Antivirus Software Antivirus Software Roundup Every Month We Compare Tons of Software So You Don’T Have To!

Total Page:16

File Type:pdf, Size:1020Kb

Antivirus Software Antivirus Software Roundup Every Month We Compare Tons of Software So You Don’T Have To! Roundup Antivirus software Antivirus software Roundup Every month we compare tons of software so you don’t have to! ClamAV 0.95.3 ClamTk 4.21 KlamAV 0.46 Antivirus software Hoping to stay healthy, Nick Veitch gets forensic on the available programs. How we tested... Although we advocate reading all the documentation and taking care with config files, for this test we’ve done as little tuning of the software as possible – the defaults should be good enough to keep a computer safe. We employed the virus test suite, as developed by EICAR (www.eicar.org/anti_virus_test_ file.htm), the European security organisation. There’s nothing tricky here; effectively it’s just a pseudo-viral text string that should be easy for all the scanners to pick up. It’s provided in several formats, including plain text and Zip files. To complicate things further we included a few large RAW photos, plus the virus test files encoded in a tarball and hidden within an ISO image. Our retty much every Linux user thinking that Linux is immune is that For the most part, we expect virus selection thinks they’re immune to sooner or later, something like this checkers to run without us noticing that viruses, but they’re wrong. happens, and you’ll have no protection. they’re there, to consume no resources AVG Free p31 Just recently, malware was Yes, 99% of the time you won’t need it. and just get on with things. Extra points Avira Antivir P Pro p31 found hidden inside an innocuous- Maybe even 99.9% of the time. But if a are awarded to software that comes ClamAV p32 looking Gnome theme from a reputable virus checker saves you just once a close to this ideal, while they’re Sophos p32 site. Users who installed the theme also year, we think that’s a good enough deducted for difficult installs, weak ClamTk p33 got several scripts installed as root that reason to install one. documentation and poor performance. Avast p33 were designed to attack internet Of course, there are other good Many of the clients on test make use BitDefender p34 targets, but it could easily have been reasons, not least that you don’t want to of Dazuko, which is a kernel module much worse. You see, the problem with be blamed in the flame-fest that would designed to give on-access notifications result if you accidentally forwarded a to userland software – so when you virus to your Windows-loving friends. open a file, the module passes the “You don’t want to be For seconds, even if the virus doesn’t details to any service that wants to blamed for forwarding a affect you, wouldn’t you at least like to know. Some of the checkers rely on an know that it had somehow made its old version of Dazuko; we’ve made a virus to your friends.” way on to your precious Linux box? note of these in the review text. 30 LXF128 February 2010 www.linuxformat.com LXF128.round 30 14/12/09 11:48:17 am Roundup Antivirus software Antivirus software Roundup AVG Free Long-established virus scanning provided free for Linux. roducts bearing the AVG name of being thorough. Surprisingly, the have a reasonable history in software failed to find the zipped Pantivirus software, stretching versions of the virus test file. Since the back to 1992. Linux/Unix systems were test file has been around for years, this only added to the lineup in version 7.5 is pretty inexcusable – it shouldn’t be at and now lag behind the Windows all hard to find. The only reasonable version (at 9.0), having only had a few explanation is that perhaps the updates. Installing the free client is software is misconfigured. As part of pretty straightforward, no matter what our tests, we do the minimum amount system you’re using, because there are of configuration to get the program to packages freely available in RPM, Deb run. In a production environment, you and tarball formats. Installing the tarball might want to investigate the docs and might be a slight pain, but as it’s binary, the various settings, but even if you did, there’s no need to worry about AVG Free’s documentation is scantier compiling this, that and the other. than a minuscule bikini. AVG Free isn’t Unlike many of the apps here, Because of the difficulty in making well-documented Verdict there’s no GUI for this software. It’s sure the system is configured and or easy to set designed to be run as a system working, as well as the poor results in up, but it works, AVG Free some of the time. daemon to scan your files on schedule finding viruses, this wouldn’t be one we Version: 8.5 Website: http://free.avg.com or on demand. There’s an option for could recommend for desktop use. Price: Free on-demand checking with the Dazuko It performs so poorly and comes kernel module. Starting the daemon is “In terms of speed, AVG with such minimal documentation easy if you have some sysadmin skills, that it’s not worth it, even if it is free. and it can be configured to run at boot. did well, at the expense In terms of speed, AVG Free did pretty well, but perhaps at the expense of being thorough.” Rating 2/10 Avira Antivir Professional Command line scanner with a really low overhead. vira Antivir, if you can get past believe that nothing had happened, but the avoidably ugly name, lives in the scanner identified all of our infected Athe shady realms of the files and offered to quarantine them. command line, though it needs no real The default settings seem good knowledge of Bash to install or use. enough and the virus database is kept Download the archive and run the well up to date, so you needn’t fear that install script within to set everything up. you need to be extra vigilant in the There follows a series of questions configuration. It works impressively about which options are to be installed, quickly – it’s just a shame that the whether to use the scan-on-access on-access scanning isn’t available for service (which requires Dazuko) and modern kernels. where you’ve put your keyfile. The latter Avira does have free versions of its was the only hitch on installing. For other antivirus software, but all the reasons still unclear, the website Linux versions come under the It’s impressive provided us with a trial key, but it didn’t Professional department, so there’s no in speed and low Verdict work. If you have the same problem, dispensation if you’re a non-business resource use, but pretend you live in the USA… user. That said, the licensing structure not really in the Avira Antivir Professional Once we had it installed, we noticed doesn’t make it expensive: £25 for a results stakes. Version: 3.0.5 the presence of a configuration file and year-long single-user licence. Website: www.avira.com Price: £25 daemons automatically being installed Pretty average all-round, and not to run the software on startup. Running “The website provided worth paying for when there are the test scan was surprising – the better alternatives out there. software seemed to be instantaneous, us with a trial key, but and barely took up any memory or CPU cycles at all. It would have been easy to it didn’t work.” Rating 5/10 www.tuxradar.com February 2010 LXF128 31 LXF128.round 31 14/12/09 11:48:17 am Roundup Antivirus software Antivirus software Roundup ClamAV Flying the flag for open source antivirus software. lamAV was originally developed to scan at regular intervals or watch as a mail scanner, and there are certain places. Like some of the other Cplenty of configuration options software included here, it can be and tools for integrating it into your configured to offer on-access scanning local mailserver. For the same reason, it (including, thanks to it being open also supports a lot of archive formats source, support for the latest version of that are commonly used for email Dazuko) and there’s useful guidance on attachments, though some of these how to enable this on the ClamAV site. may have been disabled if you installed The major disappointment with ClamAV through a distro package. ClamAV was its failure to scan the ISO It isn’t complicated to compile, since image file properly. This was a bit the source is well documented, doesn’t confusing, because the software did have a great deal of demands in terms once support ISO file scanning, though of third-party libraries and gives you the a search through the documentation Compiling opportunity to ensure the options you now reveals no clues. As we had a ClamAV yourself want are installed. testing policy of using defaults, it would enables you to Verdict Once installed, ClamAV consists of have been unfair on the other software get the features two main parts. Clamscan is the to mess around too much. Suffice to you want. ClamAV command line tool to scan whatever say, there didn’t seem to be a simple Version: 0.95.3 Website: www.clamav.net you point it at. As with most commands, way of getting this to work. Price: Free there’s a host of switches to control This gets great kudos for being behaviour and, among other things, this open source, but loses points for accounts for its versatility.
Recommended publications
  • Android Euskaraz Windows Euskaraz Android Erderaz Windows Erderaz GNU/LINUX Sistema Eragilea Euskeraz Ubuntu Euskaraz We
    Oharra: Android euskaraz Windows euskaraz Android erderaz Windows erderaz GNU/LINUX Sistema Eragilea euskeraz Ubuntu euskaraz Web euskaraz Ubuntu erderaz Web erderaz GNU/LINUX Sistema Eragilea erderaz APLIKAZIOA Bulegotika Adimen-mapak 1 c maps tools 2 free mind 3 mindmeister free 4 mindomo 5 plan 6 xmind Aurkezpenak 7 google slides 8 pow toon 9 prezi 10 sway Bulegotika-aplikazioak 11 andropen office 12 google docs 13 google drawing 14 google forms 15 google sheets 16 libreoffice 17 lyx 18 office online 19 office 2003 LIP 20 office 2007 LIP 21 office 2010 LIP 22 office 2013 LIP 23 office 2016 LIP 24 officesuite 25 wps office 26 writer plus 1/20 Harrobi Plaza, 4 Bilbo 48003 CAD 27 draftsight 28 librecad 29 qcad 30 sweet home 31 timkercad Datu-baseak 32 appserv 33 dbdesigner 34 emma 35 firebird 36 grubba 37 kexi 38 mysql server 39 mysql workbench 40 postgresql 41 tora Diagramak 42 dia 43 smartdraw Galdetegiak 44 kahoot Maketazioa 45 scribus PDF editoreak 46 master pdf editor 47 pdfedit pdf escape 48 xournal PDF irakurgailuak 49 adobe reader 50 evince 51 foxit reader 52 sumatraPDF 2/20 Harrobi Plaza, 4 Bilbo 48003 Hezkuntza Aditzak lantzeko 53 aditzariketak.wordpress 54 aditz laguntzailea 55 aditzak 56 aditzak.com 57 aditzapp 58 adizkitegia 59 deklinabidea 60 euskaljakintza 61 euskera! 62 hitano 63 ikusi eta ikasi 64 ikusi eta ikasi bi! Apunteak partekatu 65 flashcard machine 66 goconqr 67 quizlet 68 rincon del vago Diktaketak 69 dictation Entziklopediak 70 auñamendi eusko entziklopedia 71 elhuyar zth hiztegi entziklopedikoa 72 harluxet 73 lur entziklopedia tematikoa 74 lur hiztegi entziklopedikoa 75 wikipedia Esamoldeak 76 AEK euskara praktikoa 77 esamoldeapp 78 Ikapp-zaharrak berri Estatistikak 79 pspp 80 r 3/20 Harrobi Plaza, 4 Bilbo 48003 Euskara azterketak 81 ega app 82 egabai 83 euskal jakintza 84 euskara ikasiz 1.
    [Show full text]
  • Antivirus Software Before It Can Detect Them
    Computer virus A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[1][2] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
    [Show full text]
  • Linux Security Review 2015
    Linux Security Review 2015 www.av-comparatives.org AV-Comparatives Linux Security Review Language: English May 2015 Last revision: 26 th May 2015 www.av-comparatives.org -1- Linux Security Review 2015 www.av-comparatives.org Contents Introduction ....................................................................................................................... 3 Reviewed products ............................................................................................................... 4 Malware for Linux systems ..................................................................................................... 5 Linux security advice ............................................................................................................ 6 Items covered in the review .................................................................................................. 7 Avast File Server Security ...................................................................................................... 8 AVG Free Edition for Linux.................................................................................................... 11 Bitdefender Antivirus Scanner for Unices ................................................................................ 13 Clam Antivirus for Linux ....................................................................................................... 17 Comodo Antivirus for Linux .................................................................................................. 20 Dr.Web Anti-virus for
    [Show full text]
  • Technical Report RHUL–ISG–2021–3 10 March 2021
    Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers Giuseppe Raffa Technical Report RHUL–ISG–2021–3 10 March 2021 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom Student Number: 100907703 Giuseppe Raffa Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers Supervisor: Daniele Sgandurra Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Giuseppe Raffa Date: 24th August 2020 Table of Contents 1 Introduction.....................................................................................................................7 1.1 Motivation.......................................................................................................................................7 1.2 Objectives........................................................................................................................................8 1.3 Methodology...................................................................................................................................8
    [Show full text]
  • SAFETY GUIDE for JOURNALISTS a Handbook for Reporters in High-Risk Environments
    SAFETY GUIDE FOR JOURNALISTS A handbook for reporters in high-risk environments United Nations Educational, Scientific and Cultural Organization REPORTERS WITHOUT BORDERS 1 REPORTERS WITHOUT BORDERS 1 SAFETY GUIDE FOR JOURNALISTS A handbook for reporters in high-risk environments United Nations Educational, Scientific and Cultural Organization CONTENTS PREFACE...........................................................................................................................................4 INTRODUCTION: RSF and the protection of journalists...........................10 CHAPTER 1: The growing risks for journalists................................................13 CHAPTER 2: Planning and preparation..................................................................15 1. Local knowledge and risk assessment..................................................15 2. Health precautions.................................................................................................18 3. First aid and hostile environment training...........................................20 4. Finances, formalities, family: set off with peace of mind.......21 5. Preparing your kitbag: checklists...............................................................23 CHAPTER 3: Keeping safe on assignment........................................................30 1. Accommodation, travel and communications..................................30 2. Safety precautions in war zones.................................................................36 3. Mines and cluster munitions..........................................................................45
    [Show full text]
  • Clam Antivirus 0.88.2 User Manual Contents 1
    Clam AntiVirus 0.88.2 User Manual Contents 1 Contents 1 Introduction 6 1.1 Features.................................. 6 1.2 Mailinglists................................ 7 1.3 Virussubmitting.............................. 7 2 Base package 7 2.1 Supportedplatforms............................ 7 2.2 Binarypackages.............................. 8 2.3 Dailybuiltsnapshots ........................... 10 3 Installation 11 3.1 Requirements ............................... 11 3.2 Installingonashellaccount . 11 3.3 Addingnewsystemuserandgroup. 12 3.4 Compilationofbasepackage . 12 3.5 Compilationwithclamav-milterenabled . .... 12 4 Configuration 13 4.1 clamd ................................... 13 4.1.1 On-accessscanning. 13 4.2 clamav-milter ............................... 14 4.3 Testing................................... 14 4.4 Settingupauto-updating . 15 4.5 Closestmirrors .............................. 16 5 Usage 16 5.1 Clamdaemon ............................... 16 5.2 Clamdscan ................................ 17 5.3 Clamuko.................................. 17 5.4 Outputformat............................... 18 5.4.1 clamscan ............................. 18 5.4.2 clamd............................... 19 6 LibClamAV 20 6.1 Licence .................................. 20 6.2 Features.................................. 20 6.2.1 Archivesandcompressedfiles . 20 6.2.2 Mailfiles ............................. 21 Contents 2 6.3 API .................................... 21 6.3.1 Headerfile ............................ 21 6.3.2 Databaseloading . .. .. .. .. .. .
    [Show full text]
  • Hostscan 4.9.06037 Antimalware and Firewall Support Charts
    HostScan 4.9.06037 Antimalware and Firewall Support Charts 2/5/2021 © 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 92 [Type here] Contents HostScan Version 4.9.06037 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1634.0 for Windows .............................................. 50 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1634.0 for Windows ...................................................... 50 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1501.0 for macOS………………………….…..……80 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1501.0 for macOS…………….…….……………..………90 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.1333.0 for Linux…………….……..…..…….………94 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.1333.0 for Linux…………………………………..……….96 ©2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 92 [Type here] HostScan Version 4.9.06037 Antimalware and Firewall Support Charts The VPN Posture (HostScan) module provides the AnyConnect
    [Show full text]
  • License Information GNU General Public License
    ################################################################# ################################################################# ####### ####### ####### Open Icon Library ####### ####### License File ####### ####### ####### ################################################################# ################################################################# Table of Contents: * Description * Sources * Licenses * File List * Icons from Wikicommons * Icons under Creative Commons licenses * Icons under GPL and LGPL licenses * Icons under Public Domain * Icons under MIT license * Icons under BSD license * Icons from app-install-data ################################################################# ## Description: The Open Icon Library contains icons from various sources. This file list the license and source of each file in this package. In the rare occasion where there is two files with the same name, you will have to check the developers package. If you wish to use these icons in your project, include this file in your projects documentation. ################################################################# ## Sources: AEM Pictorial Database (aem) link: http://www.aem.org/Technical/PictorialDatabase/index.asp license: PD license link: http://en.wikipedia.org/wiki/Public_domain format: eps -> svg, png subdirectory: open_icon_library-devel/icons/aem app-install-data (app-install) link: http://packages.debian.org/lenny/app-install-data licenses: Various, see docs/AUTHORS_app-install license link: see docs/AUTHORS_app-install format: xpm, svg,
    [Show full text]
  • Antivirus Para Armar… O Más Bien, Hágalo Usted Mismo
    Antivirus para armar… o más bien, hágalo usted mismo M.Sc. Alberto García Fumero FLISOL 2014 Ciudad de La Habana ClamAV (Clam antivirus) El proyecto ClamAV Antivirus fue fundado en el año 2001 por Tomasz Kojm. Nació como un proyecto opensource que pretende identificar y bloquear virus en el sistema. Pero...¿y por qué? ¿qué sentido tiene? ¿Acaso hay virus en Linux o UNIX? (Porque todo el mundo me dice que a Linux no le entran los virus, y yo he visto que las máquinas Windows se infectan y esas no...) Una de las vulnerabilidades de GNU/Linux (en realidad, vulnerabilidad de sus usuarios) es que multitud de usuarios piensan que Linux no es vulnerable a los virus. Los virus y ataques malintencionados presentan una amenaza real a los sistemas Linux. Si un binario infectado contiene uno de esos virus, al ser ejecutado el binario, el sistema se infectaría. el nivel de infección dependerá de los privilegios del usuario que ejecutó el programa. Por eso se recomienda tanto no trabajar con nivel de root a no ser que resulte imprescindible. Normalmente uno no trabaja (no debería trabajar) con la cuenta root. Para eso existen sudo y las tantísimas cuentas que crean las aplicaciones que necesitan permisos especiales. Si el virus entra por la cuenta de superusuario podría llegar a infectar el sistema entero. En caso de un usuario normal, el sistema operativo estaría seguro aunque los datos del usuario no. El virus podría borrar e incluso enviar esos datos a otro equipo remoto. Por otro lado, las vulnerabilidades de escalada de privilegios pueden permitir que malware ejecutándose bajo una cuenta de acceso limitado también se propague por todo el sistema.
    [Show full text]
  • Computer Security 37 8.1 Vulnerabilities
    Contents 1 Antivirus software 1 1.1 History ................................................ 1 1.1.1 1949-1980 period (pre-antivirus days) ............................ 1 1.1.2 1980-1990 period (early days) ................................ 2 1.1.3 1990-2000 period (emergence of the antivirus industry) ................... 2 1.1.4 2000-2005 period ...................................... 3 1.1.5 2005 to present ........................................ 3 1.2 Identification methods ........................................ 4 1.2.1 Signature-based detection .................................. 4 1.2.2 Heuristics ........................................... 4 1.2.3 Rootkit detection ....................................... 5 1.2.4 Real-time protection ..................................... 5 1.3 Issues of concern ........................................... 5 1.3.1 Unexpected renewal costs ................................... 5 1.3.2 Rogue security applications .................................. 5 1.3.3 Problems caused by false positives .............................. 5 1.3.4 System and interoperability related issues ........................... 6 1.3.5 Effectiveness ......................................... 6 1.3.6 New viruses .......................................... 6 1.3.7 Rootkits ............................................ 6 1.3.8 Damaged files ......................................... 6 1.3.9 Firmware issues ........................................ 7 1.4 Performance and other drawbacks .................................. 7 1.5 Alternative solutions
    [Show full text]
  • Clam Antivirus Mac Free Download
    Clam Antivirus Mac Free Download Clam Antivirus Mac Free Download 1 / 3 Sadly, there is no version of ClamWin Antivirus for Mac available for download, but there are plenty other virus protection tools that you can use instead.. 0/10 0/11 0 (PowerPC/Intel), and many more programs ClamTk is an open source desktop application that provides users with a graphical front-end for the well known Clam AntiVirus virus scanner application that runs on Linux-based operating systems. 1. clam antivirus 2. clam antivirus mac 3. clam antivirus ubuntu Download ClamWin Free Antivirus and get free virus scanning and free virus definition updates.. ClamWin Antivirus by Alch is an open-source antivirus application that will help you protect your system against various types of viruses, spyware, trojans and other malware.. Thank you for choosing ClamXAV – your download will begin in a moment If nothing seems to be happening, try the direct download link.. Clamxav Antivirus Mac DownloadClam Antivirus Mac Free Download CnetClam Antivirus ReviewDownload ClamWin Free Antivirus - Antimalware solution that has a scheduler, virus database updater, standalone scanner, context menu integration, and more features. clam antivirus clam antivirus, clam antivirus windows, clam antivirus mac, clam antivirus review, clam antivirus ubuntu, clam antivirus for linux, clamwin antivirus free download, clam antivirus real time scanning, clam antivirus windows 10, clamav antivirus download Unduh Zombie Defense Escape Mod Apk Data File Host App name: clamav 0 99 2App description: Anti-virus softwareApp website: http://www.. 000 viruses, worms and trojans in order to protect your computer and email from security threats.
    [Show full text]
  • Linux Software Superstore APCUG Winter 2015 Virtual Technology
    Linux Software Superstore APCUG Winter 2015 Virtual Technology Conference February 21, 2015 Linux Software Superstore Presentation by: John Kennedy, Co-Leader Linux Help Desk/SIG East Central Ohio Technology Users Club Newark, Ohio Linux Software Superstore Aisle 1 Aisle 2 Internet Productivity Aisle 3 Aisle 4 Multimedia Graphics Aisle 5 Aisle 6 Desktop Tools Disk/File Tools Aisle 7 Aisle 8 Games Security What You'll See In my series of slides, I will share with you the different areas of computer tasks and some of the programs that are available to complete those tasks. In small print I will sometimes include the names for some of the Microsoft products that you might use. Then I will share with you some actual screen shots of the programs that I like to use with Linux to complete my routine computer tasks. Aisle 1: Internet lBrowsers (Internet Explorer) lFirefox, Chromium (Chrome), Opera, Midori lE-mail Clients (Outlook Express) lThunderbird, Evolution, kMail lRemote Access lTeamviewer lCommunications (VoIP) (chat) lSkype, Pidgin, Empathy, Ekiga lFile Transfer Protocol (FTP) Client lFilleZilla Aisle 2: Productivity lOffice Suite (MS Office) lLibreOffice, OpenOffice, Koffice lDesktop Publishing (MS Publisher) lScribus lWord Processor/Spreadsheet lAbiWord / Gnumeric lPDF Reader (Adobe Reader) lEvince, Okular lPersonal Finance (Quicken) lGnuCash, KMyMoney Aisle 3: Multimedia lPlayers (Media Player) lVLC, Rhythmbox, Banshee, SMPlayer lCD/DVD Burning (Roxio, Nero) lK3b, Brasero, Xfburn lAudio/Video Editing (Windows Movie Maker) lAudacity / Avidemux, OpenShot lDVD Authoring lDeVeDe, Kdenlive, Cinelerra Aisle 4: Graphics lViewers (Photo Viewer, Photo Gallery) lEye of Gnome, Gwenview, gThumb lManagers lDigiKam, F-Spot, lEditors lShotwell, F-Spot, Pinta, Fotoxx, DigiKam, Darktable, G.I.M.P.
    [Show full text]