Re: Automated import of camera photos

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/08/12 02:46, Alex Schuster wrote:
Hi there!

As some of you may know, I'm a Gentoo user, and I have a KDE which is quite well configured. But I'm setting up a PC for a lady who has _very_ limited PC experience. She wants to try Linux, because she became deprived of e-mail access by her ISP after her account started to send SPAM due to some Windows malware. She only uses Firefox (mainly for eBay), a mail client for two mail accounts, an image viewer, and she needs to import photos from her camera. She also likes to play two Windows games, Space Cadet (pinball) and some cards game.

So I installed openSUSE (12.2 I think) on her new PC. For the desktop environment, I chose KDE because it is so configurable. There should be extra large icons on the desktop for example. I can set the fonts to a huge size, which works fine mostly - notifications however show up with text lines merged into another, so the text is not readable. This happens when I plug in an USB camera, KDE asks if I want to open it with Dolphin, or if I want to import pictures with Gwenview or Digikam. Maybe I can tune this so only one entry appears.

Photo import is the main problem: She currently has some Windows application which allows to import all new images of the camera to a folder. I would really REALLY like to have this feature, but it does not seem to be possible.

When the camera is plugged in, I can choose to import images with Digikam. Works, with a few clicks. But when I do this again, Digikam wants to import all images again, not only the new ones. It is working fine as long as I do not close Digikam, but when I open it again, it will import all images. This make es it basically unusable. I'm not sure if this also happened when I have Digikam running and import manually, but this involves more clicks, and is also not what I want.

Gwenview imports only the new images. Fine, but also with way to many clicks. The user needs to open folders named 'DCIM' and such, has to pick the right ones, and the dialog asks him to import 'documents', not 'pictures' or 'photos'. You might think tis is not a big deal, but I fear this will make the user keep using the old Windows PC, where everything works as expected.

Any ideas how I could solve this? Is there any possibility to import all new images from a camera to a folder? I would not mind scripting if necessary.

Sorry, I do not know the exact version of KDE, and I do not have the PC here right now. Maybe this is a bug which is already fixed. I do not have access to my own PC right now, too, so I cannot simply check this. So I'm sorry for asking here, but I'm moving, and only have a Windows laptop with me at the moment.

Another disappointment was KMail, which I gave another try. The problem was that I did not know the passwords yet, and it (or rather Akonadi) kept asking for it, I was not even able to delete the resource because of the dialog which would appear over and over again. I guess I could have solved this eventually, but then I decided to simply use Thunderbird instead.

What was great about using KDE was the possibility to configure the desktop. I removed all window title bar buttons except for the close button - minimizing an application to the panel would already be too complicated, don't ask :) A double click on the title bar to maximize the window is okay, other stuff is too sophisticated. If she wants to use another application, she simply closes the one she is using. She is happy with this, and then so be it. I also disabled features like maximizing windows when they are moved to the screen borders, or special effects happening when the mouse enters the screen's corners. While I personally like those features much, it's great that they are all optional. Thanks for leaving KDE so much configurable, I guess this would not be possible with Gnome.

    Wonko
___________________________________________________
This message is from the kde mailing list.
Account management:  https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.

I'd not suggest KDE. Go for Xfce, and I personally give Debian to other users (although I myself use Gentoo with KDE and with no buttons on the title bar).

Use Thunderbird; it's much simpler than Outlook or it's variants.

For a simple user, he/she doesn't require customization; so Xfce should be good. Unlike KDE, it's reliable, stable, bug free, faster but very simple.

If you want I can upload the Debain (testing or Wheezy, which's about to freeze) squashfs image complete with a 'my computer' location (custom build). I also have a KDE variant of the same, which I absolutely not recommend for this lady.

As of ensuring the user to use the GNU system, induce fear in her of potential threats of using Windows. Show her some penis enlargement SPAM and tell her all this must be going from her mailbox to her contacts; but they wont respond cause they're shy.

Try these --

http://www.zdnet.com/blog/security/report-48-of-22-million-scanned-computers-infected-with-malware/5365
http://press.pandasecurity.com/news/in-january-50-percent-of-computers-worldwide-were-infected-with-some-type-of-computer-threat/
http://articles.timesofindia.indiatimes.com/2011-12-15/security/30520126_1_usb-malware-sophos
http://blog.trendmicro.com/1h-2009-malware-threat-grows-ever-larger
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.ic3.gov/media/2012/120508.aspx
http://www.techspot.com/news/47420-microsofts-indian-online-store-hacked-passwords-and-user-data-exposed.html
http://www.theinquirer.net/inquirer/news/1046798/microsoft-press-gang-attacked-by-outlaws
http://www.theregister.co.uk/2004/05/25/ms_uk_defaced/
http://news.softpedia.com/news/Microsoft-Got-Hacked-58708.shtml
http://nakedsecurity.sophos.com/2012/04/27/microsoft-rushes-out-fix-after-hackers-change-passwords-to-hack-hotmail-accounts/
http://www.internetnews.com/bus-news/article.php/387501/Brazilian+Microsoft+Web+Site+Hacked.htm
http://www.pcworld.com/article/33341/hackers_attack_microsofts_network.html
http://uptime.netcraft.com/up/graph?site=www.bing.com
http://www.crn.com/news/applications-os/18839747/microsoft-uses-linux-to-publish-its-own-web-site.htm
http://googleonlinesecurity.blogspot.in/2007/06/web-server-software-and-malware.html
{
http://articles.timesofindia.indiatimes.com/2011-09-27/pakistan/30207691_1_hacker-website-defaced
http://www.ndtv.com/article/world/pakistan-supreme-court-s-website-hacked-56148
http://uptime.netcraft.com/up/graph?site=www.supremecourt.gov.pk
Hacked twice when running IIS.
}
http://en.wikipedia.org/wiki/Code_Red_%28computer_worm%29
http://en.wikipedia.org/wiki/Nimda
http://www.pcworld.com/businesscenter/article/224471/windows_servers_hacked_at_the_hartford_insurance_company.html
http://www.fbi.gov/scams-safety/e-scams
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.theregister.co.uk/2010/02/05/terror_cybercrime
http://en.wikipedia.org/wiki/July_2009_cyber_attacks
http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf
http://www.ic3.gov/media/2009/091103-1.aspx
{
http://en.wikipedia.org/wiki/Storm_Worm
http://www.ic3.gov/media/2008/080211.aspx}
http://www.theregister.co.uk/2012/06/22/trojan_spews_gibberish_print_runs/
http://en.wikipedia.org/wiki/Chaos_Computer_Club#History
http://www.computerworld.com/s/article/9218645/SpyEye_Trojan_defeating_online_banking_defenses
http://en.wikipedia.org/wiki/Stuxnet
http://en.wikipedia.org/wiki/Flame_%28malware%29
http://news.cnet.com/8301-1009_3-57450292-83/shared-code-indicates-flame-stuxnet-creators-worked-together/
http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
http://en.wikipedia.org/wiki/Duqu#Microsoft%20Word%20zero-day%20exploit
http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq
http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/t/malware-implicated-fatal-spanair-plane-crash/
{http://www.nytimes.com/2010/07/24/us/24hearings.html?pagewanted=all
It was serviced by Microsoft Infosys
http://www.infosys.com/newsroom/press-releases/Pages/oil-gas-major-adam.aspx
http://www.ibtimes.co.in/articles/41196/20100806/.htm
http://www.nola.com/news/gulf-oil-spill/index.ssf/2010/08/oil_spill_hearings_transocean_1.html
"Winslow said he tried several times to use re"}
http://en.wikipedia.org/wiki/Flame_%28malware%29 (since 2007, detected in 2012)
http://en.wikipedia.org/wiki/DNSChanger
http://www.eweek.com/c/a/Security/Kasperskys-Download-Site-Hacked-Directs-Users-to-Fake-AntiVirus-336193
http://www.ebizid.com/domain.cgi?domainName=norton.com&SUBMIT=SUBMIT
http://uptime.netcraft.com/up/graph?site=www.mcafee.com
http://uptime.netcraft.com/up/graph?site=www.bitdefender.com
http://uptime.netcraft.com/up/graph?site=www.pandasecurity.com
{http://uptime.netcraft.com/up/graph?site=www.avsoft.net
http://www.pcworld.com/article/142318/hacked_antivirus_site_delivers_a_virus.html}
http://www.eweek.com/c/a/Security/Rutkowska-AntiVirus-Software-Is-Ineffective
http://en.wikipedia.org/wiki/Antivirus_software#Signature-based%20detection
{Polymorphic virus --
http://www.securelist.com/en/analysis/204792122/Review_of_the_Virus_Win32_Virut_ce_Malware_Sample
Virus makes themselves use antivirus --
http://blog.k7computing.com/2012/01/malware-authors-and-multiple-scanners}
http://www.emirates247.com/eb247/companies-markets/technology/rise-in-malware-variants-make-antivirus-solutions-insufficient-2009-11-19-1.20838
http://www.cbc.ca/news/technology/story/2012/05/30/f-flame-virus-detection.html
http://www.pcmag.com/article2/0,2817,1879939,00.asp
http://www.mcafee.com/us/downloads/free-tools/getsusp.aspx
https://blogs.mcafee.com/consumer/family-safety/mcafee-releases-results-of-global-unprotected-rates
http://en.wikipedia.org/wiki/List_of_rogue_security_software
http://googleonlinesecurity.blogspot.in/2010/04/rise-of-fake-anti-virus.html
http://en.wikipedia.org/wiki/Netsky_%28computer_worm%29 -- 18 year old boy did this.
{http://en.wikipedia.org/wiki/Stration
http://books.google.co.in/books?id=H2AEAAAAMBAJ&pg=PA10&lpg=PA10&dq=%22Stration%22+undetectable&source=bl&ots=-a1Fo4_QTU&sig=z3vFNBNiQTo17XWik9astg_MJNc&hl=en&redir_esc=y#v=onepage&q=%22Stration%22%20undetectable&f=false}
http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29
https://spyeyetracker.abuse.ch/
http://en.wikipedia.org/wiki/Shamoon
http://en.wikipedia.org/wiki/Stars_virus
http://www.fbi.gov/news/stories/2011/november/malware_110911
http://www.theverge.com/2012/2/7/2783575/symantec-source-code-stolen-the-extortion-investigation-and-release
http://www.computerworld.com.au/article/383261/microsoft_loss_over_event_viewer_scam/?ref=suggest_headline
http://www.kaspersky.com/about/news/virus/2012/Number_of_the_Week_24_of_Users_Have_Encountered_Fake_Antivirus_Software
http://en.wikipedia.org/wiki/Botnet#Historical%20list%20of%20botnets
{http://spamwars.com/stats.html
https://www.trustwave.com/support/labs/spam_statistics.asp
https://docs.google.com/viewer?a=v&q=cache:TW3ptIA-0tgJ:www.radicati.com/wp/wp-content/uploads/2009/05/email-stats-report-exec-summary.pdf+&hl=en&pid=bl&srcid=ADGEESg73kUq73kpSb6XwqRysBmg8pIpxDlDPUmeOaW2e_ZZitGcaORzyNo7XWHV_kuHFoUzDQnJUE-z_CERxhrx3ueZDpc9MjL8Ul7fthQWJu58FUCXFQgial7DhwimD-fkkjAsN0ba&sig=AHIEtbRnzC4foF2QnlwJ_SRh0i1MIbHD-A}
http://www.symantec.com/security_response/definitions.jsp
http://en.wikipedia.org/wiki/Operation_Aurora
{http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html
http://bits.blogs.nytimes.com/2012/05/28/new-computer-virus-looks-like-a-cyberweapon/}
http://en.wikipedia.org/wiki/Mydoom
{http://news.bbc.co.uk/2/hi/business/3682537.stm
http://en.wikipedia.org/wiki/Sasser_%28computer_worm%29} -- 18 year old boy did this.
http://en.wikipedia.org/wiki/Michelangelo_%28virus%29
{http://www.theregister.co.uk/2012/01/12/drone_consoles_linux_switch/
http://mobile.informationweek.com/122360/show/4594d5d819bf3ee5ba8593894c0b205f&t=b794qjg6c4cr0r7md5sr31blg7}
http://www.wired.com/wiredenterprise/2011/09/microsoft-anti-malware-tool-mistakenly-snuffs-google-chrome/
http://www.theregister.co.uk/2010/02/02/anti_virus_false_positive_analysis/print.html
http://usa.kaspersky.com/partners/white-list-program
http://www.pcworld.com/article/197410/microsoft_official_admits_to_quiet_security_patching.html
http://blogs.computerworld.com/14687/microsofts_latest_linux_lies
http://blogs.computerworld.com/london_stock_exchange_to_abandon_failed_windows_platform
{http://www.novell.com/news/press/archive/2001/10/pr01093.html
http://www-304.ibm.com/partnerworld/wps/pub/overview/OEA00}
http://www.reuters.com/article/2010/08/23/urnidgns852573c40069388000257788005d060f-idUS57796183520100823

Tell her her hacked Windows computers can be used to do illegal tasks like participating in attacks, hacking people's computers, sending SPAM. She could be framed for a crime she didn't commit; e.g. a terrorist can send mails from her PC to government officials making them believe she send it.

And anti-viruses don't work (check the above links for all this.).
___________________________________________________
This message is from the kde mailing list.
Account management:  https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.


[Index of Archives]     [Trinity (TDE) Desktop Users]     [Fedora KDE]     [Fedora Desktop]     [Linux Kernel]     [Gimp]     [GIMP for Windows]     [Gnome]     [Yosemite Hiking]
  Powered by Linux