GNU Image Manipulation Program User Manual 2.10any other program can do, including install back-doors on your system or otherwise compromise its security. Don’t install a plugin unless it comes from a trusted source. 177 CHAPTER 13. SCRIPTING 13.1 pattern is generated. The Sine curve uses the fixed gear, but instead of a moving gear, there is a spring that moves perpendicular to the fixed gear’s edge. The Lissajous curve is generated by two springs0 码力 | 1070 页 | 44.54 MB | 1 年前3
The Gimp User’s Manual version 1.0.1And Sc an n e r s Preparing For Security Well, we don’t want to jump ahead, but there are some adjustments you can do now that will enable you to raise the security level later on. You may have dependent installed under /opt/gimp, and libjpeg could be installed under /usr/local. After having raised the security by enabling sgid (set group id on execution) on the scanner program, the scanning program (e.g. all directories (with the -R flag) that have libraries that xscanimage needs. (See “Preparing For Security” on page 232). To find out whether any more libraries are missing, invoke ldd, like this: [olof@whopp0 码力 | 924 页 | 9.50 MB | 1 年前3
GIMP User Manual 2.2other program can do, including install back-doors on your system or otherwise compromise its security. Don't install a plugin unless it comes from a trusted source. These caveats apply as much to0 码力 | 421 页 | 8.45 MB | 1 年前3
GNU Image Manipulation Program User Manual 2.4any other program can do, including install back-doors on your system or otherwise compromise its security. Don’t install a plugin unless it comes from a trusted source. These caveats apply as much to the0 码力 | 653 页 | 19.93 MB | 1 年前3
共 4 条
- 1













