Automated import of camera photos

dE . de.techno at gmail.com
Mon Dec 10 14:38:24 GMT 2012


On 12/08/12 02:46, Alex Schuster wrote:
> Hi there!
>
> As some of you may know, I'm a Gentoo user, and I have a KDE which is 
> quite well configured. But I'm setting up a PC for a lady who has 
> _very_ limited PC experience. She wants to try Linux, because she 
> became deprived of e-mail access by her ISP after her account started 
> to send SPAM due to some Windows malware. She only uses Firefox 
> (mainly for eBay), a mail client for two mail accounts, an image 
> viewer, and she needs to import photos from her camera. She also likes 
> to play two Windows games, Space Cadet (pinball) and some cards game.
>
> So I installed openSUSE (12.2 I think) on her new PC. For the desktop 
> environment, I chose KDE because it is so configurable. There should 
> be extra large icons on the desktop for example. I can set the fonts 
> to a huge size, which works fine mostly - notifications however show 
> up with text lines merged into another, so the text is not readable. 
> This happens when I plug in an USB camera, KDE asks if I want to open 
> it with Dolphin, or if I want to import pictures with Gwenview or 
> Digikam. Maybe I can tune this so only one entry appears.
>
> Photo import is the main problem: She currently has some Windows 
> application which allows to import all new images of the camera to a 
> folder. I would really REALLY like to have this feature, but it does 
> not seem to be possible.
>
> When the camera is plugged in, I can choose to import images with 
> Digikam. Works, with a few clicks. But when I do this again, Digikam 
> wants to import all images again, not only the new ones. It is working 
> fine as long as I do not close Digikam, but when I open it again, it 
> will import all images. This make es it basically unusable.
> I'm not sure if this also happened when I have Digikam running and 
> import manually, but this involves more clicks, and is also not what I 
> want.
>
> Gwenview imports only the new images. Fine, but also with way to many 
> clicks. The user needs to open folders named 'DCIM' and such, has to 
> pick the right ones, and the dialog asks him to import 'documents', 
> not 'pictures' or 'photos'. You might think tis is not a big deal, but 
> I fear this will make the user keep using the old Windows PC, where 
> everything works as expected.
>
> Any ideas how I could solve this? Is there any possibility to import 
> all new images from a camera to a folder? I would not mind scripting 
> if necessary.
>
> Sorry, I do not know the exact version of KDE, and I do not have the 
> PC here right now. Maybe this is a bug which is already fixed. I do 
> not have access to my own PC right now, too, so I cannot simply check 
> this. So I'm sorry for asking here, but I'm moving, and only have a 
> Windows laptop with me at the moment.
>
> Another disappointment was KMail, which I gave another try. The 
> problem was that I did not know the passwords yet, and it (or rather 
> Akonadi) kept asking for it, I was not even able to delete the 
> resource because of the dialog which would appear over and over 
> again.  I guess I could have solved this eventually, but then I 
> decided to simply use Thunderbird instead.
>
> What was great about using KDE was the possibility to configure the 
> desktop. I removed all window title bar buttons except for the close 
> button - minimizing an application to the panel would already be too 
> complicated, don't ask :)  A double click on the title bar to maximize 
> the window is okay, other stuff is too sophisticated. If she wants to 
> use another application, she simply closes the one she is using. She 
> is happy with this, and then so be it.
> I also disabled features like maximizing windows when they are moved 
> to the screen borders, or special effects happening when the mouse 
> enters the screen's corners. While I personally like those features 
> much, it's great that they are all optional. Thanks for leaving KDE so 
> much configurable, I guess this would not be possible with Gnome.
>
>     Wonko
> ___________________________________________________
> This message is from the kde mailing list.
> Account management:  https://mail.kde.org/mailman/listinfo/kde.
> Archives: http://lists.kde.org/.
> More info: http://www.kde.org/faq.html.

I'd not suggest KDE. Go for Xfce, and I personally give Debian to other 
users (although I myself use Gentoo with KDE and with no buttons on the 
title bar).

Use Thunderbird; it's much simpler than Outlook or it's variants.

For a simple user, he/she doesn't require customization; so Xfce should 
be good. Unlike KDE, it's reliable, stable, bug free, faster but very 
simple.

If you want I can upload the Debain (testing or Wheezy, which's about to 
freeze) squashfs image complete with a 'my computer' location (custom 
build). I also have a KDE variant of the same, which I absolutely not 
recommend for this lady.

As of ensuring the user to use the GNU system, induce fear in her of 
potential threats of using Windows. Show her some penis enlargement SPAM 
and tell her all this must be going from her mailbox to her contacts; 
but they wont respond cause they're shy.

Try these --

http://www.zdnet.com/blog/security/report-48-of-22-million-scanned-computers-infected-with-malware/5365
http://press.pandasecurity.com/news/in-january-50-percent-of-computers-worldwide-were-infected-with-some-type-of-computer-threat/
http://articles.timesofindia.indiatimes.com/2011-12-15/security/30520126_1_usb-malware-sophos
http://blog.trendmicro.com/1h-2009-malware-threat-grows-ever-larger
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.ic3.gov/media/2012/120508.aspx
http://www.techspot.com/news/47420-microsofts-indian-online-store-hacked-passwords-and-user-data-exposed.html
http://www.theinquirer.net/inquirer/news/1046798/microsoft-press-gang-attacked-by-outlaws
http://www.theregister.co.uk/2004/05/25/ms_uk_defaced/
http://news.softpedia.com/news/Microsoft-Got-Hacked-58708.shtml
http://nakedsecurity.sophos.com/2012/04/27/microsoft-rushes-out-fix-after-hackers-change-passwords-to-hack-hotmail-accounts/
http://www.internetnews.com/bus-news/article.php/387501/Brazilian+Microsoft+Web+Site+Hacked.htm
http://www.pcworld.com/article/33341/hackers_attack_microsofts_network.html
http://uptime.netcraft.com/up/graph?site=www.bing.com
http://www.crn.com/news/applications-os/18839747/microsoft-uses-linux-to-publish-its-own-web-site.htm
http://googleonlinesecurity.blogspot.in/2007/06/web-server-software-and-malware.html
{
http://articles.timesofindia.indiatimes.com/2011-09-27/pakistan/30207691_1_hacker-website-defaced
http://www.ndtv.com/article/world/pakistan-supreme-court-s-website-hacked-56148
http://uptime.netcraft.com/up/graph?site=www.supremecourt.gov.pk
Hacked twice when running IIS.
}
http://en.wikipedia.org/wiki/Code_Red_%28computer_worm%29
http://en.wikipedia.org/wiki/Nimda
http://www.pcworld.com/businesscenter/article/224471/windows_servers_hacked_at_the_hartford_insurance_company.html
http://www.fbi.gov/scams-safety/e-scams
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.theregister.co.uk/2010/02/05/terror_cybercrime
http://en.wikipedia.org/wiki/July_2009_cyber_attacks
http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf
http://www.ic3.gov/media/2009/091103-1.aspx
{
http://en.wikipedia.org/wiki/Storm_Worm
http://www.ic3.gov/media/2008/080211.aspx}
http://www.theregister.co.uk/2012/06/22/trojan_spews_gibberish_print_runs/
http://en.wikipedia.org/wiki/Chaos_Computer_Club#History
http://www.computerworld.com/s/article/9218645/SpyEye_Trojan_defeating_online_banking_defenses
http://en.wikipedia.org/wiki/Stuxnet
http://en.wikipedia.org/wiki/Flame_%28malware%29
http://news.cnet.com/8301-1009_3-57450292-83/shared-code-indicates-flame-stuxnet-creators-worked-together/
http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
http://en.wikipedia.org/wiki/Duqu#Microsoft%20Word%20zero-day%20exploit
http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq
http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/t/malware-implicated-fatal-spanair-plane-crash/
{http://www.nytimes.com/2010/07/24/us/24hearings.html?pagewanted=all
It was serviced by Microsoft Infosys
http://www.infosys.com/newsroom/press-releases/Pages/oil-gas-major-adam.aspx
http://www.ibtimes.co.in/articles/41196/20100806/.htm
http://www.nola.com/news/gulf-oil-spill/index.ssf/2010/08/oil_spill_hearings_transocean_1.html
"Winslow said he tried several times to use re"}
http://en.wikipedia.org/wiki/Flame_%28malware%29 (since 2007, detected 
in 2012)
http://en.wikipedia.org/wiki/DNSChanger
http://www.eweek.com/c/a/Security/Kasperskys-Download-Site-Hacked-Directs-Users-to-Fake-AntiVirus-336193
http://www.ebizid.com/domain.cgi?domainName=norton.com&SUBMIT=SUBMIT
http://uptime.netcraft.com/up/graph?site=www.mcafee.com
http://uptime.netcraft.com/up/graph?site=www.bitdefender.com
http://uptime.netcraft.com/up/graph?site=www.pandasecurity.com
{http://uptime.netcraft.com/up/graph?site=www.avsoft.net
http://www.pcworld.com/article/142318/hacked_antivirus_site_delivers_a_virus.html}
http://www.eweek.com/c/a/Security/Rutkowska-AntiVirus-Software-Is-Ineffective
http://en.wikipedia.org/wiki/Antivirus_software#Signature-based%20detection
{Polymorphic virus --
http://www.securelist.com/en/analysis/204792122/Review_of_the_Virus_Win32_Virut_ce_Malware_Sample
Virus makes themselves use antivirus --
http://blog.k7computing.com/2012/01/malware-authors-and-multiple-scanners}
http://www.emirates247.com/eb247/companies-markets/technology/rise-in-malware-variants-make-antivirus-solutions-insufficient-2009-11-19-1.20838
http://www.cbc.ca/news/technology/story/2012/05/30/f-flame-virus-detection.html
http://www.pcmag.com/article2/0,2817,1879939,00.asp
http://www.mcafee.com/us/downloads/free-tools/getsusp.aspx
https://blogs.mcafee.com/consumer/family-safety/mcafee-releases-results-of-global-unprotected-rates
http://en.wikipedia.org/wiki/List_of_rogue_security_software
http://googleonlinesecurity.blogspot.in/2010/04/rise-of-fake-anti-virus.html
http://en.wikipedia.org/wiki/Netsky_%28computer_worm%29 -- 18 year old 
boy did this.
{http://en.wikipedia.org/wiki/Stration
http://books.google.co.in/books?id=H2AEAAAAMBAJ&pg=PA10&lpg=PA10&dq=%22Stration%22+undetectable&source=bl&ots=-a1Fo4_QTU&sig=z3vFNBNiQTo17XWik9astg_MJNc&hl=en&redir_esc=y#v=onepage&q=%22Stration%22%20undetectable&f=false}
http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29
https://spyeyetracker.abuse.ch/
http://en.wikipedia.org/wiki/Shamoon
http://en.wikipedia.org/wiki/Stars_virus
http://www.fbi.gov/news/stories/2011/november/malware_110911
http://www.theverge.com/2012/2/7/2783575/symantec-source-code-stolen-the-extortion-investigation-and-release
http://www.computerworld.com.au/article/383261/microsoft_loss_over_event_viewer_scam/?ref=suggest_headline
http://www.kaspersky.com/about/news/virus/2012/Number_of_the_Week_24_of_Users_Have_Encountered_Fake_Antivirus_Software
http://en.wikipedia.org/wiki/Botnet#Historical%20list%20of%20botnets
{http://spamwars.com/stats.html
https://www.trustwave.com/support/labs/spam_statistics.asp
https://docs.google.com/viewer?a=v&q=cache:TW3ptIA-0tgJ:www.radicati.com/wp/wp-content/uploads/2009/05/email-stats-report-exec-summary.pdf+&hl=en&pid=bl&srcid=ADGEESg73kUq73kpSb6XwqRysBmg8pIpxDlDPUmeOaW2e_ZZitGcaORzyNo7XWHV_kuHFoUzDQnJUE-z_CERxhrx3ueZDpc9MjL8Ul7fthQWJu58FUCXFQgial7DhwimD-fkkjAsN0ba&sig=AHIEtbRnzC4foF2QnlwJ_SRh0i1MIbHD-A}
http://www.symantec.com/security_response/definitions.jsp
http://en.wikipedia.org/wiki/Operation_Aurora
{http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html
http://bits.blogs.nytimes.com/2012/05/28/new-computer-virus-looks-like-a-cyberweapon/}
http://en.wikipedia.org/wiki/Mydoom
{http://news.bbc.co.uk/2/hi/business/3682537.stm
http://en.wikipedia.org/wiki/Sasser_%28computer_worm%29}  -- 18 year old 
boy did this.
http://en.wikipedia.org/wiki/Michelangelo_%28virus%29
{http://www.theregister.co.uk/2012/01/12/drone_consoles_linux_switch/
http://mobile.informationweek.com/122360/show/4594d5d819bf3ee5ba8593894c0b205f&t=b794qjg6c4cr0r7md5sr31blg7}
http://www.wired.com/wiredenterprise/2011/09/microsoft-anti-malware-tool-mistakenly-snuffs-google-chrome/
http://www.theregister.co.uk/2010/02/02/anti_virus_false_positive_analysis/print.html
http://usa.kaspersky.com/partners/white-list-program
http://www.pcworld.com/article/197410/microsoft_official_admits_to_quiet_security_patching.html
http://blogs.computerworld.com/14687/microsofts_latest_linux_lies
http://blogs.computerworld.com/london_stock_exchange_to_abandon_failed_windows_platform
{http://www.novell.com/news/press/archive/2001/10/pr01093.html
http://www-304.ibm.com/partnerworld/wps/pub/overview/OEA00}
http://www.reuters.com/article/2010/08/23/urnidgns852573c40069388000257788005d060f-idUS57796183520100823

Tell her her hacked Windows computers can be used to do illegal tasks 
like participating in attacks, hacking people's computers, sending SPAM. 
She could be framed for a crime she didn't commit; e.g. a terrorist can 
send mails from her PC to government officials making them believe she 
send it.

And anti-viruses don't work (check the above links for all this.).
___________________________________________________
This message is from the kde mailing list.
Account management:  https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.




More information about the kde mailing list