
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
This Ruby extension provides camera input using Video for Linux version 2.
Author: Jan Wedekind Copyright: 2010 License: GPL
This Ruby extension provides the class {Hornetseye::V4L2Input} for capturing video frames using Video for Linux version 2 (V4L2).
hornetseye-v4l2 requires the V4L2 headers. If you are running Debian or (K)ubuntu, you can install them like this:
$ sudo aptitude install linux-libc-dev libswscale-dev libboost-dev
To install this Ruby extension, use the following command:
$ sudo gem install hornetseye-v4l2
Alternatively you can build and install the Ruby extension from source as follows:
$ rake
$ sudo rake install
Simply run Interactive Ruby:
$ irb
You can open a V4L2-compatible camera as shown below. This example will open the camera and switch to a resolution selected by the user. Finally the camera input is displayed in a window. This example requires hornetseye-xorg in addition to this Ruby extension.
require 'rubygems'
require 'hornetseye_v4l2'
require 'hornetseye_xorg'
include Hornetseye
camera = V4L2Input.new '/dev/video0' do |modes|
modes.each_with_index { |mode,i| puts "#{i + 1}: #{mode}" }
modes[ STDIN.readline.to_i - 1 ]
end
X11Display.show { camera.read }
FAQs
Unknown package
We found that hornetseye-v4l2 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.