Fresh from the Labs

and, as root or sudo:

# make python-install

This should work in all three directories without errors. If not, make sure you have all of the previously mentioned libraries installed and up to date.


Now that the compiling is out of the way, head back to the main tetuhi directory, and enter the command:

$ ./tetuhi nameofimagehere.jpg

If everything has compiled properly, an image with some crazy instructions should appear on screen, walking you through the first steps of the game. The best types of images to use are those with simplicity, such as stark backgrounds with bold elements at the forefront. Included on the Tetuhi Web page is a link to a tarball containing sample images for testing. My favorite is “hills-cars.jpg”, whose line of land, trees and a car pulses and gyrates, while you control a wiggling sun—making for the trippiest game experience I've had in some time. Once you've enjoyed the first few plays, you may want to make a symlink to a pathed directory so that you don't have to keep entering Tetuhi's source directory.

Although the games themselves are rather simplistic (and lame in most cases), it's the implications of the image manipulation that are of real interest here. I can see parts of the code foundation making it into much larger-scale projects in the gaming and multimedia area in the future. Tetuhi's creator, Douglas Bagnall, is making particular efforts so that Tetuhi can be included on the One Laptop Per Child XO laptop, so it'll be interesting to see what kind of games and drawings children around the world will come up with to play in connection with Tetuhi's game rules.

Check out some of Douglas' other crazy projects at

John Knight is a 23-year-old, drumming- and climbing-obsessed maniac from the world's most isolated city—Perth, Western Australia. He can usually be found either buried in an Audacity screen or thrashing a kick-drum beyond recognition.


John Knight is the New Projects columnist for Linux Journal.

One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix