RGingrich8
Graduated from the University of Calgary with a Bachelor of Science - Computer Science. Currently searching for new opportunities!
Calgary, Alberta, Canada
Pinned Repositories
TrackStar
FoxBot
Created in Python, a Discord bot that is capable of searching up song lyrics when given an artist name and song title. It will then return statistics about the song, such as the most common words within the song, the total number of words, and how unique the lyrics are.
RGingrich8
All about me!
RGingrich8.github.io
Personal website + place to store projects
Valorant-Duofinder
An application to that matches like-minded players for the game Valorant, a popular first-person shooter. The UI was created using REACT, while NodeJS and MongoDB were used for handling the backend and allowing players to connect to one another.
Web-Security
A demonstration of 3 common web attacks - cookie poisoning, cross-site scripting, and SQL injection. Informative pages provide background of each of the attacks, which were then recreated for the user to try for themselves.
SENG300Group22
SENG 300 Winter 2020 Group 22
Schedule_Viewer
Final project for CPSC 471 at the University of Calgary
RGingrich8's Repositories
RGingrich8/Valorant-Duofinder
An application to that matches like-minded players for the game Valorant, a popular first-person shooter. The UI was created using REACT, while NodeJS and MongoDB were used for handling the backend and allowing players to connect to one another.
RGingrich8/RGingrich8.github.io
Personal website + place to store projects
RGingrich8/FoxBot
Created in Python, a Discord bot that is capable of searching up song lyrics when given an artist name and song title. It will then return statistics about the song, such as the most common words within the song, the total number of words, and how unique the lyrics are.
RGingrich8/RGingrich8
All about me!
RGingrich8/Web-Security
A demonstration of 3 common web attacks - cookie poisoning, cross-site scripting, and SQL injection. Informative pages provide background of each of the attacks, which were then recreated for the user to try for themselves.