Project Skyscraper - PoC of a Cloud Governance Dashboarda project by tmuntan1 Project DescriptionWe would like to create a single interface for teams to manage our cloud governance. |
Video For Linux 2 Camera monitor, frame capture, day/night exposure control and timelapse generator in pythona project by dmair Use the V4L2 API in a PySide qt6.3 application to capture frames, monitor and adjust image exposure from a camera Frame capture is functional |
TeX macros for a puzzle gamea project by mcalabkova MotivationThere is plenty of puzzle games (see Šifrovačky.cz), but currently none designed for children. With my husband we are thinking of starting/reviving one and creation of a fine typesetting system is one of the preliminary steps. The macros could also be used by other puzzle games in need of a new typesetting system (I could publish them if I liked my work). |
reformatting text in visan invention by mcepl Project DescriptionThere is this text editor vis, modal text editor based on the Plan9 structural regular expressions and se(1). However, comparing to sam(1) or acme(1) it feels mostly like advanced vi(m) not something completely new (and it is not mouse-driven). |
Show Me The Key: A screenkey alternative that works under Wayland via libinputa project by AZhou (Improve last hackweek's project.) <https://showmethekey.alynx.one/> |
Securing and improving home/server networka project by ohollmann Project DescriptionNow, when mikrotik supports WireGuard there is no need to stay with OpenVPN. Let's try to setup WireGuard and investigate it's options, test performance etc. |
Write a formula with forms for setting up a container registrya project by mcalmer Project DescriptionLearn about formulars with forms and write a formula which setup a container registry. |
Audio steganography for music digital signaturesan idea by shawnhao Project DescriptionThere are lots of indie musicians who are not very aware of protecting their copyright and it is hard to determine plagiarism in music. I believe a digital signature could be useful to present copyright on court without damaging and altering the soundings of a song. But I am also aware that a signature alone may not be sufficient to protect copyrights and it is able to bypass it. |
Learn more about Application Security (AppSec) Open Source Tools and Testing Techniquesan idea by heidi.bronson Project DescriptionApplication security (AppSec) is a threat that all organizations are facing. While we have QA engineers and security teams to help avoid these threats, true AppSec can only be obtained by giving developers the tools to find and fix vulnerabilities before their code is pushed into the deployment pipeline. As a software engineer, I want to make sure that my applications are secure. During this hackweek, I want to study the OWASP Top 10 vulnerabilities, related testing techniques, and open source tools that can be used to test our applications and keep them safe from malicious actors. |
Poking technologies for enrolling customer key to kernel trusted keyringa project by joeyli Project DescriptionThe keys in db or mok can be used to verify boot loader and kernel binary for booting. But upstream kernel doesn't trust them for enrolling to trusted keyring because they are enrolled outside the boundaries of kernel. Which means that IMA can not use db/mok keys for verification. |