Friday, September 24, 2010

Merge, split, and watermark your PDFs with PDF Chain

Merge, split, and watermark your PDFs with PDF Chain: "

Say you have two PDF documents and you want to merge them into one. Or say you have one long PDF document and you want to split it into sections. Or what if you want to add a watermark What do you do? If you’re really up on your PDF Toolkit commands you could easily do this from the terminal window. If you’re not up on those commands you could turn to PDF Chain.

PDF Chain is a graphical front end for the PDF Toolkit which allows you to merge, split, watermark, rotate, add attachments to, and set permissions for existing PDF documents. And, best of all, it’s very easy to use so any level of user can take advantage of PDF Chain’s handy features. In this article I am going to show you how to install and use PDF Chain.

Installation

Naturally, since this is Linux, installation is simple. All you need to do is follow these easy steps:

  1. Open up your Add/Remove Software Utility.
  2. Search for “pdf chain” (no qutoes).
  3. Mark PDF Chain for installation.
  4. Accept any dependencies necessary.
  5. Click Apply to install.
  6. Once the installation is complete, close the Add/Remove Software tool.

You are now ready to start manipulating your PDF documents.

Merging PDFs

Figure 1

Let’s first take a look at how to merge two (or more) PDF documents. To do this first open up PDF Chain by clicking Applications > Office > PDF Chain. When the application opens you will see a simple window with four tabs: Merge, Split, Background/Stamp, Attachaments. The tab you want for merging PDFs is, obviously, Merge (see Figure 1). Click on that to begin the process.

To merge PDF documents all you need to do is click the + button to add the PDF documents you want to merge. Move them up or down using the appropriate arrows. The order in which they appear in the Add window will be the order they are merged into. Once you have added all your PDFs you can select the ID for the merged PDF from the ID drop down. You can create a new ID or get the ID from one of the listed PDF documents.

When you have taken care of all of the set up, click the Save button, give the new document a name, and let the merging begin!

Splitting PDFs

Figure 2

The splitting process is very similar to the merging process. Now, understand what the splitting process does is split a multi-page PDF into single pages. So if you have a 20 page document you will wind up with 20 single page documents. You can then merge some of those together to make smaller documents.

To split a document, follow these steps:

  1. Click on the Split tab (see Figure 2).
  2. Click the Add button.
  3. Navigate to the PDF you want to split.
  4. Click the Save button.
  5. Select the folder you want to save all of your PDFs to.
  6. Click OK.

That’s it. You have now split that single PDF into multiple pages. NOTE: The count digits refer to the numbers for the saved file names. So if you have Sheet as a prefix and 3 counter digits the file names will look like:

  • Sheet001.pdf
  • Sheet002.pdf
  • Sheet003.pdf
  • etc.

Background/Stamp

Figure 2

Just like the merging and splitting, the background/stamping is just as easy. Say you want to watermark your name on the pages of a PDF you have created. To do this you have to have a pre-created watermark PDF for the process. Once you have that all you do is click the Background/Stamp tab (see Figure 3) and follow these steps:

  1. Click Add to add the PDF you want to watermark.
  2. Click add to add the PDF to be used for the watermark
  3. Select if this is a background or a stamp.
  4. Click Save.
  5. Give the resulting PDF a name.
  6. Click OK.

If you do create a watermark PDF, make sure the image has a certain level of opacity because PDF Chain does not add any opacity to your stamp.

Final thoughts

PDF Chain is a very handy tool to have around for anyone that has to work with PDF files. With this handy tool you don’t always have to have (or fire up) the tool you used to create the PDFs in order to handle simple actions such as merging or splitting. And don’t forget you can also add attachments to PDFs as well as edit the permissions of PDFs from PDF Chain as well.

Sunday, September 19, 2010

802.11n Wi-Fi essentials for enterprise IT

802.11n Wi-Fi essentials for enterprise IT: "The rapid adoption of IEEE 802.11n as the Wi-Fi standard is transforming the wireless experience for users, and the enterprise network. Here's a round up of the news, issues, trends, and information you can use for keeping up with the fast-changing Wi-Fi world."(See 802.11n reshaping Wi-Fi experience.)

[Don't forget to sign up for our twice-weekly "Wireless Alert" newsletter, by Joanie Wexler. You can see recent topics and easily register online.]

Our timeline of 11n's development gives a quick overview of some of the key milestones. And we've tracked the deployment and evolution of the first large-scale 11n deployment (based on the then-draft standard): a campus-wide network at Morrisville State College in upstate New York, using gear from Meru Networks

Saturday, September 18, 2010

Secure Your Wireless Network: Cast Out Wi-Fi Intruders

Secure Your Wireless Network: Cast Out Wi-Fi Intruders: "Are you the only one enjoying your home network. Here's how to detect trespassers and block them from sucking up your bandwidth.

We all love the convenience of our home Wi-Fi networks, though it's likely that we're not the only ones. If you haven't adequately secured your wireless, it's possible that others—your neighbors and various other passers-by, for example—are happily gobbling up the bandwidth you pay for. Now, to be honest, you're probably not using it all, and sharing is the neighborly thing to do. In fact, many routers will help you do just that (share, not be neighborly). Of course, it would be equally considerate if that guy down the hall offered you some cash to use your network.

That said, you may have some very good reasons for keeping your network locked. So, we've gathered some tips for finding out if someone is using your 802.11-based signals as their own, and how you can block them out.


Friday, September 17, 2010

Top 10 Most Popular Infomercials

Top 10 Most Popular Infomercials: "Who can forget all of the famous pitch lines, gizmos and unintentional hilarity packed into late-night paid programming? Infomercials are showy, earnest and often outright deceptive. What are 10 of the best?

For those insomniacs who've found themselv­es sitting in front of the television at 3 a.m. on more than one occasion, infomercials are entertainment staples. Even if you regularly sleep through the night, you're sure to have caught one of these half-hour or hour-long sales pitches at one time or another.
Who can forget hawkers like Billy Mays (OxiClean), Ron Popeil (Showtime Rotisserie), Matthew Lesko (Free Money) and Billy Blanks (Tae Bo) trying to sell us a cleaner home or a more toned body? These infomercial stars have become celebrities of sorts, as recognizable as the actors in TV shows.