actually output the extracted files.
    [Show full text]
  • Contents Work
    It worked, and it continues to Contents work. Last year, member dues ac- Fifteen years of FSF associate counted for over half of our total members...................1 revenue, and nearly ten times as Finding a free software silver lining much as we received from corpora- tions. But membership from the to the Facebook Cambridge start has been much more than a Analytica scandal ............3 way to donate. Members form a Tech updates, episode 2018: proud community united around A GNUHope................4 the idea that people, in order to be The threat of government-run Digital free, must be in control of the soft- ware they rely on to live their lives. Restrictions Management . 6 Today, we have members in Uber takes software users for a ride over eighty countries. I feel very ..........................8 close to this community—especially On the road with RMS.........9 to the 136 members who have been GNU needs you: How to contribute with us all fifteen years. I've gotten to a GNU project............10 to know their names through stuff- ing thousands of envelopes, ex- Fifteen years of FSF changing many emails, and shaking associate members hands—first at the annual member meetings we held, at the Libre- ast fall marked fifteen years of Lthe FSF's associate membership program. Shortly after, I celebrated my own fifteenth anniversary with the FSF. I've never known an FSF without associate members. The membership program was launched in late 2002 to stabilize the FSF fin- ancially, as some previous sources of support—like sales of software and In March, the FSF celebrated our tenth manuals on physical media—were annual LibrePlanet conference, with over falling out of fashion.
    [Show full text]
  • With Yocto/Openembedded
    PORTING NEW CODE TO RISC-V WITH YOCTO/OPENEMBEDDED Martin Maas ([email protected]) 1st RISC-V Workshop, January 15, 2015 Monterey, CA WHY WE NEED A LINUX DISTRIBUTION • To build an application for RISC-V, you need to: – Download and build the RISC-V toolchain + Linux – Download, patch and build application + dependencies – Create an image and run it in QEMU or on hardware • Problems with this approach: – Error-prone: Easy to corrupt FS or get a step wrong – Reproducibility: Others can’t easily reuse your work – Rigidity: If a dependency changes, need to do it all over • We need a Linux distribution! – Automatic build process with dependency tracking – Ability to distribute binary packages and SDKs 2 RISCV-POKY: A PORT OF THE YOCTO PROJECT • We ported the Yocto Project – Official Linux Foundation Workgroup, supported by a large number of industry partners – Part I: Collection of hundreds of recipes (scripts that describe how to build packages for different platforms), shared with OpenEmbedded project – Part II: Bitbake, a parallel build system that takes recipes and fetches, patches, cross-compiles and produces packages (RPM/DEB), images, SDKs, etc. • Focus on build process and customizability 3 GETTING STARTED WITH RISCV-POKY • Let’s build a full Linux system including the GCC toolchain, Linux, QEMU + a large set of packages (including bash, ssh, python, perl, apt, wget,…) • Step I: Clone riscv-poky: git clone [email protected]:ucb-bar/riscv-poky.git • Step II: Set up the build system: source oe-init-build-env • Step III: Build an image (may
    [Show full text]
  • Annual Report
    [Credits] Licensed under Creative Commons Attribution license (CC BY 4.0). All text by John Hsieh and Georgia Young, except the Letter from the Executive Director, which is by John Sullivan. Images (name, license, and page location): Wouter Velhelst: cover image; Kori Feener, CC BY-SA 4.0: inside front cover, 2-4, 8, 14-15, 20-21, 23-25, 27-29, 32-33, 36, 40-41; Michele Kowal: 5; Anonymous, CC BY 3.0: 7, 16, 17; Ruben Rodriguez, CC BY-SA 4.0: 10, 13, 34-35; Anonymous, All rights reserved: 16 (top left); Pablo Marinero & Cecilia e. Camero, CC BY 3.0: 17; Free This report highlights activities Software Foundation, CC BY-SA 4.0: 18-19; Tracey Hughes, CC BY-SA 4.0: 30; Jose Cleto Hernandez Munoz, CC BY-SA 3.0: 31, Pixabay/stevepb, CC0: 37. and detailed financials for Fiscal Year 2016 Fonts: Letter Gothic by Roger Roberson; Orator by John Scheppler; Oswald by (October 1, 2015 - September 30, 2016) Vernon Adams, under the OFL; Seravek by Eric Olson; Jura by Daniel Johnson. Created using Inkscape, GIMP, and PDFsam. Designer: Tammy from Creative Joe. 1] LETTER FROM THE EXECUTIVE DIRECTOR 2] OUR MISSION 3] TECH 4] CAMPAIGNS 5] LIBREPLANET 2016 6] LICENSING & COMPLIANCE 7] CONFERENCES & EVENTS 7 8] LEADERSHIP & STAFF [CONTENTS] 9] FINANCIALS 9 10] OUR DONORS CONTENTS our most important [1] measure of success is support for the ideals of LETTER FROM free software... THE EXECUTIVE we have momentum DIRECTOR on our side. LETTER FROM THE 2016 EXECUTIVE DIRECTOR DEAR SUPPORTERS For almost 32 years, the FSF has inspired people around the Charity Navigator gave the FSF its highest rating — four stars — world to be passionate about computer user freedom as an ethical with an overall score of 99.57/100 and a perfect 100 in the issue, and provided vital tools to make the world a better place.
    [Show full text]