i need to spy one cellphone number...i only have phone number, and can not physical touch to this phone to install spy apps on that phone. That mean the freelancer have to use Telecom SMS interception, ss7, sigtran skill to spy it...
Looking for a LBS provider who can immediately offer us a advanced VLR lookup service that will return the LAC code and the CID of a MSISDN using a HTTP API. (You have to do perform a SS7 MAP Anytime interrogation query to get the LAC and CID from the VLR.) Price per query up to $[login to view URL] than 50 queries per month required($50x150=$7,500 monthly)
I need a logo for a solar cell ceiling company This is a company that will supply solar cell roof tiles to the private market. Company name: "EnergiTak" (Energy roof. Please only use the norwegian name) Color options: Green, yellow and blue. Inspiration photos will be uploaded. Also take a look at this link for inspiration:
...AMOUNTS OR IF YOU DO NOT HAVE EXPERIENCE. YOU ARE JUST WASTING TIME. A PHP Website that has: - Fully Dynamic - Fully Responsive $$$$$$$ --- CLIENT LOGIN MUST HAVE A 128 bit encryption ---- - Client login, where the client can see his PERSONAL ACCOUNT DETAILS and he's/her's Purchased Items. The client account will have: Purchase Items, Sold Items, Account
...submit after the buyer confirmed the code in the Gateway Page. There are 4 - 5 differents banks to consider for doing the programmation/automation. After the transfer is made (instantly) the system in the background checks if the value realy is transferred by looking in the bank statement for the reference code, value etc, then system sends payment
We are creating app for encrypted communication. We will route the messages wITH PFS encryption. Need server admin expert to HIDE server location from hackers Secure and add more security Train local sustem admin. Example : google phantom secure (no long existing) but had only uncrackable phoned and couldnt locate servers.
Simple app, opening screen, follow up, depending on what is entered on the opening screen with a selection being placed in the Gallary from a pre-set set of images, or alternatively, a created set (pictures you take yourself).
...credit card payments by connecting to a mobile device's audio jack. Square's original reader consisted of a simple read head directly wired to a 3.5 mm audio jack, strong encryption on its devices, including SSL and PGP. Its cryptographic keys are at least 2,048 bits in length. Neither card numbers, nor magnetic stripe data, nor security codes
We have a spreadsheet that needs to be formatted. All of the data is in one cell - we need it broken out into multiple columns (Company Name, Website, Address etc.. ) We need this completed ASAP so please only bid if you have time today to complete.
...reason the WEB-REGISTRATION + WEB-LOGIN and entire web-development must be encrypted AES-256. The database where all data is stored must be encrypted with SHA-256 hashing and encryption. The web-development must be an online ACCOUNT MANAGEMENT PHP or WP WEB-PAGE which must register and manage a user. When registered user must be able to login with their
...industry practices and standards. As determined necessary by The Freelancer, application components will be tested for improper configuration, session tracking weaknesses, encryption implementation and strength, input validation, flaws in server-side executables, and sensitive or unnecessary information within HTML content. The Freelancer will perform
GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network
There is a file in my server which is encrypted using IonCube encryption, is it possible to decrypt this file? if so can you make this?
...development and experience in NodeJS, GIT repositories, open source tools and technologies + Experience in development on one of the Blockchain platforms like Hyperledger, Ethereum, R3 Corda, Quorum. + Basic understanding of cryptography, symmetric/asymmetric (public/private key), hash functions, encryption/signatures + Application development using Blockchain