Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,000 edonkey hash iş bulundu, ücretlendirmeleri EUR

    ...botuna ihtiyacım var. 3 Farklı dilde yapılacak fakat hepsi birbirine veri gönderecek. PHP + C# + PYTHON Neden PHP ? PHP'de üye hesabına giriş yaptığında botların son durumunu görüntüleyebilecek. 3 Farklı paket satışı olacak bu paketlerden hangisini istiyorsa satın alabilecek. C# Çalıştırabilmek için site üzerinden alınan paket HASH KEY ( random key ) vericek. Bu key'i c# üzerinde aktifleştirmesin durumunda kullanabilecek. Neden .NET? Üye satın aldığı paket'e göre HASH KEY'ini aktif ettiğinde 5 - 10 veya 20 bot için COİN seçicek , seçtiği coin için ALIŞ ve SATIŞ yüzdesini yazıcak örneğin : %20 Kar'da sat - %10 Zarar'da sat gibi. Program üzeri...

    €1038 (Avg Bid)
    €1038 Ortalama Teklif
    8 teklifler

    Benim belirledigim bir Bitcoin Pool da worker i otomatik tanımlayacak şekilde CPU veya gpu üzerinden Hash edecek çok kişinin kullanacağı Windows masaüstü ve android uygulama kaynak kodu istiyorum. Mümkünse c# tabanlı, opengl ve webgl üzerinden çalışacak bir uygulama.

    €9 - €28
    €9 - €28
    0 teklifler

    ...token vardır. Contract sayfası -Contract sayfası token oluşturmak için başlatılan ethereum adresidir. -Aslında ethereum adresinden farkı yoktur fakat bir iki tane ufak farkları vardır. ***bitcoin veya ethereum adresindeki her işlemi bir hash kodu vardır. Arama çubuğuna bitcoin , ethereum veya hash kodu yazıldığında istenilen bilgileri önümüze çıkarmasını istiyoruz. ***Arama çubuğuna yazılan adres veye hash kodu işlemini bulsun diye. ***Bitcoin veya ethereum değişken fiayata sahip olduğu için. işlem yapıldığı andaki fiyatını ve şuan ki fiyatının gösterilmesini istiyoruz. Verdiğimiz sitelerde bu mevcut. ***kullanıcı sayfası istiyoruz. herhangi bir koinin adresini takip etmek. isteğe göre koin gel...

    €532 (Avg Bid)
    €532 Ortalama Teklif
    4 teklifler

    netbeans veya eclipse ortamında java dili ile hash table oluşturma. Bu hash yapısı ingilizce yazılmış bir text i tarayacak. Taranan her kelime text içindeki konumu ve text içinde kaç kez yazıldığı bilgisi tutulacak. Kullanıcıya istenilen kelime sorulacak ve text içinde olup olmadığı hangi poziyonda olduğu ve text içinde kaç kez tekrar ettiği ekrana bastırılacak.

    €9 - €28
    Acil
    €9 - €28
    0 teklifler

    100 tane anahtar değerini rastgele üreten ve bu değerleri boyutu 100 olan hash tablosuna yerleştiren programı yazınız. Hashbölme ve hashcarpma olarak iki metod yaz. 1-Bölme metodu anahtar ve modül değerini parametre olarak Alıp hash Değeri döndürecek. 2-çarpma metodu anahtar ve alır sayısını parametre olarak Alıp hash Değeri döndürecek. Çakışma Çözümü için Doğrusal sınama ve Dörtlü sınama metodları Kullanılacak.

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    1 teklifler
    java ödevi Bitti left

    100 tane anahtar değerini rastgele üreten ve bu değerleri boyutu 100 olan hash tablosuna yerleştiren programı yazınız. Hashbölme ve hashcarpma olarak iki metod yaz. 1-Bölme metodu anahtar ve modül değerini parametre olarak Alıp hash Değeri döndürecek. 2-çarpma metodu anahtar ve alır sayısını parametre olarak Alıp hash Değeri döndürecek. Çakışma Çözümü için Doğrusal sınama ve Dörtlü sınama metodları Kullanılacak.

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    1 teklifler

    C dilinde algoritma ödevi; C dilinin veri yapıları konularını içermektedir Ödevin çözümü için yiginlar, kuyruklar, tek sırali bağlı listeler, dairesel bağlı listeler, hash tabloları konularını iyi bilmek gerekir

    €27 (Avg Bid)
    €27 Ortalama Teklif
    5 teklifler

    C dilinde algoritma ödevi; C dilinin veri yapıları konularını içermektedir Ödevin çözümü için yiginlar, kuyruklar, tek sırali bağlı listeler, dairesel bağlı listeler, hash tabloları konularını iyi bilmek gerekir

    €28 (Avg Bid)
    €28 Ortalama Teklif
    2 teklifler

    ...çağırılacaktır. Aynı kişiye ait resimlerin gelmesi ılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Image özellikleri herbir image için min 32*32 =1024 pix şeklinde veri tabanında tutulacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Java, C# , Sqlserver, Oracle ,Cuda, Open GL,vs (yazılımcı kendi de seçebilir).Gerekli Beceriler: C# P...

    €359 (Avg Bid)
    €359 Ortalama Teklif
    1 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşt...çağırılacaktır. Aynı kişiye ait resimlerin gelmesi ılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Image özellikleri herbir image için min 32*32 =1024 pix şeklinde veri tabanında tutulacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Java, C# , Sqlserver, Oracle ,Cuda, Open GL,vs (ya...

    €5645 (Avg Bid)
    €5645 Ortalama Teklif
    5 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €232 - €696
    €232 - €696
    0 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritaban?ndan 2-3 saniye içersinde sonucu döndüren bir yaz?l?m yaz?lacakt? önemli olan performans esas al?nacakt?r.rnrnKullan?labilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir ?ekilde indexleme , Binary tree yap?s? vsrnrnKullan?labilecek Teknolojiler: Matlab, Cuda, Open GL,vs

    €648 (Avg Bid)
    €648 Ortalama Teklif
    1 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €605 (Avg Bid)
    €605 Ortalama Teklif
    5 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €515 (Avg Bid)
    €515 Ortalama Teklif
    1 teklifler
    Hash Tables Bitti left

    Konu: Hash tablolar Problem: Turkce kelimeler sozlugu uzerinde hash tablosu performans degerlendirmesi Tanim: Size icinde binlerce Turkce sozcugun gectigi bir kelime listesi verilecektir. Bu kelime listesini hash tablolar tabanli bir sozluge girerek catisma sayilarini bulmaniz istenmektedir. Oncelikle linear probing catsma cozme kuralina gore calisan hash tablolar tabanli bir Dictionary ADT gerceklestirimi yapmaniz gerekmektedir. 17 farkli hash fonksiyonu icin toplam catisma ve maximum catisma sayilarini raporlamaniz beklenmektedir. 17 farkli hash fonksiyonu 0 dan 16 ya kadar cyclic shift hash kodlar kullanlarak elde edilecektir. Kisaca, sizden istenen ders kitabinda sayfa 52...

    €9 - €28
    Özellikli
    €9 - €28
    0 teklifler

    Para este proyecto, estoy buscando a alguien con experiencia en integr...opción de pago "Con tarjeta" y es enviado al API de mercado pago. Los parámetros a configurar son: Parametro de evento: Fecha del evento Nombre del evento URL de origen del evento Origen de acción Identificador del evento Número de artículos Identificador del pedido Parámetro de configuración de cliente: Apellido Agente de usuario del cliente - No cifrar con hash Correo electrónico Nombre Dirección IP de cliente - No cifrar con hash Ciudad País Teléfono Consideraciones generales - El servidor de producción es godaddy - Se entregará fuentes de php y de base de datos mínima de mysql. Caso de Pru...

    €416 (Avg Bid)
    €416 Ortalama Teklif
    24 teklifler

    I'm looking for an expert C# developer to create a software that can hash CDs for the purpose of file integrity. The primary use of this software will be to compare the hashed data with other CDs. Key Points: - The software should be designed to hash CDs at a speed that outperforms the hashing process in PowerShell, ensuring efficiency and time-saving - The primary focus of the hashing is to maintain the integrity of files on the CD, so I need a developer who understands the importance of this and can ensure the software is reliable in this regard - The software should be user-friendly, with a preference towards a fully automated process to make it as easy as possible for end-users. I'm looking for a skilled C# developer who has experience in creating high-speed ...

    €3704 (Avg Bid)
    €3704 Ortalama Teklif
    26 teklifler

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    €23 (Avg Bid)
    €23 Ortalama Teklif
    2 teklifler

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in...

    €43 (Avg Bid)
    €43 Ortalama Teklif
    18 teklifler

    I have a C# co...that's currently designed for file manipulation but I really need it to work like Powershell for data processing. - Task: I'm specifically working with text files and need to perform a hashing operation on them. - The end goal: The code needs to be able to read through the text files and hash them in a way that's similar to what one can do with Powershell. The ideal freelancer for this job should have: - Proficiency in C# programming, especially in the context of data processing. - A good understanding of hash functions and how to implement them in a C# code. - Familiarity with text file handling in C# is a plus. I'm looking for an efficient and smooth solution that's able to process large text files quickly. Your experience in...

    €36 (Avg Bid)
    €36 Ortalama Teklif
    36 teklifler

    ...The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience in this area, your input would be greatly appreciated. The video files are about 1.3 gigs...

    €84 (Avg Bid)
    €84 Ortalama Teklif
    13 teklifler

    I'm looking for a skilled developer to create a script that will pass hash value from the parent page to an iframe, and use the hash value as part of the iframe's URL. Key Requirements: - Extract the hash value from the parent page's URL. - Pass the extracted hash value into the iframe. - Utilize the hash value as part of the iframe's URL. Ideal Skills: - Proficiency in JavaScript, particularly working with iframes and URL manipulation. - Strong understanding of web security principles. The successful candidate for this project will have a keen eye for detail and the ability to create a robust, secure solution that meets the specified requirements.

    €60 (Avg Bid)
    €60 Ortalama Teklif
    27 teklifler

    ...database. Here’s what the project involves: - Functionality: The add-on must copy user registration data from Xenforo into a separate database (for a start a simple sqlite3 file database). The password must be hashed and salted, similar to MyBB standards. ( this requires us to do it on every registration attempt because we only have the plaintext password at that moment and can only create a MyBB hash and salt at that time. Must Have: Xenforo Add-on dev env. I don't want to have to give you my license key for your xenforo development Ideal skills: - Xenforo knowledge: It's essential for you to have prior experience working with Xenforo software to ensure that the add-on can be comfortably integrated into our current forum. - Database management and replicati...

    €305 (Avg Bid)
    Gizlilik Anlaşması
    €305 Ortalama Teklif
    5 teklifler

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use the discount code &quo...

    €92 (Avg Bid)
    €92 Ortalama Teklif
    8 teklifler

    I need a tool using Microsoft Powershell that can fetch security patches and patch release information from the internet for various OS levels and applications using vendor websites. The tool should be able to download the patches and store them loca...severity level. Key requirements: - Fetching security patches for various OS levels and applications using vendor websites. - Downloading patches for specific applications only. - Storing the downloaded patches locally. - Collect patch information patch source, OS type, software impacted, software name, software description and the patch name and severity level - collect security hash from website and compare hash to ensure patch was not tampered with during download and output all of this data within the CSV file - export All...

    €481 (Avg Bid)
    €481 Ortalama Teklif
    34 teklifler

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    €38 (Avg Bid)
    €38 Ortalama Teklif
    7 teklifler

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    €125 (Avg Bid)
    €125 Ortalama Teklif
    34 teklifler

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    €329 (Avg Bid)
    €329 Ortalama Teklif
    13 teklifler

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , login.h...Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attacks.

    €23 (Avg Bid)
    €23 Ortalama Teklif
    31 teklifler

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    €22 / hr (Avg Bid)
    €22 / hr Ortalama Teklif
    89 teklifler

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €105 (Avg Bid)
    €105 Ortalama Teklif
    25 teklifler

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €19 / hr (Avg Bid)
    €19 / hr Ortalama Teklif
    17 teklifler

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    €10 (Avg Bid)
    €10 Ortalama Teklif
    3 teklifler

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    €27 (Avg Bid)
    €27 Ortalama Teklif
    77 teklifler

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    €902 (Avg Bid)
    €902 Ortalama Teklif
    59 teklifler

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €193 (Avg Bid)
    €193 Ortalama Teklif
    12 teklifler

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    €328 (Avg Bid)
    €328 Ortalama Teklif
    19 teklifler

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    €114 (Avg Bid)
    €114 Ortalama Teklif
    53 teklifler

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    €135 (Avg Bid)
    €135 Ortalama Teklif
    18 teklifler

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    €974 (Avg Bid)
    €974 Ortalama Teklif
    137 teklifler

    ...stworzony. oto opis Developera który stworzył ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate co...

    €102 (Avg Bid)
    €102 Ortalama Teklif
    56 teklifler

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Ortalama Teklif
    26 teklifler

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    €12 / hr (Avg Bid)
    €12 / hr Ortalama Teklif
    7 teklifler

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    €644 (Avg Bid)
    €644 Ortalama Teklif
    16 teklifler

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    €134 (Avg Bid)
    €134 Ortalama Teklif
    13 teklifler

    ...receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication should support standard authentication. SMTP Server and POP3 Server and account settings should be configurable. Email Subject should be configurable (but should also have a key to compute the cycle time in the otel receiver, like cyclekey=some number or hash ). Configuration should be done via yaml (in accordance to the opentelemetry standard) Skills and experiences required for this job: - Experience with - Experience with golang - Proficiency in SMTP and POP3 protocol - Ability to develop configurable systems - skills in data metrics and logs This project will require you to be detail-oriented, reliable, and have exceptiona...

    €101 (Avg Bid)
    €101 Ortalama Teklif
    7 teklifler

    Sitio para Minería de Ctripto monedas

    €19 (Avg Bid)
    €19 Ortalama Teklif
    9 teklifler

    .../server-ip, /settings, /debug, /log y /roster. ? Página de estado de lobbies: Mostrará información sobre lobbies activos, conexiones actuales y datos de los jugadores en línea. Estos datos se obtendrán de los endpoints /stats, /users/online, /profiles y /maxusers. ? Página de usuarios: Permite el registro de nuevos usuarios, incluyendo campos como serial, username, password, nounce y hash. Esto se logrará consumiendo el endpoint ubicado en :8190/register. Se espera un CRUD completo para gestionar los usuarios. Además, se integrarán acciones relativas a los usuarios, tales como visualizar usuarios prohibidos, roster, eliminar usuarios, bloquear usuarios, y más. Estas acciones se llevarán a...

    €42 (Avg Bid)
    €42 Ortalama Teklif
    4 teklifler