-
## Description
Currently, we use students' UTEIDs to manage the queue. This approach presents a few issues:
- Using user-entered fields as object keys for any application is risky. They're not u…
-
### 📑 I have found these related issues/pull requests
No found any
### 🏷️ Feature Request Type
Other
### 🔖 Feature description
Database file encryption (Plaintext) in the SQLite to avoi…
-
When utilising shinylive.io/r to develop an app, the question arises: "Who has access to view the app?" After generating the application URL, it is disseminated exclusively to a chosen group of users.…
-
I think it would be nice to have a password or pin protection for notebooks. This would add some privacy for the notes and todos if the content of the notebooks would only be visible when the user ent…
-
## Description
For the use case of sharing a notebook on my laptop with a friend sitting nearby the instructions for shared editing
https://jupyterlab.readthedocs.io/en/stable/user/rtc.html don't g…
ianhi updated
2 years ago
-
Comments: OMB Improving Cyber Security Protections in Federal Acquisitions
Don O'Neill
Independent Consultant
ONeillDon@aol.com
1. Security Controls
As a minimum security controls must include thr…
-
Disscussion for: [Database Encryption Project](https://github.com/orgs/orbitdb/projects/7#card-44572258).
Let me give a brief summary of the project, the current state of the discussion
gathered f…
-
Hi,
TL;DR : I liked Semaphore a lot but I will not deploy it for my team (and it makes me sad!)
For a little bit of background on why I am here :
My team and I have an Ansible AWX / Tower inst…
-
Related the issue: Tor everything https://github.com/rootzoll/raspiblitz/issues/2180
"But Tor is not secure" - Said the naive person. Read [this vpn ad bullshit](https://vpnpros.com/blog/why-tor-is…
-
This issue describes the weakness of WAMP-CRA against database theft and lead to the decision that a better authentication method is needed. The issue regarding the elaboration of yonder method is fil…