I just tried #OrcaSlicer for the first time, I've just not had time to test it until now.
Because it was based on #PrusaSlicer, #SuperSlicer, and #Slic3r, I hoped that I could just import my PrusaSlicer config, but could not because it expected a .json file and PrusaSlicer outputs a .ini, but I might have done this incorrectly.
So I configure a "Generic Klipper setup" and copied the values by hand by comparing settings with my PrusaSlicer setup and a bit of experience and intuition.
My first resulting print, a custim part by me compared to the PrusaSlicer, was worlds apart. The finish was greatly improved with bridges requiring no supports, however it did print a bit slower, 28 minutes instead of 18 minutes, but this might still just be speed settings.
I like the UI, although I am more used to PrusaSlicer, and I especially love that I can access #Mainsail and #Klipper from within the app.
#orcaslicer #prusaslicer #superslicer #slic3r #mainsail #klipper #3dprinting
After back and forth I finally managed to compile #slic3r on my #openbsd machine 😎 #3dprinting we're on!
After back and forth I finally managed to compile #slic3r on my #openbsd machine 😎 #3dprinting we're on!
Bambu Studio
Bambu Studio is Bambu Labs’ slicer software, which is Open Source and a distant relative to the original Slic3r (like SuperSlicer) and has recently been forked into an enhanced “SoftFever” version(...)
#3d #bambulabs #slic3r #slicer #3dprinting
PrusaSlicer
PrusaSlicer is Prusa Research’s slicer software, which is Open Source and a direct descendant of Slic3r (like SuperSlicer).(...)
#prusa #3d #slic3r #slicer #3dprinting
Vulnerability Spotlight: Out-of-bounds read vulnerability in Slic3r could lead to information disclosure - Lilith >_> of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.
Cisco Talos rece... http://feedproxy.google.com/~r/feedburner/Talos/~3/KVxr9EMdrzk/vuln-spotlight-slic3r-oob.html #vulnerabilityspotlight #securex #slic3r #cve
#cve #slic3r #securex #vulnerabilityspotlight