Hash md5 salt hash decrypt işler

Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,000 hash md5 salt hash decrypt iş bulundu, ücretlendirmeleri EUR

    ...botuna ihtiyacım var. 3 Farklı dilde yapılacak fakat hepsi birbirine veri gönderecek. PHP + C# + PYTHON Neden PHP ? PHP'de üye hesabına giriş yaptığında botların son durumunu görüntüleyebilecek. 3 Farklı paket satışı olacak bu paketlerden hangisini istiyorsa satın alabilecek. C# Çalıştırabilmek için site üzerinden alınan paket HASH KEY ( random key ) vericek. Bu key'i c# üzerinde aktifleştirmesin durumunda kullanabilecek. Neden .NET? Üye satın aldığı paket'e göre HASH KEY'ini aktif ettiğinde 5 - 10 veya 20 bot için COİN seçicek , seçtiği coin için ALIŞ ve SATIŞ yüzdesini yazıcak örneğin : %20 Kar'da sat - %10 Zarar'da sat gibi. Program üzeri...

    €1049 (Avg Bid)
    €1049 Ortalama Teklif
    8 teklifler

    Benim belirledigim bir Bitcoin Pool da worker i otomatik tanımlayacak şekilde CPU veya gpu üzerinden Hash edecek çok kişinin kullanacağı Windows masaüstü ve android uygulama kaynak kodu istiyorum. Mümkünse c# tabanlı, opengl ve webgl üzerinden çalışacak bir uygulama.

    €9 - €28
    €9 - €28
    0 teklifler

    Paribu, screen scr...adresini yazarak , CCY cekim islemini yapma. Gerceklesen her islem sonrasinda, karsi tarafin adresini biz gonderecegiz. Gerceklesen islem miktari ise, “Market” sekmesinde, islem yapilmis CCY seciliyken, “Market Gecmisi” sekmesinden okunabilir. Bunun sebebi, verdigimiz al veya sat komutuna gore, islemin tamaminin gerceklesememis olmasi ihtimalidir. Eger islem tek ise ("composite" islem degilse) ve salt satis yapilmis ise, herhangi bir CCY cekmeye gerek yoktur. 10) “Market” sekmesinden, ilgili CCYler icin, bizim gonderecegimiz komuta istinaden “Acik Emirler” alt sekmesinden satis emri iptal etme. 11) “Market” sekmesinden, ilgili CCYler icin, bizim gonderecegimiz komuta istina...

    €165 (Avg Bid)
    €165 Ortalama Teklif
    6 teklifler

    ...token vardır. Contract sayfası -Contract sayfası token oluşturmak için başlatılan ethereum adresidir. -Aslında ethereum adresinden farkı yoktur fakat bir iki tane ufak farkları vardır. ***bitcoin veya ethereum adresindeki her işlemi bir hash kodu vardır. Arama çubuğuna bitcoin , ethereum veya hash kodu yazıldığında istenilen bilgileri önümüze çıkarmasını istiyoruz. ***Arama çubuğuna yazılan adres veye hash kodu işlemini bulsun diye. ***Bitcoin veya ethereum değişken fiayata sahip olduğu için. işlem yapıldığı andaki fiyatını ve şuan ki fiyatının gösterilmesini istiyoruz. Verdiğimiz sitelerde bu mevcut. ***kullanıcı sayfası istiyoruz. herhangi bir koinin adresini takip etmek. isteğe göre koin gel...

    €537 (Avg Bid)
    €537 Ortalama Teklif
    4 teklifler

    Uygulama açıldığı an oturum açılıp açılmadığı kontrolü yapılacak. Eğer oturum yok ise facebook ve google + ile sisteme üye olabileceğiz. Üyelikler benim daha önce hazırlamış olduğum php sayfası aracılığı ile mysql sunucusuna dahil edilecek. Eğer oturum açılmış ise QR barkod okutacağı bir ekran olacak. Okutulan QR kodu içerisinde md5 ile saklanan veri php ile yapmış olduğum adrese post edilecek. Post sonrası uygulamaya xml olarak veriler dönecek. Uygulama bu bilgileri alarak ekranda istenilen yerlere yerleştirilecek. uygulama bu noktada iki adet buton içerecek. bu butonlara basıldığı zaman malum php sistemine post işlemi gerçekleştirilecek. gelen sonuç ekranda toast olarak ya da farklı bir şekilde g&oum...

    €555 (Avg Bid)
    €555 Ortalama Teklif
    9 teklifler

    netbeans veya eclipse ortamında java dili ile hash table oluşturma. Bu hash yapısı ingilizce yazılmış bir text i tarayacak. Taranan her kelime text içindeki konumu ve text içinde kaç kez yazıldığı bilgisi tutulacak. Kullanıcıya istenilen kelime sorulacak ve text içinde olup olmadığı hangi poziyonda olduğu ve text içinde kaç kez tekrar ettiği ekrana bastırılacak.

    €9 - €28
    Acil
    €9 - €28
    0 teklifler

    100 tane anahtar değerini rastgele üreten ve bu değerleri boyutu 100 olan hash tablosuna yerleştiren programı yazınız. Hashbölme ve hashcarpma olarak iki metod yaz. 1-Bölme metodu anahtar ve modül değerini parametre olarak Alıp hash Değeri döndürecek. 2-çarpma metodu anahtar ve alır sayısını parametre olarak Alıp hash Değeri döndürecek. Çakışma Çözümü için Doğrusal sınama ve Dörtlü sınama metodları Kullanılacak.

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    1 teklifler
    java ödevi Bitti left

    100 tane anahtar değerini rastgele üreten ve bu değerleri boyutu 100 olan hash tablosuna yerleştiren programı yazınız. Hashbölme ve hashcarpma olarak iki metod yaz. 1-Bölme metodu anahtar ve modül değerini parametre olarak Alıp hash Değeri döndürecek. 2-çarpma metodu anahtar ve alır sayısını parametre olarak Alıp hash Değeri döndürecek. Çakışma Çözümü için Doğrusal sınama ve Dörtlü sınama metodları Kullanılacak.

    €5 / hr (Avg Bid)
    €5 / hr Ortalama Teklif
    1 teklifler

    C dilinde algoritma ödevi; C dilinin veri yapıları konularını içermektedir Ödevin çözümü için yiginlar, kuyruklar, tek sırali bağlı listeler, dairesel bağlı listeler, hash tabloları konularını iyi bilmek gerekir

    €27 (Avg Bid)
    €27 Ortalama Teklif
    5 teklifler

    C dilinde algoritma ödevi; C dilinin veri yapıları konularını içermektedir Ödevin çözümü için yiginlar, kuyruklar, tek sırali bağlı listeler, dairesel bağlı listeler, hash tabloları konularını iyi bilmek gerekir

    €28 (Avg Bid)
    €28 Ortalama Teklif
    2 teklifler

    ...çağırılacaktır. Aynı kişiye ait resimlerin gelmesi ılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Image özellikleri herbir image için min 32*32 =1024 pix şeklinde veri tabanında tutulacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Java, C# , Sqlserver, Oracle ,Cuda, Open GL,vs (yazılımcı kendi de seçebilir).Gerekli Beceriler: C# P...

    €363 (Avg Bid)
    €363 Ortalama Teklif
    1 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşt...çağırılacaktır. Aynı kişiye ait resimlerin gelmesi ılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Image özellikleri herbir image için min 32*32 =1024 pix şeklinde veri tabanında tutulacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Java, C# , Sqlserver, Oracle ,Cuda, Open GL,vs (ya...

    €5702 (Avg Bid)
    €5702 Ortalama Teklif
    5 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €234 - €703
    €234 - €703
    0 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritaban?ndan 2-3 saniye içersinde sonucu döndüren bir yaz?l?m yaz?lacakt? önemli olan performans esas al?nacakt?r.rnrnKullan?labilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir ?ekilde indexleme , Binary tree yap?s? vsrnrnKullan?labilecek Teknolojiler: Matlab, Cuda, Open GL,vs

    €655 (Avg Bid)
    €655 Ortalama Teklif
    1 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €611 (Avg Bid)
    €611 Ortalama Teklif
    5 teklifler

    2-3 Milyon verisi bulunan 2boyutlu yüz veritabanı oluşturulacaktıı ...nitelikler tutulacaktı yüz veritabanından yüzün kime ait olduğuna dair bir arama yapan bir yazılıma ihtiyaç vardır. Arama kısmına yüz bilgilerini girilecektir. Yazılımın 2-3 saniye içersinde yüzün kime ait oldunu sorgulayıp doğru bir şekilde göstermesi beklenmektedir. .Bu yazılımda performans ve başarı yüzdesi esas alınacaktır. Fikir verme amaçlı, Kullanılabilecek yöntemler : Yüz bilgilerini hash data olarak tutup iyi bir şekilde indexleme yapılabilr veya ağaçyapısı kullanılarak 6- 7 basamakta sonuç elde edilinebilir veya yazılımcı kendi yöntemini kullanabilir. Kullanılabilecek Teknolojiler: Matlab, Cuda, Ope...

    €521 (Avg Bid)
    €521 Ortalama Teklif
    1 teklifler
    Hash Tables Bitti left

    Konu: Hash tablolar Problem: Turkce kelimeler sozlugu uzerinde hash tablosu performans degerlendirmesi Tanim: Size icinde binlerce Turkce sozcugun gectigi bir kelime listesi verilecektir. Bu kelime listesini hash tablolar tabanli bir sozluge girerek catisma sayilarini bulmaniz istenmektedir. Oncelikle linear probing catsma cozme kuralina gore calisan hash tablolar tabanli bir Dictionary ADT gerceklestirimi yapmaniz gerekmektedir. 17 farkli hash fonksiyonu icin toplam catisma ve maximum catisma sayilarini raporlamaniz beklenmektedir. 17 farkli hash fonksiyonu 0 dan 16 ya kadar cyclic shift hash kodlar kullanlarak elde edilecektir. Kisaca, sizden istenen ders kitabinda sayfa 52...

    €9 - €28
    Özellikli
    €9 - €28
    0 teklifler

    ...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...

    €89 (Avg Bid)
    €89 Ortalama Teklif
    25 teklifler

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    €37 (Avg Bid)
    €37 Ortalama Teklif
    7 teklifler

    ...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...

    €11 / hr (Avg Bid)
    €11 / hr Ortalama Teklif
    51 teklifler

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    €122 (Avg Bid)
    €122 Ortalama Teklif
    36 teklifler

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    €152 (Avg Bid)
    €152 Ortalama Teklif
    40 teklifler

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    €325 (Avg Bid)
    €325 Ortalama Teklif
    15 teklifler

    ...breached passwords and prompt users to change them if matched. - Use Argon2 for password hashing with a unique salt for each password. - Integrate an additional HMAC layer for hashing with a highly secure secret salt. - Implement two-factor authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to p...

    €23 (Avg Bid)
    €23 Ortalama Teklif
    33 teklifler

    ...deployed to a single device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable withou...

    €477 (Avg Bid)
    €477 Ortalama Teklif
    44 teklifler

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    €23 / hr (Avg Bid)
    €23 / hr Ortalama Teklif
    90 teklifler

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €106 (Avg Bid)
    €106 Ortalama Teklif
    25 teklifler

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    €20 / hr (Avg Bid)
    €20 / hr Ortalama Teklif
    17 teklifler

    ...standing pouch mylar bag design for my organic, dairy-free, non-GMO, Kosher, low-calorie, corn chip white matte mylar standing pouch. The product name is "Double Dip Chips" and we offer various flavors like Arctic Delight, Flamin Fuego, Hickory BBQ, White Truffle Salt, Black Truffle Truffle Salt, Sour Cream and Onion, Sour Cream and Bacon Flavor(no actual bacon), Original Kosher Salt, Flamin Fusion with Dill, Healthy Air Fried, Homestyle Ranch, Jalapeno, Kettle Cooked, Lemon Pepper, Nashville Hot, Original Dipped in Chocolate, Salt and Vinegar, Spicy Nacho. Key requirements: - Design for two STANDING POUCH WHTIE MYLAR BAG - Bag sizes – (3.8" X 6.5") 1.5 oz and (3.8" x 6.8") 3.5 oz. - The design should highlight specifi...

    €113 (Avg Bid)
    Garantili
    €113
    54 girdi

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    €10 (Avg Bid)
    €10 Ortalama Teklif
    3 teklifler

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    €22 (Avg Bid)
    €22 Ortalama Teklif
    3 teklifler

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    €122 (Avg Bid)
    €122 Ortalama Teklif
    63 teklifler

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    €27 (Avg Bid)
    €27 Ortalama Teklif
    79 teklifler

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    €912 (Avg Bid)
    €912 Ortalama Teklif
    59 teklifler

    I'm in need of an expert who resides in the Salt Lake City UTAH USA area, too manage the bureaucratic process for gaining a Utah Oil Gas and mineral exploration permit, with a focus on just the paperwork to get a mineral exploration permit. Experience required. A preferred relationship with Utah DOGM local governance and a proficient understanding of the geological framework of UTAH would be an advantage. Desirable skills and qualifications: * Experience in minerals and mining permit processing * UTAH SPECIFIC DOGM - you must be a Utah resident, USA. * Familiarity with Utah's mineral exploration permit application procedures.

    €306 (Avg Bid)
    €306 Ortalama Teklif
    28 teklifler

    ...cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you shou...

    €275 (Avg Bid)
    €275 Ortalama Teklif
    27 teklifler

    ...is to develop a permanent HWID (Hardware Identification) virtualizer capable of virtualizing various hardware IDs on a Windows-based system. Project Description: We require the development of a C++ program capable of permanently virtualizing the following hardware IDs: - Disks - Volumes - SMBIOS - UUID - BIOS Serial Number - Chassis Serial Number - MAC Address - CPU/GPU - TPM Module - MD5 - SHA1 - SHA256 - Memory - Windows Product ID The virtualizer should be designed to retain the virtualized HWIDs even after a system restart. A robust persistence mechanism should be implemented to ensure the virtualization is enduring. Furthermore, it is imperative that the program be cross-platform and compatible with various versions of Windows (10 & 11). Key requirement...

    €2108 (Avg Bid)
    €2108 Ortalama Teklif
    34 teklifler

    More details: What specific tasks or functionalities do you need assistance with? Writing test cases, Implementing test automation, Debugging code What programming languages are involved in your project? Python, Java, JavaScript What is the main goal or objective of your project? Improving software performance

    €10 / hr (Avg Bid)
    €10 / hr Ortalama Teklif
    8 teklifler

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €195 (Avg Bid)
    €195 Ortalama Teklif
    12 teklifler

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    €11 (Avg Bid)
    €11 Ortalama Teklif
    1 teklifler

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Ortalama Teklif
    15 teklifler

    Project Description: We are a distinguished brand in the health food industry, known for our premium Bone Broth range. Our products are crafted with the finest ingredients, including ACV, turmeric, Himalayan salt, gelatin, and marrow, designed to cater to health-conscious consumers seeking nutritious and flavorful options. As we aim to expand our footprint into the Saudi Arabian market, we're seeking a highly skilled professional with a deep understanding of the food and beverage landscape in Saudi Arabia, particularly in Riyadh, Jeddah, and Dammam. Your Responsibilities: Market Research: Conduct comprehensive market research to understand the health food landscape in Saudi Arabia, focusing on consumer preferences, competitor analysis, and regulatory requirements in Riyadh, ...

    €186 (Avg Bid)
    €186 Ortalama Teklif
    35 teklifler

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    €331 (Avg Bid)
    €331 Ortalama Teklif
    19 teklifler

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    €113 (Avg Bid)
    €113 Ortalama Teklif
    56 teklifler

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    €136 (Avg Bid)
    €136 Ortalama Teklif
    18 teklifler

    I'm looking for an expert in large format ASA 3D printing to print two predesigned objects. The material choice is essentia...skills in ASA 3D printing - Experience in prototyping, specifically machine parts - Ability to achieve a moderate level of detail in produced parts I need two parts printed from each file (4 pats in total). I have two files that have been custom designed to retro fit a 1960's pool where no parts are available. The material choice of ASA resin is based on the ability to tolerate UV exposure in a salt water pool. The stl files are to scale and must remain dimensionally stable. The end goal is to receive a well-executed product that aligns with the described specifications for prototyping purposes. Please ensure to detail your experience and prof...

    €546 (Avg Bid)
    €546 Ortalama Teklif
    30 teklifler

    ... "INGREDIENTS:Maltitol, milk protein blend (calcium caseinate, whey protein concentrate, whey protein hydrolysate), hydrolyzed bovine collagen, water, polydextrose, glycerin, cocoa butter, milk, high oleic sunflower oil, unsweetened chocolate, xylitol, contains less than 2% of each of the following: cocoa processed with alkali, whey protein isolate, butter (pasteurized cream, salt), sunflower lecithin, gelatin, salt, natural flavors, soy lecithin, cocoa, sucralose." "NATURAL AND ARTIFICIAL FLAVORING. EXCESSIVE CONSUMPTION MAY CAUSE A LAXATIVE EFFECT (DUE TO MALTITOL). NOT A LOW OR REDUCED CALORIE FOOD." UPC Allergen Statement "Contains: Milk, soybeans. Manufactured in a facility that also processes: Wheat, gluten, peanuts, tree nuts and sesame.&...

    €316 (Avg Bid)
    Acil
    €316 Ortalama Teklif
    42 teklifler

    ...different products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructur...

    €2575 (Avg Bid)
    Özellikli
    €2575 Ortalama Teklif
    37 teklifler