Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,000 256 829 2340 iş bulundu, ücretlendirmeleri EUR

    Her ürün için sürekli güncellenen, elimizdeki renkleri belirten görseller hazırlamamız gerekiyor. Piyasada bulunan kolaj programlarında bir renk eklemek için, tüm renkleri baştan seçmemiz gerekiyor, 0dan oluşturuyoruz görseli. İhtiyacımız olan; 50 kay...hazırlamamız gerekiyor. Piyasada bulunan kolaj programlarında bir renk eklemek için, tüm renkleri baştan seçmemiz gerekiyor, 0dan oluşturuyoruz görseli. İhtiyacımız olan; 50 kayıtlı şablon olacak. Bu şablonlara tıkladığımızda, daha önce görsel oluşturulurken seçilmiş olan renk fotoğraflarını görüp, istediğimizin seçimini iptal edebilecek ve yeni fotoğraflar ekleyebileceğiz. İşlem tamamlandığında da 256-123-36 gibi adlandı...

    €115 (Avg Bid)
    €115 Ortalama Teklif
    4 teklifler

    hacer el escudo en 256 y otro de 128 pixel

    €40 (Avg Bid)
    €40 Ortalama Teklif
    1 teklifler

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash below a c...

    €11 (Avg Bid)
    €11 Ortalama Teklif
    3 teklifler

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    €90 (Avg Bid)
    €90 Ortalama Teklif
    30 teklifler

    ...process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on the chosen encryption algorithm, understanding its principles and functionality. 3. Writing Phase: ● Approach 1: Document the softwa...

    €106 (Avg Bid)
    €106 Ortalama Teklif
    45 teklifler

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Ortalama Teklif
    26 teklifler

    ...Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash below a ce...

    €12 / hr (Avg Bid)
    €12 / hr Ortalama Teklif
    7 teklifler

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    €25 (Avg Bid)
    €25 Ortalama Teklif
    4 teklifler

    Hello i need to creare a script on nodeJS for create a wallet eth , the screept need to work on autoincrement and need to have a range page , the script on parameter need to have page start and page stop for generate , every page need to have 128 / 256 result the user need to choise , the result need to be stored on sql server text me for more info

    €25 (Avg Bid)
    €25 Ortalama Teklif
    10 teklifler

    ...is an author and speaker with strong focus on China. Therefore, red should be the main color. See my substack here: Needs: - Logo for a Homepage (together with set of fonts to use in the homepage) - Logo for Business Cards (together with set of fonts to use on the business card) - Youtube: for channel and watermark Substack: - minimum 256×256 Pixel (square logo) - brand name: minimum 1344×256 aspect ratio: 21:4 - title picture: minimum: 600x600px square LinkedIn: - Round profile picture - rectangle profile background...

    €87 (Avg Bid)
    €87 Ortalama Teklif
    92 teklifler

    ...an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bit enc...

    €57 (Avg Bid)
    €57 Ortalama Teklif
    2 teklifler

    Necessito que as descrições sejam traduzidas de forma correta e com gramática. Quem se candidatar deverá perceber do produto e não fazer tradução literal mas sim dar os nomes corretos em português Necessito de amostra de tradução da linha 142, linha 256, linha 413, linha 1076, linha 1150, linha 1204, linha1229.

    €132 (Avg Bid)
    €132 Ortalama Teklif
    32 teklifler
    Trophy icon Lawn Care company logo Bitti left

    Looking for a skilled graphic designer who can help me out in creating a professional logo. My company provides lawn care services. The name of the company is Crabtree Lawn Solutions LLC. I like the idea of having a leaf or a blade of grass somewhere on the logo. The "T" in the word Crabtree could even be a tree. The logo will go on a company vehicle. I also want to add the phone number (256-473-9580) to the bottom of the logo. I really like the example logo that I have attached called "Evergreen". Key requirements for this job are as follows: - Color Palette: The dominant color scheme for the logo needs to be a harmony of green, white, and black. These colors should exude a playful and bold character. - Design Style: The designed logo needs to strike a ba...

    €47 (Avg Bid)
    Garantili
    €47
    657 girdi

    ...vault in my Wildfly 26. The goal is bolstering the security of my data transmission, shielding sensitive data in transit. Features required: - Configure SSL/TLS to desire a 256-bit encryption standard, providing a high level of security, for secure data transmission. - Support for both TLS 1.2 and 1.3 protocols in the SSL/TLS configuration to enable both secure and reliable communication. - Implement Vault setup for effective protection of sensitive data. The ideal freelancer would have: - Extensive experience in handling Wildfly servers. - Detailed knowledge of SSL/TLS configuration and the ability to implement 256-bit encryption. - Familiarity with different TLS protocols and how to support multiple versions. - Proven record of setting up and managing Vaults. Your a...

    €19 (Avg Bid)
    Garantili
    €19
    1 girdi

    ...designs. • Familiarity with Singapore's architecture and interior design trends will be a plus. Your design should provide visually-rich options which I can select from and should include color schemes, furniture, and decor suggestions. I look forward to seeing your innovative design ideas and working together to make my space reflect my personal style and be a true oasis in the city. Apartment-829 sqft Big item- piano Floor plan attached is mirrored Convert 2 bedder to 3 bedded meaning build up a room...

    €296 (Avg Bid)
    €296 Ortalama Teklif
    64 teklifler

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 address...understanding various programming concepts. -Bech32 Format Conversion: I am specifically interested in how to convert between formats using Bech32. Your experience with handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational sp...

    €126 (Avg Bid)
    €126 Ortalama Teklif
    2 teklifler

    I'm looking for a proficient...focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    €155 (Avg Bid)
    €155 Ortalama Teklif
    27 teklifler

    ...design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The official c...

    €134 (Avg Bid)
    €134 Ortalama Teklif
    4 teklifler

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €145 (Avg Bid)
    €145 Ortalama Teklif
    14 teklifler

    Would you like to do another similar job? 256 transaction. 5 columns. about 20-30 characters per column. 1 additional column what will be one of 3 numbers so not really any effort (just a 4 digit number).

    €47 (Avg Bid)
    €47 Ortalama Teklif
    1 teklifler

    Hi, I need a python script that transforms the Image into n-different color codes/palettes: 24 colors, 64, 126, 256 . It uses dithering to optimize the Image quality. It uses a fixed color palette. Thanks

    €19 (Avg Bid)
    Acil
    €19 Ortalama Teklif
    11 teklifler

    I'm currently experiencing issues with the Git plugin on my Jenkins setup. I'm looking for a freelancer skilled in Jenkins, particularly with the latest versions (2.303.2 or newer), who can help resolve error messages that occur during the operation of the Git plugin. Here are the specific details and requirements for this job: - **Plugin Involved**: Git plugin =======================...)<br> at ()<br> at ()<br> at ()<br> at ()<br> at $doRun$1()<br> at (:829)<br></pre>

    €14 (Avg Bid)
    €14 Ortalama Teklif
    8 teklifler

    I am using Locust ( ) to do some scripts to test going to various web sites. The script is attached. It works. The output is also attached. What I need is that in the output the website name in the request is not shown. It just shows the GET. GET / 1 0(0.00%) | 829 829 829 829 | 0.00 0.00 The request is: ("") (and so on). What I need is an enhancement to my script so that the web site name of the site I am going to is shown. I will also provide the invokation of the script to the accepted coder. The output and script are attached. I will pay up to $50 for this.

    €139 (Avg Bid)
    €139 Ortalama Teklif
    26 teklifler

    ...Unified Communications Manager Express (CME) 9.1 ir newer - Familiarity with Cisco IP Phones, particularly the 7965 model - Proficiency in language configuration and firmware updates - Knowledge of Spanish (Spain)-specific configurations would be a plus. Hardware: - Cisco Router is 3945 1GB flash memory 2GB RAM. IOS 15.0(1r)M16 CME 9.1 Router has 3 PVDM3 DSP DIMM 32 channels, 128 channels and 256 channel. - Cisco switch 3750 Poe. -PC with windows 11 and anydesk for you connection. -Putty console connection to router. Requirements: - Configure CME 9.1 Spanish language on user-locale 0 and network-locale 0 - Leave US English default language on user-locale 1 and network-locale 1 - All phones need load Spanish Language on startup. But it will be tested on two phone (7965 a...

    €48 (Avg Bid)
    €48 Ortalama Teklif
    3 teklifler

    We need a developer with Python experience to help us optimize and fix a script that connects to an API then processes the pulled data. - Script is 256 lines. File is attached. - Understands API connections - Can identify and fix data processing errors - Can optimize scripts to handle high-speed data with buffering. Currently the script fails when an API call fails to retrieve some piece of data. Additionally, it does not seem to properly handle assigning "request ID" within the loop, leading to "duplicate request ID" errors during a session. We think the solution is some combination of "retry" and "wait" loops with validation. You should review the code and make the appropriate changes, so the script can run properly. Experience with I...

    €138 (Avg Bid)
    €138 Ortalama Teklif
    64 teklifler

    I'm in n...and a Windows client application, both developed using C#. The communication between these two platforms should be enabled through binary messages in CBOR format. Key considerations include: - Operating Systems: The candidate should be familiar with both Linux and Windows as the kestrel server is needed on Linux, and the client will be on Windows. - Encryption: We will be using keyed HMAC, AES-256, ECDSA, and ECDH for data security. An understanding of these encryption methodologies is necessary. - Programming: The project heavily relies on C#/.NET, so high proficiency is required. Expected candidates need to deliver secure and efficient solutions, demonstrating their competence in the above mentioned skills, particularly with binary communication and encryption...

    €852 (Avg Bid)
    Gizlilik Anlaşması
    €852 Ortalama Teklif
    26 teklifler

    ...their scanned documents to our custom API server without any hassle. Organized Image Management: An intuitive interface for managing scanned images, including options to delete and organize them. Efficient Folder Management: Users should be able to easily create and manage folders for their documents. Robust AES Encryption: Security is paramount. We're counting on you to implement top-notch AES 256 encryption for image storage. Smart Storage Management: Help our users keep their devices clutter-free with automatic local storage clearance after uploads. Your Technical Toolkit Should Include: A solid background in React Native and TypeScript. Hands-on experience with AES encryption in mobile apps. Proven skills in API integration and data management. A good grasp of SSO ...

    €429 (Avg Bid)
    €429 Ortalama Teklif
    19 teklifler

    ...Bitcoin, and we are looking for a skilled professional to lead the design and implementation of the SHA-256 mining software. Position Overview: As an ASIC Miner Software Engineer specializing in SHA-256 mining, you will play a crucial role in developing the software that drives our next-generation Bitcoin mining hardware. The successful candidate will have a deep understanding of cryptographic algorithms, particularly SHA-256, and possess expertise in low-level programming for efficient mining operations. Responsibilities: 1. Algorithm Design and Optimization: - Collaborate with hardware engineers to understand the ASIC architecture and design mining algorithms optimized for SHA-256. - Develop and implement efficient and scalable software algorithms ...

    €21 / hr (Avg Bid)
    €21 / hr Ortalama Teklif
    17 teklifler

    Create 6 category images (256 x256) by collating images of the products in the category. All images of the products will be shared per category. The images of the category needs to be clustered image of these products similar to the following. Each image of the category will have arabic titles to be appended as shown in the following image. Create multiple variations to select from (atleast 3). The background needs to be transparent. The images of the products will be shared once the project is finalized and NDA is signed Create 2 banners (Min: 516x119), 4:1 ratio) - one in english and one in arabic. for home page of an application with a messaging Free Delivery, Next Day delivery along with logo of the company. The banner will have to follow a theme palette which will be shared ...

    €102 (Avg Bid)
    Gizlilik Anlaşması
    €102 Ortalama Teklif
    21 teklifler

    I am looking for a freelancer who can provide me with sample code using UART in 9 bit multiprocessor mode in STM32 CubeIDE on a STM32F103RB6. This project is for personal use and I need it completed within 1 day. Specifically, I need the sample code to include the following features and functionalities: - Data transmission and reception using UART in Interrupt mode - Receive / Transmit buffer 256 bytes I'm looking for someone that has already worked with Multiprocessor Mode and 9 data bits in UART. You should be able to bang this out pretty fast. A simple master, a simple slave that listens for its address (Multiprocessor Mode). This is also known as a few others, Multi-drop serial, Multi Processor Communication Mode (MPCM) used in vending machines, a wide range or us...

    €9 - €28
    €9 - €28
    0 teklifler

    Examsoft Decryptor Project Skills and Experience: - Expertise in decryption software - Proficiency in AES-256 encryption - Experience with Examsoft software - Knowledge of file formats, particularly PDF conversion Project Description: We are seeking a skilled freelancer with experience in decrypting Examsoft software files. The ideal candidate should possess expertise in AES-256 encryption and have prior experience working with Examsoft software. The main objective of this project is to decrypt an Examsoft file, specifically in PDF format. The decrypted file should retain its original formatting and content. Successful freelancers should include their experience in their application, showcasing past work and detailed project proposals. They should demonstrate their prof...

    €123 (Avg Bid)
    €123 Ortalama Teklif
    17 teklifler

    There are a total of 256 pages. just copy past work

    €2 / hr (Avg Bid)
    €2 / hr Ortalama Teklif
    59 teklifler

    ...(log in with google is already configured) - This ^ may be part of a separate custom plugin or make use of an existing (high quality preferably free or low cost plugin) Security / Maintenance requirements: - Maintain secure connection (SSH already configured on the site) - Use secure api connections wherever possible. - Encrypt any sensitive user data at rest using industry standards (like AES-256) - Input Validation and Sanitization: The plugin should validate and sanitize user inputs to prevent SQL injection, cross-site scripting (XSS), and other common web vulnerabilities. - In the future, we'll need to perform regular Security Audits and Updates as needed to address bugs or vulnerabilities. - Error Handling: The system should handle errors without exposing sensitiv...

    €2826 - €4710
    Özellikli Mühürlü
    €2826 - €4710
    28 teklifler

    I am looking for an intermediate level freelancer to create a written documentation tutorial on cyber security. The tutorial should cover topics such as AES, SHA-256, Diffie-Hellman, PS, and TLS. The ideal freelancer for this project should have a strong understanding of cyber security concepts and be able to explain them in a clear and concise manner. Specific requirements for the tutorial include: - Written Documentation: The tutorial should be in written format, providing step-by-step explanations and instructions. - Practical Exercises: The freelancer should include practical exercises to help the readers apply the concepts they have learned. These exercises should be relevant to real-world scenarios and provide hands-on experience. - Clear and Concise Language: The tutorial s...

    €180 (Avg Bid)
    €180 Ortalama Teklif
    6 teklifler

    - Website Hosting: 1. Multiple hosting plans: Shared, VPS, Dedicated. 2. Scalable resources based on plan. 3. 99.9% uptime guarantee. 4. One-click CMS installations (WordPress, Joomla). 5. 24/7 customer support. - SSL Certificates: 1. Diverse SSL options: DV, OV, EV. 2. Strong encryption (256-bit). 3. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) support. 4. SSL installation assistance. 5. Auto-renewal options. - Domain Resell Web App: 1. Extensive domain TLD options. 2. White-label reseller platform. 3. Bulk domain registration and management. 4. Real-time domain availability checks. 5. Customizable pricing and discount structures. 6. Integration with popular payment gateways. 7. API for seamless integration with other platforms.

    €471 (Avg Bid)
    €471 Ortalama Teklif
    74 teklifler

    ...applications (not just this console app). Here is the purpose of the project. It is to support a security paper that talks about encrypting registry data that is saved and unencrypting it once it is retrieved. The pipeline is this: 1. Hook the registry 2. Watch reads and writes to keys that are in a list (I would suggest 3-4 keys in a list for testing) struct MonitorKey { HKEY key; TCHAR name[256]; }; struct MonitorKey mk[] = { {HKEY_LOCAL_MACHINE, L"ThisKeyName" }, {HKEY_CURRENT_USER, L"ThatKeyName" } }; 3. When an application writes to a key that is in the list, the data in encrypted and then written. 4. When an application reads from a key in the list, the data in unencrypted and then returned. 5. It will be convenient if there is a ...

    €154 (Avg Bid)
    €154 Ortalama Teklif
    5 teklifler

    ***PROJECT ONLY FOR EXPERIENCED DEVS*** Hello, I am looking for skilled programmers who can program LimeSDR Mini v2.2 . The goal is to make the LSM7002M pair with other LSM7002M and exchange data in the following ways: (I) Modulation – AM, FM, 4FSK (DMR) without AES (ii) AM, FM, 4FSK (DMR) with (AES 256 bits) (iii) Narrowband Waveform (25 kHz) for voice communication (iv) Data Rate atleast 1 Mbps for transfer of text messages,image transfer etc. (v) Interfacing the FPGA with external microcontroller (BL618/Equivalent). (vi) Making the FPGA getting into sleep mode during non operation and wake up on interupt from the external microcontroller. The FPGA will receive data from the external microcontroller which is linked with microphone,keypad & knob,camera.

    €323 (Avg Bid)
    €323 Ortalama Teklif
    5 teklifler

    ...succession or progress within these trophy categories? Lastly, the images don't necessarily need to look like a 'trophy' - feel free to try other imagery :) Your Role: As our illustrator, you'll be transforming concepts and emotions into visual trophies. These designs should resonate with our users, offering them a sense of achievement and encouragement. -------------- Requirements: size: 256 x 256 pixels dpi: 288 pixels/inch transparent background png format These are for App use - so please bear in mind that they cannot be too complex How to Apply: For the contest, please submit a minimum of 10 trophies (highlighted in yellow in the attached document) that you’d suggest we use in our app :) Should you win, you agree to deliver the rem...

    €251 (Avg Bid)
    Garantili
    €251
    79 girdi

    ...penetration points raised by information security for hybrid mobile applications using Expo & React-Native as front-end and back-end Web API is in C# the issues raised are for Android 1-Application uses hashing algorithms that are known to consist of possible collisions (such as SHA-1 and MD5). Security Recommendations: It is recommended to be using safer/stronger hashing alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configuration is known to be vulnerable to Padding Oracle at...

    €153 (Avg Bid)
    €153 Ortalama Teklif
    18 teklifler
    Trophy icon Pixel artwork Bitti left

    I am looking for a talented artist to create some awesome pixel artwork for me. Specifically, it needs to be in the retro style, and it will be used for a Bally Astrocade demo. The project must be designed with the utmost attention to detail. The resolution is 160x100 and can only use 4 colors. The target palette is 256 colors but it has a nice range so really any 4 colors is going to make a nice conversion. I've attached two example files that work well. I am not a good pixel artist, the Wizard example is the best I could do. I'd like Bally inspired images, which was sold from 1978 to 1983, so any period appropriate images are good as well. This isn't for a commercial product, I just want some really great images to use and can't make them on my own. You...

    €141 (Avg Bid)
    Özellikli Garantili
    €141
    275 girdi

    Hey you! Do you have more than 8 years as a Laravel Developer? Are you willing to do a supervised coding test? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. Job starts: ASAP.

    €8 / hr (Avg Bid)
    Gizlilik Anlaşması
    €8 / hr Ortalama Teklif
    44 teklifler

    I am looking for someone with solid experience in Python programming and end-to-end security/encryption solutions. I need an end-to-end encryption, preferably using AES 256 algorithm, for communication between IP phones. The person should also have the technical expertise to ensure that the IP phones meet my specific requirements. I would like the code to be delivered via email.

    €120 (Avg Bid)
    Acil
    €120 Ortalama Teklif
    4 teklifler

    ...EdgeConv layers with point-wise latent space dimensions (64, 64, 128, 256) and a max pooling layer (we do not use a batch normalization layer unlike the original DGCNN classification network), then we can obtain a 1024-dimensional feature vector. Other settings are the same (e.g., k = 20, leaky relu activation) Then this feature vector again passes through three fully-connected neural networks with dimension (512, 256, 2) with leaky relu activation function and linear output activation function; the latent space is two-dimensional. For the decoder model, we simply use a fully-connected neural network as the decoder. The two-dimensional vector on the latent space passes through three fully-connected neural networks with dimension (256, 512, 3×512) with relu act...

    €11 / hr (Avg Bid)
    €11 / hr Ortalama Teklif
    13 teklifler

    Project Description: I am looking for a skilled professional who can decrypt a sha 256 hex code into a sentence. The sentence I want to decrypt is long, consisting of 11 or more words. Although I have partial information related to the sentence, I would appreciate any additional clues or hints that can aid in the decryption process. I am seeking a freelancer who has expertise in cryptography and is familiar with sha 256 encryption. The ideal candidate should also have experience in decrypting complex codes and converting them into meaningful sentences. The expected turnaround time for this decryption project is more than 48 hours, as I understand that it may require extensive analysis and decoding. If you possess the necessary skills and experience, I invite you to sub...

    €58 (Avg Bid)
    €58 Ortalama Teklif
    5 teklifler

    Sorry, about disappearing before on this project I have ...setup I’m looking for somebody to shrink these pages and improve my security on this script as when I coded it I was just coming into php MySQL. I know my script still uses md5(hash in I know it’s bad so as security is a must I would like for somebody to upgrade it to sha-256 for better security. This script will have users signing up and an admin center. And will also take payments soon. Main pages is I’m looking for you to upgrade my script fix up the coding and add a new feature where members' timeout sends them to the login page.

    €441 (Avg Bid)
    €441 Ortalama Teklif
    109 teklifler

    ...SwiftUI URL Links for iOS Platform We are looking for a skilled developer to help us implement a hashing algorithm for our SwiftUI app on the iOS platform. The project requires the use of the SHA-256 hashing algorithm and will involve generating hashed URLs for our app's links. Requirements: - Use SHA-256 hashing algorithm to hash the URLs - Ensure compatibility with iOS platform - Implement specific requirements for the length and complexity of the hashed URLs Ideal Skills and Experience: - Proficiency in Swift and SwiftUI development - Experience with implementing hashing algorithms, particularly SHA-256 - Familiarity with iOS platform and app development best practices - Strong problem-solving skills and attention to detail If you have the skills and exp...

    €160 (Avg Bid)
    €160 Ortalama Teklif
    28 teklifler

    ...Create or replace type SCHEMA.ROUTE_RESPONSE as Object( ROUTING_QUEUE VARCHAR(256), PRIORITY VARCHAR(50), REDIRECT_NUMBER VARCHAR(15), TREATMENT VARCHAR(256), RULE_ID NUMBER(19,0), BUSINESS_HIERARCHY_TABLE NUMBER(19,0), ERROR_MESSAGE VARCHAR(256) ) CREATE OR REPLACE PROCEDURE SCHEMA.ROUTE_REQUEST (parameters IN ROUTING_KPV_TABLE, route_response OUT ROUTE_RESPONSE); I used SQLData mapping for the classes, but I am not sure how to nest this call, or if I am using the right structures to simulate how the SQL/PL is doing the same as follows: var v_output varchar2(100); var v_queue varchar2(256); var v_redirect_number(100); var v_treatment number; var v_rule_id number; var v_hierarchy number; var v_priority varchar2(256); DECLARE P SCHEMA.ROUTING_KPV...

    €123 (Avg Bid)
    €123 Ortalama Teklif
    4 teklifler
    oracle SQLData Bitti left

    ...or replace type SCHEMA.ROUTE_RESPONSE as Object( ROUTING_QUEUE VARCHAR(256), PRIORITY VARCHAR(50), REDIRECT_NUMBER VARCHAR(15), TREATMENT VARCHAR(256), RULE_ID NUMBER(19,0), BUSINESS_HIERARCHY_TABLE NUMBER(19,0), ERROR_MESSAGE VARCHAR(256) ) CREATE OR REPLACE PROCEDURE SCHEMA.ROUTE_REQUEST (parameters IN ROUTING_KPV_TABLE, route_response OUT ROUTE_RESPONSE); I used SQLData mapping for the classes, but I am not sure how to nest this call, or if I am using the right structures to simulate how the SQL/PL is doing the same as follows: var v_output varchar2(100); var v_queue varchar2(256); var v_redirect_number(100); var v_treatment number; var v_rule_id number; var v_hierarchy number; var v_priority varchar2(256); DECLARE P SCHEMA.ROUTING_K...

    €189 (Avg Bid)
    Gizlilik Anlaşması
    €189 Ortalama Teklif
    3 teklifler

    I am looking for an Ubuntu - MariaDB - Wordpress Encryption Expert to help me with the implementation of AES-256 encryption for my database. Here are the specific requirements for the project: Specific Encryption Method: - AES-256 encryption method Encryption Implementation: - I need assistance with the implementation of encryption for my database Components for Encryption: - Encryption should be applied to the database only Ideal Skills and Experience: - Strong knowledge and experience in Ubuntu, MariaDB, and Wordpress - Expertise in AES-256 encryption method - Experience in implementing encryption for databases - Familiarity with database security and encryption best practices If you have the necessary skills and experience, please provide your proposal for this...

    €167 (Avg Bid)
    €167 Ortalama Teklif
    13 teklifler

    I am looking for a talented graphic designer to create a wall graphic for a marketing event or campaign announcement. The size of the wall graphic needed is 950 mm x 2340 mm. Main Message/Theme: The wall graphic should convey the event or campaign announcement. Design Requirements: While I have a general idea of the design and colors, I need help with the specifics. I am open to suggestions and would like the designer to incorporate their creative expertise into the project. Ideal Skills and Experience: - Strong graphic design skills - Experience creating marketing materials - Ability to effectively convey a message through visual design - Knowledge of color theory and how to create eye-catching designs - Excellent attention to detail - Ability to work collaboratively and inco...

    €9 (Avg Bid)
    €9 Ortalama Teklif
    16 teklifler