-
Hello lovely maintainers :wave:
We've recently added "tags" to student's solutions. These express the constructs, paradigms and techniques that a solution uses. We are going to be using these tags fo…
-
# Issue
WSL 2 seems to NAT it's virtual network, instead of making it bridged to the host NIC. My goal is for a service running in Ubuntu in WSL 2 to be accessible from anywhere on my local network.
…
-
**Describe the project you want to add with tech stack**
The Caesar Cipher is a encryption technique that shifts each character in the plaintext by a fixed number of positions down the alphabet. It i…
-
**Is your feature request related to a problem? Please describe.**
Yes. Affine Cipher is a Cryptographic algorithm.
**Describe the solution you'd like**
I would like to implement the algorithm in P…
-
As the meliae library keeps giving us trouble, we can switch over to the built-in gc library for object leak inspection. The following snippet will already do the dirty work:
```python
import gc, …
-
**Is your feature request related to a problem? Please describe.**
Under GSSOC'23
I have gone through the entire repository and I haven't found any text decryptor tool in it. So I request you to giv…
-
This issue will be open and closed dependent on the state of https://github.com/quarkusio/quarkus-super-heroes building against Quarkus main snapshot.
If you have interest in being notified of this…
-
A couple of days ago I installed the indi-allsky with another ASI camera and it worked just fine. I decided to change camera and the 678 wouldn't show up. I reinstalled everything from scratch (OS inc…
-
### Summary
generating a config file using `ansible-config init --disabled -t all` creates a config files that has the `private_key_file` listed twice under the [defaults] sections.
The only n…
-
### Aim
The primary aim of the "Cryptogram Solver" script is to provide an automated solution for cryptograms, making use of frequency analysis and a word dictionary. Additionally, it offers interact…