VueScan is an application for scanning documents, photos, film, and slides on Windows, macOS, and Linux. VueScan supports over 6000 scanners from 42 manufacturers – even when there isn't a driver available from the manufacturer.
The base VueScan app is available for free but will leave a watermark on your scanned images unless you purchase a license from Hamrick Software.
NOTE: This wrapper is not verified by, affiliated with, or supported by Hamrick Software.
The goal of the swtpm project is to provide a TPM emulator (TPM 1.2 & TPM 2) that can be integrated into virtualized environments, such as virtual machines and containers. So far it has been integrated into QEMU and as a prototype into RunC…
This tutorial explains how to install and run Windows 10 on Linux using GPU passthrough and VFIO drivers to achieve near-native performance – for gaming, photo or video editing, and other graphics and CPU intensive tasks. It also lists the common pitfalls and possible ways to further improve performance. Last not least it offers a comprehensive list of external resources and helpful links.
“In 1985 Steve Jobs resigned from Apple and founded NeXT Inc. in order to build the NeXT Computer. It was ahead of its time and had amazing features thanks to the NeXTSTEP operating system, most famously used at CERN by Sir Tim Berners-Lee to create the World Wide Web. NeXTSTEP later became OPENSTEP and when Apple acquired NeXT in 1997, they used it as the basis for Mac OS X and iOS. If you've done any Mac or iOS programming, you've seen the echoes of NeXTSTEP in the type names – NSObject, NSString, NSDictionary, and many others all come directly from NeXT (NS = NeXTSTEP).
These computers cost about as much as a new car when they first came out, so they were out of reach for most people. What was it like to use a top of the line system in the early 90s? Let's build our own and find out!…”
“Portmaster : Take Back Control of Your Computer ( Love Freedom – Block Mass Surveillance ) – Portmaster is a free and open-source application that puts you back in charge over all your computer's network connection…”
Linux kernel security is a very complex topic. Some defence technologies are provided by the Linux kernel mainline. Others are going out‑of‑tree for various reasons (some of them are commercial, for example). Plus there are kernel defences that depend on special hardware features…