Executable encryption işler

Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,000 executable encryption iş bulundu, ücretlendirmeleri EUR

    ...delimited text/ASCII format so that they can be loaded into a database on a Windows machine, in a Windows Server environment. The PDF documents are lists of data (I have included an example which is explained below). The PDF files all have essentially the same format, with very small variations. The final solution will be called from a management system (spawning a DOS box) and run either via an executable or a batch file, for example: C:> or C:> The file is the PDF that needs to be scanned and converted into text, and the results of which are then sent to the file. Included in this project is a 3 page test PDF document which contains test data using the format I need interpreted. The second page is slightly crooked

    €257 (Avg Bid)
    €257 Ortalama Teklif
    13 teklifler

    ...job would have experience in using both nginx and apache servers, as nginx needs to handle RTMP and apache will handle the site itself. The main purpose of the reverse proxy site will be to provide streaming capabilities for a video platform, similar to YouTube. Therefore, the candidate should have experience in setting up video streaming sites and be familiar with the necessary security and encryption protocols. In terms of server setup, my current setup is a local VM. However, the candidate should also have experience with dedicated servers, VPS, and cloud hosting, as this may be necessary in the future. Overall, I am looking for someone who is knowledgeable in both nginx and apache servers, has experience in setting up video streaming sites, and can provide expert guidan...

    €185 (Avg Bid)
    €185 Ortalama Teklif
    15 teklifler

    Data Encryption Project I am looking for a freelancer who can help me with an advanced data encryption project. The following are my project requirements: - Advanced Encryption: The encryption level required for the project is advanced. - Asymmetric Encryption: I prefer asymmetric encryption method or algorithm. - Data Storage: The primary purpose of the encrypted data is for data storage. Ideal Skills and Experience: - Experience in advanced encryption techniques and methodologies. - Proficient in asymmetric encryption algorithms such as RSA, DSA, or ECC. - Familiarity with data storage and database systems. - Knowledge of encryption standards and protocols. If you have the skills and experience required for this project,...

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    6 teklifler

    I am looking for a skilled freelancer who can improve the security on my intranet by encrypting my files (pdf, images) to a 256-bit level. Currently, the level of security on my intranet is basic, a...the security on my intranet by encrypting my files (pdf, images) to a 256-bit level. Currently, the level of security on my intranet is basic, and I am looking to increase it to ensure that my files are protected. Also encrypt a few database fields. Ideal skills and experience for this project include: - Experience in network and data security - Proficiency in encryption methods and techniques - Knowledge of media file encryption - Familiarity with intranet security protocols If you have the skills and experience necessary to complete this project, please reach out to me wi...

    €150 (Avg Bid)
    €150 Ortalama Teklif
    28 teklifler

    ...platforms commonly used in embedded systems. Responsibilities: Study the project requirements and provide technical recommendations for the integration process. Develop firmware and drivers for the NRF52 microcontroller to establish communication with the ATEcc608A Crypto Chip. Implement secure storage mechanisms for cryptographic keys and certificates on the Crypto Chip. Ensure proper data encryption, decryption, and authentication protocols between the NRF52 and ATEcc608A. Conduct thorough testing and debugging to ensure the integration is robust, efficient, and secure. If you possess the necessary skills and expertise in NRF52 and ATEcc608A integration, we would love to hear from you. Please provide examples of relevant past projects and highlight your relevant experience in ...

    €41 / hr (Avg Bid)
    €41 / hr Ortalama Teklif
    6 teklifler

    I have a panel dataset (year, state, unemployment rates, jobs vacancy rates) and I need to perform some econometric regressions to replicate a research paper analysis (see attached - only need to replicate Table 2, 3 and 4). The job doesn't sound too time-consuming. This job will need to be done on R and the output will be an R code file (fully executable) and a one-page summary.

    €54 (Avg Bid)
    €54 Ortalama Teklif
    6 teklifler

    I have a client who has a .Net desktop app developed in 2008. The app fires off email to customers via the configured email provider settings. (I.e. username or mail app code/password, imap and smtp settings).The app seems to be coded to use TLS1.0 only. As of 4/17/2023, the email provider (Comcast in this case) will only allow TLS1.2 (or higher) encryption. I might not have access to the source code. Can you help? Also, the same app is currently stand-alone using SQL compact version. It was connecting to a shared SQL database server at one time. Can you help with getting the app configured to point to a shared database server and database?

    €3640 (Avg Bid)
    €3640 Ortalama Teklif
    32 teklifler

    I am looking for a developer who can create a digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature...digital signature solution that can authenticate signatures. The project will be written in Python and there is no preference for a specific library or framework. The main features required for this project include signature authentication. Ideal Skills and Experience: - Strong knowledge of Python - Experience with digital signature solutions - Familiarity with authentication protocols and encryption te...

    €133 (Avg Bid)
    €133 Ortalama Teklif
    6 teklifler

    ...Information Protection for Office 365 to help me with setting up classifications and labeling for my organization. I have already set up some information protection policies, but I need help with this specific aspect. The ideal candidate should have experience with: - Microsoft Information Protection for Office 365 - Setting up classifications and labeling - Knowledge of data loss prevention and encryption and rights management would be a plus. The result of the task should be an example in C# showing : * Labeling a document * Upgrading the classification of a document * Downgrading the classification of a document. The example should be programmed in C# using and CAN NOT

    €21 / hr (Avg Bid)
    €21 / hr Ortalama Teklif
    10 teklifler

    Hi, looking for someone with a tech background that can build out a pitch deck. High level, this is an encryption play. I would like a one slide summary based on a patent pending application along with a 10-12 deck. Thanks!

    €337 (Avg Bid)
    €337 Ortalama Teklif
    79 teklifler

    I'm looking to develop a property investment software system that will run as a Desktop Application. The system will require some data collection from various public online sources data filtering and basic encryption of data, to ensure security of data. The main purpose of this system is to provide users with the ability to analyze and filter their property investment data. It should be equipped with features to allow users to filter their data according to different criteria, such as property type, location or financial performance, to enable them to make informed investment decisions. The system should include automated alert features to help users stay updated on their investments. The program should be easy to use and powerful enough to handle large databases without exper...

    €14 / hr (Avg Bid)
    Gizlilik Anlaşması
    €14 / hr Ortalama Teklif
    46 teklifler

    I am looking for a skilled software developer to create a password protection software for my internal Hard Drive. The software should be compatible with windows and Linux operating system and can be either open-source or proprietary. However, I do require military-grade encryption to ensure maximum security for my data. The ideal candidate should have experience in developing software with high-level encryption capabilities.

    €160 (Avg Bid)
    €160 Ortalama Teklif
    16 teklifler

    I need help resolving an issue where my LetsEncrypt SSL certificate is not trusted on iOS iPhones. The specific error message I am receiving is "Not Trusted". Ideal skills and experience: - Experience with SSL certificates and encryption - Familiarity with iOS devices and their security protocols - Knowledge of LetsEncrypt and its implementation on various devices - Ability to troubleshoot and resolve certificate errors - Strong communication skills to explain the solution to me in a clear and concise manner.

    €22 / hr (Avg Bid)
    €22 / hr Ortalama Teklif
    16 teklifler
    Dating App Bitti left

    ...Users should be able to chat with their matches in-app, with the option to send pictures and videos. User Verification: It's important to have some form of user verification to ensure that all users are real and not bots. This could include phone number verification or email verification. Privacy and Security: The app should prioritize user privacy and security, with measures such as end-to-end encryption for messages and profile settings that allow users to control who sees their information. Location-Based Matching: The app could include location-based matching to suggest matches who are nearby. Premium Features: Consider offering premium features for users who want to get more out of the app, such as the ability to see who has viewed their profile or the option to und...

    €201 (Avg Bid)
    €201 Ortalama Teklif
    13 teklifler

    ...core_math)ont bien fait et les formules sont come dans les pdf fourni et fixer les bugs si il y a(cela pour demain matin) Pour ça vous aller ouvert le projet en eclips (comme dans les photo)etpuis vous aller faire run pour tout les test de core_math (comme dans les photos)mais même si il y a pas des erreurs dans les autrea TODO il faut vérifier de la formule utilisé créer un script .cmd pouc chaque executable que je dois lancer il faut au moins les executables suivants: kmeans gui 2d kemeans plus gui 2d kmeans elbow gui 2d Pour cette partie (GUI) il faut utiliser les fichiers de couleur jaune jaune dans le photo(cela pour ce mercredi) dans les 3 cas, il sera sans doute nécessire de faire plusieurs scripts, qui joue sur différent...

    €59 (Avg Bid)
    €59 Ortalama Teklif
    9 teklifler

    I want an excel file with two columns and 1500 rows The first column is an explicit text consisting of one, two or three words The second column is the ciphertext of the first column using the Blowfish encryption algorithm Note / I can give you a website that you use to encrypt the ciphertext Duration of work / one or two days only

    €20 (Avg Bid)
    €20 Ortalama Teklif
    47 teklifler

    I am looking for a Python developer who can create a Streamlit Realtime Chat, Group Chat Application that will be used for buying and selling purposes. The most important feature for this application will be buyer to able to chat with one and/or multiple suppliers at one time, group chat, one to one chat, file sharing, with message encryption as a secondary feature. I anticipate that more than 50 users will be using the chat application at one time, so experience in developing scalable applications will be ideal. User authentication will also be necessary to ensure the security of the chat. My main application is running on python, streamlit and mongo db database. The chat application needs to integrate with whatsapp also.

    €501 (Avg Bid)
    €501 Ortalama Teklif
    7 teklifler

    My current project involves Mallox Ransomware decryption and I'm in need of experienced help. This project requires intense security knowledge and the use of advanced encryption methods - AES, Triple DES, and RSA. I believe the project to be of a hard difficulty level and am not specifying a language preference. If you think you're up for the challenge and want to join the fight against cybercrime, I'd love for you to help me out on this project.

    €485 (Avg Bid)
    €485 Ortalama Teklif
    8 teklifler

    ...panels of different sizes (draft design available) that contain text, image, like/dislike buttons (with like/unlike counters). Each panel has objects with price and "expiry date": it stays empty until the expiry date. (Auction principle). A slim banner has the login/register buttons, switching to username welcome after login (the login/registration window appears on a popup window). Credentials encryption in the database after registration. Admin account is needed to operate (via website or outside, separate admin panel). Payment integrations with Stripe basic functions like: pay, confirm, hold payment, release money back... ...

    €1175 (Avg Bid)
    €1175 Ortalama Teklif
    113 teklifler

    Looking for a cyber security specialist to complete the following for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetratio...for our web app. The ideal candidate will have the necessary tools to deliver. 1. Vulnerability assessment 2. Code Review (ASP .NET) 3. Database Security (MS-SQL) 4. API Security 5. Penetration testing 6. Threat modelling 7. Vulnerability management 8. Firewall - configuration base management (in future) 9. Summary Report of findings with gaps identified and details of how they were closed 10. Encryption Protocols (Preferably the candidate should be located in Pune so we can potentially absorb into a permanent role at a lat...

    €92 (Avg Bid)
    €92 Ortalama Teklif
    8 teklifler

    ...Expired Domains Bulk Domain Rating Checker Index Pages Checker Meta Tags Tools Create new meta tags or analyze the existing ones to get an in-depth analysis of your meta tags and web pages. Meta Tags Analyzer Meta Tag Generator Password Management Tools Create a secure password, check password strength or encrypt a password; all tools related to password management are readily available. Password Encryption Utility Password Strength Checker Password Generator Online PDF Tools All the tools you need to work with PDF files, at your fingertips. Merge, rotate, unlock, lock, watermark and convert PDFs with just a few clicks. Merge PDF Rotate PDF Unlock PDF Lock PDF Watermark PDF To Word Word To PDF PDF To JPG JPG To PDF PowerPoint To PDF Compress PDF Excel To PDF Split PDF Compress...

    €409 (Avg Bid)
    €409 Ortalama Teklif
    11 teklifler

    I'm looking to create a custom form that will organize and gather information from its users. I need the form to be able to collect contact details, and background health information. The user data I receive needs to be sent in the format of an email notification. Lastly, the form needs to be backed up with a very secure SSL encryption in order to keep the data safe from any malicious intent. -- All of this can be done with software readily available online. What I need additionally is to program a given statement back to the form receiver based on the answers given. --

    €429 (Avg Bid)
    €429 Ortalama Teklif
    73 teklifler

    Function seal: Declaration: bool seal(const char * inFile, const char * outFile, const char * publicKeyFile, const char * symmetricCipher) Description: The function accepts four parameters, the first three parameters define the names of files. In the file inFile, you will find binary data intended for encryption, outFile is the output file where you save all the necessary data for decryption, and publicKeyFile is the public key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetr...

    €34 (Avg Bid)
    €34 Ortalama Teklif
    5 teklifler

    ...commercial Purposes. List of features: File transfer Convert Audio to Text Voice & Text Message One to One Messaging Alerts & Notification Sending and receiving messages, photos, videos, and files of any type along with intergration Creating groups with up to 200,000 members Admin can search through any keywords and it will show all chats containing those key words Secret chats with end-to-end encryption Cloud-based storage, allowing for easy access to your messages and media from any device Automatic deletion of messages with a timer Self-destructing messages Two-factor authentication Media compression for faster sending Multi-platform support for iOS, Android, Windows, Mac, and Linux Feature like Copy, Forward,Reply, Edit,Pin,Select,Save As, Show in Folder Scheduled ...

    €990 (Avg Bid)
    €990 Ortalama Teklif
    62 teklifler

    I am in need of a payment gateway for my website, QueR. The payment methods I require to be integrated include Credit Card. Additionally, I need recurring payment functionality and specific security features in place, including SSL/TLS Encryption and Fraud Detection. For this project, I am looking for a freelancer who has experience in payment gateway integration and is skilled in web security. Ideal skills and experience include: - Payment gateway integration - Web security - Knowledge of SSL/TLS Encryption and Fraud Detection - Ability to implement recurring payment functionality Please provide a portfolio or relevant experience in your proposal. Thank you.

    €106 (Avg Bid)
    €106 Ortalama Teklif
    16 teklifler

    I am seeking an experienced ethical hacker with advanced skills in the field to assist me in learning about wireless security. The ideal candidate should be able to create video lessons that cover the following topics: - Wireless network vulnerabilities - WEP, WPA, and WPA2 encryption - Wireless network penetration testing - Wireless intrusion detection and prevention The video lessons should be comprehensive, covering all the necessary technical details and providing practical examples. The ideal candidate should have experience in creating educational content, and be able to deliver the material in an engaging and easy-to-understand manner. Skills and experience required: - Advanced expertise in ethical hacking - Strong knowledge of wireless security - Experience in creating e...

    €346 (Avg Bid)
    €346 Ortalama Teklif
    22 teklifler

    Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Developers ...

    €19 / hr (Avg Bid)
    €19 / hr Ortalama Teklif
    50 teklifler

    Programming languages: Android developers should be proficient in Java or Kotlin, while iOS developers should be proficient in Objective-C or Swift. VoIP development: Developers should have knowledge and experience in VoIP development, including SIP, RTP, and other relevant protocols. Linphone SDK: Developers should be familiar with the Linphone SDK and its features, including audio and video codecs, encryption, and network management. Audio and video processing: Developers should have experience in audio and video processing, including noise reduction, echo cancellation, and video codecs. Network programming: Developers should be familiar with network programming, including TCP/IP and UDP protocols, and be able to troubleshoot network issues. Debugging and testing: Developers ...

    €19 / hr (Avg Bid)
    €19 / hr Ortalama Teklif
    43 teklifler

    ...Office documents such as Word, Excel, and PowerPoint. The information protection should include encryption, access control, and authentication. Remove information protection from Office documents: The tool should be able to remove information protection from Office documents that have been previously protected using the tool. This will allow users with the appropriate access credentials to access the document's content. Update information protection settings for Office documents: The tool should be able to update the information protection settings for Office documents that have been previously protected using the tool. This will allow administrators to modify the access control rules or encryption algorithm used to protect the document. The tool should be develope...

    €23 / hr (Avg Bid)
    €23 / hr Ortalama Teklif
    20 teklifler

    One needs to divide into layers: Application package: Main method DB package: access to the database + SQL commands Logic package: table calculations UI package: console outputs -The program should have sophisticated error handling; program crashes should not occur. -A DB export file. -The JDK 19.x is mandatory. -An executable JAR file. -An executable JAR file. Detailed concept: -Table of contents -Used hardware and software -ER model. -Program flowchart for navigation. -Storyboard for menus. -A program user documentation. -Inline documentation in Java comments. I will give you information about the 4 searched information from the database

    €24 (Avg Bid)
    €24 Ortalama Teklif
    5 teklifler

    Looking for an experienced programmer who can extract a program from a TI controller. The specific model of the controller is not specified. The programming language used to create the program is also not specified. We require the extracted program to be in either text, binary or executable file format. Ideal skills for this job include: - Knowledge of TI controllers and their programming languages - Experience in program extraction - Familiarity with text, binary and executable file formats.

    €28 (Avg Bid)
    €28 Ortalama Teklif
    1 teklifler

    I need a coding expert to encrypt my files with advanced encryption. The files that need to be encrypted include text, image, and video files. The ideal candidate should have experience in PHP. The deadline for completing the encryption process is flexible.

    €18 (Avg Bid)
    €18 Ortalama Teklif
    8 teklifler

    I am looking for a skilled developer to help me encrypt my chat a...skilled developer to help me encrypt my chat app database using MySQL. The ideal candidate should have experience with encryption methods, particularly AES, and be able to implement a 256-bit encryption strength. Once you open the app the db has to be decrypted in a safe manner and once the app is closed the db has to encrypted again. The project requires the following skills and experience: - Familiarity with MySQL database - Proficiency in AES encryption method - Experience implementing 256-bit encryption strength The main objective of this project is to ensure the security of the chat app database, and the ideal candidate should be able to provide a seamless encryption process with...

    €159 (Avg Bid)
    €159 Ortalama Teklif
    25 teklifler

    ...Range Wireless Signals 2. Support high-speed video data - live video streaming and recording over the wireless network 3. Port to connect to internet or other network with or without internet connection 4. Ability to scan available channels programmatically with signal strength 5. Ability to switch channel programmatically based on signal strength from the channel 6. Other security features - Encryption and FIPS 7. Supports port forwarding Deliverables: 1. We are not looking to build a brand new router. Recommend an existing router in the market from any of the major vendors. 2. Ensure the router supports all the above features 3. Deliver .NET C# source code to scan all channels with strength and switch to a particular channel 4. Deliver .NET C# source code to find the streng...

    €1150 (Avg Bid)
    €1150 Ortalama Teklif
    26 teklifler

    ...the status of leads in real-time, while lead scoring will enable them to prioritize leads based on their potential value. Lead routing will ensure that leads are distributed to the most appropriate buyers based on specific criteria, such as geographic location, industry, and company size. To ensure the security of sensitive data, the system will incorporate robust security measures, including encryption and access controls. The system will also be scalable, allowing for the addition of new features and functionality as needed. Overall, the Lead Distribution System development project will provide marketing agencies and lead generation companies with a powerful tool for managing and distributing leads to potential buyers, helping to streamline the lead generation and sales proce...

    €2877 (Avg Bid)
    €2877 Ortalama Teklif
    124 teklifler

    ...can either purchase a domain name or use a subdomain of an existing domain. Configure DNS settings: Once you have a domain name, you will need to configure the DNS (Domain Name System) settings for your domain to point to your server's IP address. This involves creating a DNS A record for your domain that maps to your server's IP address. Set up SSL/TLS encryption: To secure your email communication, you should enable SSL/TLS encryption. You can obtain a free SSL/TLS certificate from Let's Encrypt or purchase one from a certificate authority. Configure firewall settings: You will need to configure your server's firewall to allow incoming and outgoing traffic on the SMTP port (usually port 25). Configure SMTP settings: Finally, you will need to confi...

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    13 teklifler

    The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.

    €139 (Avg Bid)
    €139 Ortalama Teklif
    3 teklifler

    Looking for a skilled developer who can customize EspoCRM to meet my specific needs. I require many customizable features such as adding new fields and modules, customizing existing modules, and integrating with other software. Specifically, I need encryption and decryption features to ensure the security of my data. The timeline for completion is flexible. The ideal candidate should have experience in EspoCRM customization, and be proficient in custom fields and modules, workflow automation, and user interface design.

    €24 / hr (Avg Bid)
    €24 / hr Ortalama Teklif
    3 teklifler

    Hi Danil K., why did the task close and it showed something else. Can you check?? The title of my project is Enhancing Safety and Security in Controller Area Network (CAN) for Anti-braking Lock System (ABS) in Vehicle Network System and I would like to add security features of encrypts the data using AES encryption, HMAC authentication code and helper function that calculates the CRC error detection code. I have all the scripts for the additional security features and even the algorithms. I just need someone to build the simulink blocks that can run and test the features on a simulation of a car. Will be able to provide more information needed.

    €231 (Avg Bid)
    €231 Ortalama Teklif
    1 teklifler

    Lütfen detayları görmek için Kaydolun ya da Giriş Yapın.

    Mühürlü Gizlilik Anlaşması
    LostInSudan Bitti left

    ...This would make it easier for them to arrange for the return of the car. 5. Volunteer network: The app would have a feature that would allow people to sign up as volunteers. These volunteers could help in verifying ownership, coordinating the return of the car, and providing support to the owners. 6. Security features: The app would have security features such as two-factor authentication and encryption to ensure the safety and privacy of users' data. 7. User ratings: The app would allow users to rate each other based on their experiences. This would help build trust and encourage responsible behavior. Monetization: The app could be monetized through ads or by charging a small fee for some premium features, such as faster verification or priority messaging. Conclusion: A mob...

    €666 (Avg Bid)
    €666 Ortalama Teklif
    33 teklifler

    ...compiled to a WASM module (client) and binary executable (server). 3 - 5 applicants will be chosen to complete the project in parallel. All code will be released under a GLP-2.0 license. REQUIRED EXPERIENCE: Motivation is more important than experience. You are allowed to learn on the job and take the full time allotted. PROJECT DESCRIPTION: Layer 8 is to be a collection of protocols that jointly implement VPN functionality running transparently in the browser. The ultimate goal is to dissociate a client’s true identity from their content choices through the Layer 8 system. The Layer 8 system is actually a suite of protocols being developed one at a time -- this is the first of those protocols. SPECIFIC TASK: Implement a symmetric encryption protocol across an HTT...

    €831 (Avg Bid)
    €831 Ortalama Teklif
    30 teklifler

    I am looking for a skilled developer who can create a zero-knowledge proof smart contract using Solidity. The purpose of this contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity pro...contract is for authentication, authorization, and verification. The contract will be handling sensitive data, so a high level of security is required. Ideal skills and experience for this job include: - Expertise in Solidity programming language - Experience with zero-knowledge proof technology - Knowledge of blockchain and smart contract development - Strong understanding of security protocols and encryption techniques. check at...

    €460 (Avg Bid)
    €460 Ortalama Teklif
    13 teklifler

    I am looking for a developer to create a readymade Flash BTC . If someone has ready code then it will be advantageous. Key Requirements: - Development of a web-based platform for Flash BTC investment - Implementation of basic security features such as SSL encryption and login authentication - Integration with popular payment gateways - User-friendly interface for easy navigation and investment tracking If you have a strong portfolio and experience working with investment platforms, please apply for this project.

    €107 (Avg Bid)
    €107 Ortalama Teklif
    3 teklifler

    ...server using AWS Transfer Family. The identity provider will be a custom lambda that will read the user accounts in DynamoDB, and returns a dynamically built policy to allow the user to read/write in his bucket. Both the CreateUser and AuthenticateUser lambda functions should be provided (ideally written in NodeJS 18, but I can be flexible on this point). The Lambda functions will take the encryption SALT, DynamoDB table name, and S3 Bucket name as environment variables. The template shall create the following resources, (and others if I miss some that are required) : - the AWS::Transfer::Server with FTP, sFTP, and FTPs protocols enabled, using a custom Hostname - the S3 bucket, that will contain per user sub-folders - the VPC, subnet(s), Elastic IP address, Internet Gatewa...

    €174 (Avg Bid)
    €174 Ortalama Teklif
    23 teklifler

    I am looking for a Matlab expert to fix my code for image decryption. Currently, the code is producing incorrect output. The encryption algorithm being used is custom or unknown, and I can provide documentation and reference materials for it. Ideal skills and experience for this job include: - Proficiency in Matlab programming - Experience with image decryption - Familiarity with custom encryption algorithms - Attention to detail and ability to troubleshoot code - Strong communication skills to work with me on providing documentation and resolving issues.

    €43 (Avg Bid)
    €43 Ortalama Teklif
    5 teklifler

    I'm looking for a mechanical engineer who can simulate the building's HVAC system using OpenModelica. I have the required hardware, so there is no need to purchase or rent it. The programming language that needs to be used is OpenModelica and the output should be in an executable form. The simulation will involve electrical load estimation, power modeling, thermal modeling, and COP and energy efficiency calculation. The project should be completed within the given deadline.

    €134 (Avg Bid)
    €134 Ortalama Teklif
    13 teklifler

    DES (Data Encryption Standard) and AES (Advanced Encryption Standard) and AES Architecture

    €20 / hr (Avg Bid)
    €20 / hr Ortalama Teklif
    9 teklifler

    We are looking for an experienced C programmer to create a Windows executable (.exe) script using the code available at https://github . com/RfidResearchGroup/proxmark3/blob/5e20905a9d31959f445461c45b612ef2bdf0c4ae/client/src/wiegand_formats.c. The goal of the script is to print out all possible format matches and decoded data from a given input. Requirements: Proficiency in C programming language Experience with creating Windows executables Tasks: Create a Windows executable (.exe) script that takes an input in binary, hexadecimal, or decimal format. The script should print out all possible format matches and decoded data, using the provided code as a reference. The output should include the following information: Format name (starting from li...

    €62 (Avg Bid)
    €62 Ortalama Teklif
    9 teklifler