Executable encryption işler
...delimited text/ASCII format so that they can be loaded into a database on a Windows machine, in a Windows Server environment. The PDF documents are lists of data (I have included an example which is explained below). The PDF files all have essentially the same format, with very small variations. The final solution will be called from a management system (spawning a DOS box) and run either via an executable or a batch file, for example: C:> or C:> The file is the PDF that needs to be scanned and converted into text, and the results of which are then sent to the file. Included in this project is a 3 page test PDF document which contains test data using the format I need interpreted. The second page is slightly crooked
...job would have experience in using both nginx and apache servers, as nginx needs to handle RTMP and apache will handle the site itself. The main purpose of the reverse proxy site will be to provide streaming capabilities for a video platform, similar to YouTube. Therefore, the candidate should have experience in setting up video streaming sites and be familiar with the necessary security and encryption protocols. In terms of server setup, my current setup is a local VM. However, the candidate should also have experience with dedicated servers, VPS, and cloud hosting, as this may be necessary in the future. Overall, I am looking for someone who is knowledgeable in both nginx and apache servers, has experience in setting up video streaming sites, and can provide expert guidan...
Data Encryption Project I am looking for a freelancer who can help me with an advanced data encryption project. The following are my project requirements: - Advanced Encryption: The encryption level required for the project is advanced. - Asymmetric Encryption: I prefer asymmetric encryption method or algorithm. - Data Storage: The primary purpose of the encrypted data is for data storage. Ideal Skills and Experience: - Experience in advanced encryption techniques and methodologies. - Proficient in asymmetric encryption algorithms such as RSA, DSA, or ECC. - Familiarity with data storage and database systems. - Knowledge of encryption standards and protocols. If you have the skills and experience required for this project,...
I am looking for a skilled freelancer who can improve the security on my intranet by encrypting my files (pdf, images) to a 256-bit level. Currently, the level of security on my intranet is basic, a...the security on my intranet by encrypting my files (pdf, images) to a 256-bit level. Currently, the level of security on my intranet is basic, and I am looking to increase it to ensure that my files are protected. Also encrypt a few database fields. Ideal skills and experience for this project include: - Experience in network and data security - Proficiency in encryption methods and techniques - Knowledge of media file encryption - Familiarity with intranet security protocols If you have the skills and experience necessary to complete this project, please reach out to me wi...
...platforms commonly used in embedded systems. Responsibilities: Study the project requirements and provide technical recommendations for the integration process. Develop firmware and drivers for the NRF52 microcontroller to establish communication with the ATEcc608A Crypto Chip. Implement secure storage mechanisms for cryptographic keys and certificates on the Crypto Chip. Ensure proper data encryption, decryption, and authentication protocols between the NRF52 and ATEcc608A. Conduct thorough testing and debugging to ensure the integration is robust, efficient, and secure. If you possess the necessary skills and expertise in NRF52 and ATEcc608A integration, we would love to hear from you. Please provide examples of relevant past projects and highlight your relevant experience in ...
I have a panel dataset (year, state, unemployment rates, jobs vacancy rates) and I need to perform some econometric regressions to replicate a research paper analysis (see attached - only need to replicate Table 2, 3 and 4). The job doesn't sound too time-consuming. This job will need to be done on R and the output will be an R code file (fully executable) and a one-page summary.
I have a client who has a .Net desktop app developed in 2008. The app fires off email to customers via the configured email provider settings. (I.e. username or mail app code/password, imap and smtp settings).The app seems to be coded to use TLS1.0 only. As of 4/17/2023, the email provider (Comcast in this case) will only allow TLS1.2 (or higher) encryption. I might not have access to the source code. Can you help? Also, the same app is currently stand-alone using SQL compact version. It was connecting to a shared SQL database server at one time. Can you help with getting the app configured to point to a shared database server and database?
I am looking for a developer who can create a digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature...digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature solutions - Familiarity with authentication protocols and encryption te...
...Information Protection for Office 365 to help me with setting up classifications and labeling for my organization. I have already set up some information protection policies, but I need help with this specific aspect. The ideal candidate should have experience with: - Microsoft Information Protection for Office 365 - Setting up classifications and labeling - Knowledge of data loss prevention and encryption and rights management would be a plus. The result of the task should be an example in C# showing : * Labeling a document * Upgrading the classification of a document * Downgrading the classification of a document. The example should be programmed in C# using and CAN NOT
Hi, looking for someone with a tech background that can build out a pitch deck. High level, this is an encryption play. I would like a one slide summary based on a patent pending application along with a 10-12 deck. Thanks!
I'm looking to develop a property investment software system that will run as a Desktop Application. The system will require some data collection from various public online sources data filtering and basic encryption of data, to ensure security of data. The main purpose of this system is to provide users with the ability to analyze and filter their property investment data. It should be equipped with features to allow users to filter their data according to different criteria, such as property type, location or financial performance, to enable them to make informed investment decisions. The system should include automated alert features to help users stay updated on their investments. The program should be easy to use and powerful enough to handle large databases without exper...
I am looking for a skilled software developer to create a password protection software for my internal Hard Drive. The software should be compatible with windows and Linux operating system and can be either open-source or proprietary. However, I do require military-grade encryption to ensure maximum security for my data. The ideal candidate should have experience in developing software with high-level encryption capabilities.
I need help resolving an issue where my LetsEncrypt SSL certificate is not trusted on iOS iPhones. The specific error message I am receiving is "Not Trusted". Ideal skills and experience: - Experience with SSL certificates and encryption - Familiarity with iOS devices and their security protocols - Knowledge of LetsEncrypt and its implementation on various devices - Ability to troubleshoot and resolve certificate errors - Strong communication skills to explain the solution to me in a clear and concise manner.
...Users should be able to chat with their matches in-app, with the option to send pictures and videos. User Verification: It's important to have some form of user verification to ensure that all users are real and not bots. This could include phone number verification or email verification. Privacy and Security: The app should prioritize user privacy and security, with measures such as end-to-end encryption for messages and profile settings that allow users to control who sees their information. Location-Based Matching: The app could include location-based matching to suggest matches who are nearby. Premium Features: Consider offering premium features for users who want to get more out of the app, such as the ability to see who has viewed their profile or the option to und...
...core_math)ont bien fait et les formules sont come dans les pdf fourni et fixer les bugs si il y a(cela pour demain matin) Pour ça vous aller ouvert le projet en eclips (comme dans les photo)etpuis vous aller faire run pour tout les test de core_math (comme dans les photos)mais même si il y a pas des erreurs dans les autrea TODO il faut vérifier de la formule utilisé créer un script .cmd pouc chaque executable que je dois lancer il faut au moins les executables suivants: kmeans gui 2d kemeans plus gui 2d kmeans elbow gui 2d Pour cette partie (GUI) il faut utiliser les fichiers de couleur jaune jaune dans le photo(cela pour ce mercredi) dans les 3 cas, il sera sans doute nécessire de faire plusieurs scripts, qui joue sur différent...
I want an excel file with two columns and 1500 rows The first column is an explicit text consisting of one, two or three words The second column is the ciphertext of the first column using the Blowfish encryption algorithm Note / I can give you a website that you use to encrypt the ciphertext Duration of work / one or two days only
I am looking for a Python developer who can create a Streamlit Realtime Chat, Group Chat Application that will be used for buying and selling purposes. The most important feature for this application will be buyer to able to chat with one and/or multiple suppliers at one time, group chat, one to one chat, file sharing, with message encryption as a secondary feature. I anticipate that more than 50 users will be using the chat application at one time, so experience in developing scalable applications will be ideal. User authentication will also be necessary to ensure the security of the chat. My main application is running on python, streamlit and mongo db database. The chat application needs to integrate with whatsapp also.
My current project involves Mallox Ransomware decryption and I'm in need of experienced help. This project requires intense security knowledge and the use of advanced encryption methods - AES, Triple DES, and RSA. I believe the project to be of a hard difficulty level and am not specifying a language preference. If you think you're up for the challenge and want to join the fight against cybercrime, I'd love for you to help me out on this project.
...panels of different sizes (draft design available) that contain text, image, like/dislike buttons (with like/unlike counters). Each panel has objects with price and "expiry date": it stays empty until the expiry date. (Auction principle). A slim banner has the login/register buttons, switching to username welcome after login (the login/registration window appears on a popup window). Credentials encryption in the database after registration. Admin account is needed to operate (via website or outside, separate admin panel). Payment integrations with Stripe basic functions like: pay, confirm, hold payment, release money back... ...
Looking for a cyber security specialist to complete the following for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetratio...for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetration testing 6. Threat modelling 7. Vulnerability management 8. Firewall - configuration base management (in future) 9. Summary Report of findings with gaps identified and details of how they were closed 10. Encryption Protocols (Preferably the candidate should be located in Pune so we can potentially absorb into a permanent role at a lat...
...Expired Domains Bulk Domain Rating Checker Index Pages Checker Meta Tags Tools Create new meta tags or analyze the existing ones to get an in-depth analysis of your meta tags and web pages. Meta Tags Analyzer Meta Tag Generator Password Management Tools Create a secure password, check password strength or encrypt a password; all tools related to password management are readily available. Password Encryption Utility Password Strength Checker Password Generator Online PDF Tools All the tools you need to work with PDF files, at your fingertips. Merge, rotate, unlock, lock, watermark and convert PDFs with just a few clicks. Merge PDF Rotate PDF Unlock PDF Lock PDF Watermark PDF To Word Word To PDF PDF To JPG JPG To PDF PowerPoint To PDF Compress PDF Excel To PDF Split PDF Compress...
Lütfen detayları görmek için Kaydolun ya da Giriş Yapın.
I'm looking to create a custom form that will organize and gather information from its users. I need the form to be able to collect contact details, and background health information. The user data I receive needs to be sent in the format of an email notification. Lastly, the form needs to be backed up with a very secure SSL encryption in order to keep the data safe from any malicious intent. -- All of this can be done with software readily available online. What I need additionally is to program a given statement back to the form receiver based on the answers given. --
Function seal: Declaration: bool seal(const char * inFile, const char * outFile, const char * publicKeyFile, const char * symmetricCipher) Description: The function accepts four parameters, the first three parameters define the names of files. In the file inFile, you will find binary data intended for encryption, outFile is the output file where you save all the necessary data for decryption, and publicKeyFile is the public key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetr...
...commercial Purposes. List of features: File transfer Convert Audio to Text Voice & Text Message One to One Messaging Alerts & Notification Sending and receiving messages, photos, videos, and files of any type along with intergration Creating groups with up to 200,000 members Admin can search through any keywords and it will show all chats containing those key words Secret chats with end-to-end encryption Cloud-based storage, allowing for easy access to your messages and media from any device Automatic deletion of messages with a timer Self-destructing messages Two-factor authentication Media compression for faster sending Multi-platform support for iOS, Android, Windows, Mac, and Linux Feature like Copy, Forward,Reply, Edit,Pin,Select,Save As, Show in Folder Scheduled ...
I am in need of a payment gateway for my website, QueR. The payment methods I require to be integrated include Credit Card. Additionally, I need recurring payment functionality and specific security features in place, including SSL/TLS Encryption and Fraud Detection. For this project, I am looking for a freelancer who has experience in payment gateway integration and is skilled in web security. Ideal skills and experience include: - Payment gateway integration - Web security - Knowledge of SSL/TLS Encryption and Fraud Detection - Ability to implement recurring payment functionality Please provide a portfolio or relevant experience in your proposal. Thank you.
I am seeking an experienced ethical hacker with advanced skills in the field to assist me in learning about wireless security. The ideal candidate should be able to create video lessons that cover the following topics: - Wireless network vulnerabilities - WEP, WPA, and WPA2 encryption - Wireless network penetration testing - Wireless intrusion detection and prevention The video lessons should be comprehensive, covering all the necessary technical details and providing practical examples. The ideal candidate should have experience in creating educational content, and be able to deliver the material in an engaging and easy-to-understand manner. Skills and experience required: - Advanced expertise in ethical hacking - Strong knowledge of wireless security - Experience in creating e...
Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Developers ...
Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Developers ...
...Office documents such as Word, Excel, and PowerPoint. The information protection should include encryption, access control, and authentication. Remove information protection from Office documents: The tool should be able to remove information protection from Office documents that have been previously protected using the tool. This will allow users with the appropriate access credentials to access the document's content. Update information protection settings for Office documents: The tool should be able to update the information protection settings for Office documents that have been previously protected using the tool. This will allow administrators to modify the access control rules or encryption algorithm used to protect the document. The tool should be develope...
One needs to divide into layers: Application package: Main method DB package: access to the database + SQL commands Logic package: table calculations UI package: console outputs -The program should have sophisticated error handling; program crashes should not occur. -A DB export file. -The JDK 19.x is mandatory. -An executable JAR file. -An executable JAR file. Detailed concept: -Table of contents -Used hardware and software -ER model. -Program flowchart for navigation. -Storyboard for menus. -A program user documentation. -Inline documentation in Java comments. I will give you information about the 4 searched information from the database
Looking for an experienced programmer who can extract a program from a TI controller. The specific model of the controller is not specified. The programming language used to create the program is also not specified. We require the extracted program to be in either text, binary or executable file format. Ideal skills for this job include: - Knowledge of TI controllers and their programming languages - Experience in program extraction - Familiarity with text, binary and executable file formats.
I need a coding expert to encrypt my files with advanced encryption. The files that need to be encrypted include text, image, and video files. The ideal candidate should have experience in PHP. The deadline for completing the encryption process is flexible.
I am looking for a skilled developer to help me encrypt my chat a...skilled developer to help me encrypt my chat app database using MySQL. The ideal candidate should have experience with encryption methods, particularly AES, and be able to implement a 256-bit encryption strength. Once you open the app the db has to be decrypted in a safe manner and once the app is closed the db has to encrypted again. The project requires the following skills and experience: - Familiarity with MySQL database - Proficiency in AES encryption method - Experience implementing 256-bit encryption strength The main objective of this project is to ensure the security of the chat app database, and the ideal candidate should be able to provide a seamless encryption process with...
...Range Wireless Signals 2. Support high-speed video data - live video streaming and recording over the wireless network 3. Port to connect to internet or other network with or without internet connection 4. Ability to scan available channels programmatically with signal strength 5. Ability to switch channel programmatically based on signal strength from the channel 6. Other security features - Encryption and FIPS 7. Supports port forwarding Deliverables: 1. We are not looking to build a brand new router. Recommend an existing router in the market from any of the major vendors. 2. Ensure the router supports all the above features 3. Deliver .NET C# source code to scan all channels with strength and switch to a particular channel 4. Deliver .NET C# source code to find the streng...
...the status of leads in real-time, while lead scoring will enable them to prioritize leads based on their potential value. Lead routing will ensure that leads are distributed to the most appropriate buyers based on specific criteria, such as geographic location, industry, and company size. To ensure the security of sensitive data, the system will incorporate robust security measures, including encryption and access controls. The system will also be scalable, allowing for the addition of new features and functionality as needed. Overall, the Lead Distribution System development project will provide marketing agencies and lead generation companies with a powerful tool for managing and distributing leads to potential buyers, helping to streamline the lead generation and sales proce...
...can either purchase a domain name or use a subdomain of an existing domain. Configure DNS settings: Once you have a domain name, you will need to configure the DNS (Domain Name System) settings for your domain to point to your server's IP address. This involves creating a DNS A record for your domain that maps to your server's IP address. Set up SSL/TLS encryption: To secure your email communication, you should enable SSL/TLS encryption. You can obtain a free SSL/TLS certificate from Let's Encrypt or purchase one from a certificate authority. Configure firewall settings: You will need to configure your server's firewall to allow incoming and outgoing traffic on the SMTP port (usually port 25). Configure SMTP settings: Finally, you will need to confi...
The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.
Looking for a skilled developer who can customize EspoCRM to meet my specific needs. I require many customizable features such as adding new fields and modules, customizing existing modules, and integrating with other software. Specifically, I need encryption and decryption features to ensure the security of my data. The timeline for completion is flexible. The ideal candidate should have experience in EspoCRM customization, and be proficient in custom fields and modules, workflow automation, and user interface design.
Hi Danil K., why did the task close and it showed something else. Can you check?? The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.
Lütfen detayları görmek için Kaydolun ya da Giriş Yapın.
...This would make it easier for them to arrange for the return of the car. 5. Volunteer network: The app would have a feature that would allow people to sign up as volunteers. These volunteers could help in verifying ownership, coordinating the return of the car, and providing support to the owners. 6. Security features: The app would have security features such as two-factor authentication and encryption to ensure the safety and privacy of users' data. 7. User ratings: The app would allow users to rate each other based on their experiences. This would help build trust and encourage responsible behavior. Monetization: The app could be monetized through ads or by charging a small fee for some premium features, such as faster verification or priority messaging. Conclusion: A mob...
...compiled to a WASM module (client) and binary executable (server). 3 - 5 applicants will be chosen to complete the project in parallel. All code will be released under a GLP-2.0 license. REQUIRED EXPERIENCE: Motivation is more important than experience. You are allowed to learn on the job and take the full time allotted. PROJECT DESCRIPTION: Layer 8 is to be a collection of protocols that jointly implement VPN functionality running transparently in the browser. The ultimate goal is to dissociate a client’s true identity from their content choices through the Layer 8 system. The Layer 8 system is actually a suite of protocols being developed one at a time -- this is the first of those protocols. SPECIFIC TASK: Implement a symmetric encryption protocol across an HTT...
I am looking for a skilled developer who can create a zero-knowledge proof smart contract using Solidity. The purpose of this contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity pro...contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity programming language - Experience with zero-knowledge proof technology - Knowledge of blockchain and smart contract development - Strong understanding of security protocols and encryption techniques. check at...
I am looking for a developer to create a readymade Flash BTC . If someone has ready code then it will be advantageous. Key Requirements: - Development of a web-based platform for Flash BTC investment - Implementation of basic security features such as SSL encryption and login authentication - Integration with popular payment gateways - User-friendly interface for easy navigation and investment tracking If you have a strong portfolio and experience working with investment platforms, please apply for this project.
...server using AWS Transfer Family. The identity provider will be a custom lambda that will read the user accounts in DynamoDB, and returns a dynamically built policy to allow the user to read/write in his bucket. Both the CreateUser and AuthenticateUser lambda functions should be provided (ideally written in NodeJS 18, but I can be flexible on this point). The Lambda functions will take the encryption SALT, DynamoDB table name, and S3 Bucket name as environment variables. The template shall create the following resources, (and others if I miss some that are required) : - the AWS::Transfer::Server with FTP, sFTP, and FTPs protocols enabled, using a custom Hostname - the S3 bucket, that will contain per user sub-folders - the VPC, subnet(s), Elastic IP address, Internet Gatewa...
I am looking for a Matlab expert to fix my code for image decryption. Currently, the code is producing incorrect output. The encryption algorithm being used is custom or unknown, and I can provide documentation and reference materials for it. Ideal skills and experience for this job include: - Proficiency in Matlab programming - Experience with image decryption - Familiarity with custom encryption algorithms - Attention to detail and ability to troubleshoot code - Strong communication skills to work with me on providing documentation and resolving issues.
I'm looking for a mechanical engineer who can simulate the building's HVAC system using OpenModelica. I have the required hardware, so there is no need to purchase or rent it. The programming language that needs to be used is OpenModelica and the output should be in an executable form. The simulation will involve electrical load estimation, power modeling, thermal modeling, and COP and energy efficiency calculation. The project should be completed within the given deadline.
DES (Data Encryption Standard) and AES (Advanced Encryption Standard) and AES Architecture
We are looking for an experienced C programmer to create a Windows executable (.exe) script using the code available at https://github . com/RfidResearchGroup/proxmark3/blob/5e20905a9d31959f445461c45b612ef2bdf0c4ae/client/src/wiegand_formats.c. The goal of the script is to print out all possible format matches and decoded data from a given input. Requirements: Proficiency in C programming language Experience with creating Windows executables Tasks: Create a Windows executable (.exe) script that takes an input in binary, hexadecimal, or decimal format. The script should print out all possible format matches and decoded data, using the provided code as a reference. The output should include the following information: Format name (starting from li...