Encryptedtrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 encrypted trabajados encontrados, precios en EUR

    Hi, i have 1 sql file that was encrypted by ransomware virus with .cuba extension is about 1.8gb, I need some one with experience with this type of Ransomware. Thanks

    €137 (Avg Bid)
    €137 Oferta promedio
    21 ofertas
    I need a programmer Finalizado left

    Hello very good, I have a problem that I do not know how to solve, I have a compressed or encrypted image, I want to know how I can get the original information from the file, the image is encrypted so it only shows you a Preview of 600x600 when the original is 4000x6000.

    €128 (Avg Bid)
    €128 Oferta promedio
    6 ofertas

    The project is a two-sided and decentralized marketplace that facilitates a real-time Bid-Ask, creating an encrypted and unique identity for each product and transaction. This identity is then assigned to the new owner, tokenized, and stored on the blockchain. It is an alternative to traditional overly diversified e-commerce platform, specialized in dead-stock marketplace and web-based consignment stores for selling luxury items. What i need: - Two-sided and decentralized marketplace, designed with a mix as a normal marketplace and a trading webpage - Bid-ask system, this facilitates a real time transaction allowing users to Buy and sell products - Blockchain software that store the product and transaction on a portfolio so that, by virtue...

    €1650 (Avg Bid)
    Acuerdo de Confidencialidad
    €1650 Oferta promedio
    16 ofertas

    ...Necessary technologies: • NodeJs • Graphql • TypeOrm • Apollo • Typescript • JWT • Postgres / MySql Bugs to solve: • Having a table A related to B, making a query for A does not bring me the data for B • Having a table A related to B, I need that when saving data in A it also saves in B • Login: I need to fix the code and compare the user's pass with the encrypted pass in the database so that the user has permission to enter • To consult A or B the user must be authenticated. In other words, a token (JWT) must be passed. --------------------------------------------------------------------------------------------------------------------------------------------------------- Hola...

    €23 (Avg Bid)
    €23 Oferta promedio
    2 ofertas
    Desarrollar software Finalizado left

    I want to know the method of calculating RSA key from the attached data of a Conax Conditional Access System encrypted card. I am attaching the log of satellite viewing card in the post Quiero saber el método de cálculo de la clave RSA de los datos adjuntos de una tarjeta encriptada de Conax Conditional Access System. Estoy adjuntando el registro de la tarjeta de visualización por satélite en la publicación

    €20 / hr (Avg Bid)
    €20 / hr Oferta promedio
    8 ofertas

    ...in need of a professional who can assist in implementing a range of policies within Microsoft Intune to ensure the security, compliance, and productivity of my organization. - Security Policies: - Implement password complexity: Help us establish secure password policies to protect sensitive data. - Implement device encryption: Implement the necessary measures to ensure all devices are encrypted and secure. - Compliance Policies: - Data Protection: Develop and implement data protection strategies to comply with relevant regulations. - Industry-Specific Regulations: Implement and enforce regulations specific to our industry to avoid any non-compliance issues. To implement the specified policies in Microsoft Intune: Device-Specific Mail Access: Utilize Intune to restri...

    €105 (Avg Bid)
    €105 Oferta promedio
    8 ofertas

    ...building. - Document management module equipped with AI capabilities. This module should allow for collaboration, offer templates, and require approval with an activity log. - A signature module that supports e-signing of documents with a timestamp. - GDPR module to enable sensitive data encryption both in the system and the database using a PIN and password. - Report data generator that creates encrypted reports concerning requirements, activity logs, and milestones. - Milestones management - need to add sub-client module. there is client but need a subclient function. - An API library for developers and APIs for the new features to ease third-party integrations. Ideal candidate: - Proficient in Laravel & Machine Learning - Familiar with GDPR regulations and data e...

    €489 (Avg Bid)
    €489 Oferta promedio
    109 ofertas

    I'm looking for a professional who can help me encrypt the information on an SD card securely. The purpose of this encryption is to ensure that if someone tries to read the content outside of the Raspberry Pi, it'll be unreadable. Key Requirements: - Encryption Purpose: The primary use of this encryption is to secure data storage. - Data Access Method: The encrypted data should be accessible automatically on boot, without requiring additional steps like entering a password or using a physical key. - Data Sensitivity: The data to be stored on the SD card is highly sensitive, hence the need for robust encryption. The perfect candidate for this project should be highly skilled and experienced in: - Raspberry Pi projects - Data encryption techniques - Software and hardware ...

    €157 (Avg Bid)
    €157 Oferta promedio
    10 ofertas

    ✔Project Overview: We are seeking to develop a program that reads QR codes from multi-page PDF files and image files provided by our clients and extracts that data into CSV files. Due to format differences, existing AZURE OCR API have not met our requirements, necessitating a custom solution. ✔Specific Requirements: 1. Ability to read QR codes from multi-page PDF files, multiple PDF files, and image files such as JPGs and PNGs. 2. Capability to analyze the data within the QR codes and format it into CSV files. 3. Development must be done in either Python or JavaScript. ✔Skills Required: -Experience in development with Python or JavaScript. -Knowledge of OCR technologies and QR code reading techniques. -Experience in handling PDF and image processing. ✔Project Goals: The goal is to effic...

    €543 (Avg Bid)
    €543 Oferta promedio
    50 ofertas

    ...developer to construct my telemedicine app. The ideal professional should be fluent in dart and should have previous work in crafting intuitive, medical mobile experiences. Key features for the app include: - Online appointment scheduling: Users should have a streamlined process to book and manage their appointments. - Secure messaging: Confidentiality is the cornerstone of healthcare, thus an encrypted messaging system for users and doctors is paramount. - Prescription management: An intuitive platform where doctors can issue prescriptions and users can manage them is needed. - Video consultations: Incorporating real-time video consultations for a personalized doctor-patient interaction is a must-have. - Electronic Health Record: A comprehensive EHR system is essential for both...

    €31430 (Avg Bid)
    €31430 Oferta promedio
    153 ofertas

    The following features are important for the Smart Thermostat Valve: -There must be temperature and humidity sensors. -For double-sided communication between the thermostat and GateWay, it must be provided with RF 433 MHz communication protocol. -Must be powered by AAA or AA batteries. -Communication between devices should be encrypted for data security. -It should have low power consumption. -All source files must be shared at the end of the project. The Software Gateway requires the following: -Must be able to connect to the internet via Wi-Fi protocol via a Gateway. -The product must be controllable via mobile application. -It should include various automation modes. -The data in the sensors must be tracked during the time they are stored. -All source files must be shared at ...

    €25 (Avg Bid)
    €25 Oferta promedio
    4 ofertas

    ...Redaction: The tool should be proficient in blurring specific categories of sensitive information, such as Names, Addresses, and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that...

    €33 (Avg Bid)
    €33 Oferta promedio
    13 ofertas

    ...secure communication within a tight deadline of two weeks. Key project requirements: - Implement DTLS in C: The primary goal of this project is to introduce DTLS to an existing system for secure communication. - Tight deadline: This project needs to be completed within two weeks. Timeliness and reliability are crucial. I need the data coming from the server to the client over UDP socket to be encrypted with DTLS, and it should appear as DTLS in the protocol section of Wireshark. In addition, the code should be able to handle streaming video or live feed over the socket accordingly. This code should work in linux and windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is...

    €483 (Avg Bid)
    €483 Oferta promedio
    8 ofertas
    Memo Web Development Finalizado left

    ...notes into "PDF or JPG" format quickly, which will then be saved to their phone's photo library or their computer's download folder. When making notes, if users type "@" followed by a word, a corresponding image will automatically be inserted into the document. There will be multiple templates available for use. Users only need to enter their ID and password to register. Users' records will be encrypted with five layers of security to ensure that they are completely private. Biometric authentication (using fingerprints, facial recognition, etc.) will allow users to access their account without needing to enter their ID or password. Users can store up to 100MB of files in their folder. Relevant advertisements will appear at the bottom of the memo...

    €140 (Avg Bid)
    €140 Oferta promedio
    35 ofertas

    ...notes into "PDF or JPG" format quickly, which will then be saved to their phone's photo library or their computer's download folder. When making notes, if users type "@" followed by a word, a corresponding image will automatically be inserted into the document. There will be multiple templates available for use. Users only need to enter their ID and password to register. Users' records will be encrypted with five layers of security to ensure that they are completely private. Biometric authentication (using fingerprints, facial recognition, etc.) will allow users to access their account without needing to enter their ID or password. Users can store up to 100MB of files in their folder. Relevant advertisements will appear at the bottom of the memo...

    €137 (Avg Bid)
    €137 Oferta promedio
    11 ofertas

    I'm looking for a professional who can develop a system that will automatically backup my Filevine information to Microsoft OneDrive. Key Requirements: - Transfer data from Filevine...the following from the freelancer: - Experience with API Integration: You should be experienced with connecting and transferring data between different cloud services using their APIs. - Automation Skills: Ability to set up a system to carry out the backup process automatically to ensure my data is always up-to-date on the OneDrive. - Security: Ensure the entire process is secure and data is encrypted during transfer to maintain confidentiality. The task is a one-time project, it doesn't have to be a daily, weekly or monthly backup process. This should be a straightforward task for ...

    €2202 (Avg Bid)
    Urgente
    €2202 Oferta promedio
    18 ofertas

    ...Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption requests effectively for files of diverse range and types. To be successful in this role, you must display outstanding problem-solving abilities, logical reasoning, and a keen eye for detail. Experience in working on similar cryptographic coding...

    €16 (Avg Bid)
    €16 Oferta promedio
    3 ofertas

    I need a highly skilled programmer who can build an encrypted, single-file script that can be deployed remotely on any Windows workstations across the globe. Key Responsibilities: - The script should be able to click tabs and enter data on a specific program without being observed by the users. - The script must run in the background, avoiding any user interface. - The file needs to be encrypted for top-level security. Ideal Skills and Experience: - Proficient in scripting for remote software interaction - Experience with Windows OS interfaces - Strong understanding of encryption methodologies - Capable of creating stealthy, non-UI scripts.

    €125 (Avg Bid)
    €125 Oferta promedio
    8 ofertas

    I have a highly encrypted XLSM file that I urgently need help with. This specific project involves making VBA in the file visible. I need someone with advanced VBA skills and experience in cracking down highly encrypted XLSM files. Key requirements: - Expertise in VBA for Excel - Experience with highly encrypted XLSM files - Ability to make VBA visible in such files Please only apply if you have previous experience in this area and can start immediately. BID NOW!!! Serious freelancers only with the skills since it is ASAP!!

    €5 / hr (Avg Bid)
    Urgente
    €5 / hr Oferta promedio
    14 ofertas

    ...server-side logic. 4. **Payment Processing:** - Integrate a secure payment processing system that supports multiple payment methods and currencies. - Implement transaction and payment tracking systems to ensure transparency and security. 5. **User Authentication and Security:** - Develop a secure login system with multi-factor authentication. - Ensure all data transmissions are encrypted and comply with GDPR and other relevant privacy regulations. 6. **SEO and Analytics:** - Optimize the website for search engines to increase visibility. - Implement analytics to monitor user interactions and platform performance, aiding iterative improvements. 7. **Maintenance and Testing:** - Conduct thorough testing across different browsers and devices t...

    €2123 (Avg Bid)
    €2123 Oferta promedio
    177 ofertas

    ...and conveniently. Key Features: Remote Access: Users can access the platform from anywhere and at any time via desktop or mobile devices, allowing for maximum flexibility. User Profile: Each user, both client and attorney, will have a personal profile where they can view personal information, activity history, and shared documents. Secure Document Exchange: The platform provides a secure and encrypted system for exchanging sensitive documents between attorneys and clients. Documents are uploaded, shared, and stored securely to ensure confidentiality. Integrated Communication: The platform includes integrated communication tools, such as instant chat and internal messaging, to facilitate communication between attorneys and clients without resorting to external means. Case Manage...

    €455 (Avg Bid)
    €455 Oferta promedio
    65 ofertas

    I'm searching for a dedicated and experienced developer to create an OTT chat app that runs on the web and features RSA encryption for maximum security. This isn't just any chat app; it needs to have several intricate functionalities. Key Features: - Encrypted Chat: The primary function of the app is secure messaging. You should have good knowledge of applying RSA encryption techniques to ensure all messages are secure and private. Using OTR or PGP key. - Group Chats and Media Sharing: The app should allow users to create group chats, inviting multiple people to join and communicate together. Within these group chats, users should be able to share media files securely. - Video Call Group: Another desirable feature is the ability to have group video calls. This will r...

    €542 (Avg Bid)
    €542 Oferta promedio
    99 ofertas

    I'm in need of a skillful deve...received an email from TNT ... quote There is a change coming to the TNT RTT API, this is what you use to get pricing for shipping on your online store or internal system. Please have this email directed to whomever controls the online portal: You are currently using the ASP version of the RTT service, and we need customers to move to our .NET version. This will require that the XML payload is URL encrypted, note there is no change to the content of the XML just how it is presented. I have included the newer spec doc but it should be a simple process. endquote I am at a loss on how to update or replace this extension. The links in the email take me to a blank page. The attachment is confusing, but you might be able to make sense of it. What el...

    €5 / hr (Avg Bid)
    €5 / hr Oferta promedio
    11 ofertas

    I am seeking a skilled developer to upgrade our Tsmdc Telangana Sand Booking Extension Portal website. The main goals are to increase efficiency and enhance security. Key Additions a... Experience in security features like two-factor authentication and data encryption is a plus. A portfolio showcasing previous similar projects would be highly advantageous. Security Enhancements: - **Two-factor Authentication:** Implement a robust two-factor authentication system to enhance security and protect user accounts. - **Encryption of Sensitive Data:** Ensure that sensitive data is encrypted and secured to prevent any unauthorized access. I am looking for a professional with expertise in web development, particularly in creating and integrating online payment systems, developing mobile ap...

    €19 / hr (Avg Bid)
    €19 / hr Oferta promedio
    13 ofertas

    I'm in need of a skillful ...received an email from TNT ... quote There is a change coming to the TNT RTT API, this is what you use to get pricing for shipping on your online store or internal system. Please have this email directed to whomever controls the online portal: You are currently using the ASP version of the RTT service, and we need customers to move to our .NET version. This will require that the XML payload is URL encrypted, note there is no change to the content of the XML just how it is presented. I have included the newer spec doc but it should be a simple process. endquote I am at a loss on how to update or replace this extension. The links in the email take me to a blank page. The attachment is confusing, but you might be able to make sense of it. What el...

    €488 (Avg Bid)
    €488 Oferta promedio
    93 ofertas

    ...Moderation - **4.1 Managing Posts** - Admins can delete any reviews deemed inappropriate or not compliant with platform policies. - Admins can perform CRUD operations on posts to edit or update details as needed. General System Requirements - **Security** - Implement secure authentication and authorization mechanisms. - Sensitive data such as user emails and phone numbers should be encrypted. - **Performance** - The system should handle multiple users simultaneously without significant performance degradation. - **Scalability** - The system should be scalable, capable of handling an increased load of users and data entries as the platform grows. - **Usability** - The interface should be user-friendly and accessible on multiple devices, including smartphones and...

    €228 (Avg Bid)
    €228 Oferta promedio
    94 ofertas

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    €152 (Avg Bid)
    €152 Oferta promedio
    39 ofertas

    I'm looking for an experienced developer to create a web-based application focused on real-time fund transfers using UPI protocols. ...efficiently. - **User Interface Elements**: The key focus here should be on an interactive transaction history. Users should be able to easily track and monitor their transactional activities within the app. - **Security Features**: Implementing two-factor authentication is non-negotiable. Please ensure that the application is extremely secure, and that all data associated with transactions is encrypted and protected. Ideal candidates should have prior experience in developing applications that handle financial transactions and have a strong understanding of UPI protocols. An eye for user experience and a keen sense of security are crucial fo...

    €211 (Avg Bid)
    €211 Oferta promedio
    13 ofertas

    I need ...role will entail implementing encryption on our data. Key Responsibilities: - Generate an encryption key. You’ll be responsible for creating a robust and secure encryption key. - Implement Database Encryption. Utilise your Django expertise to seamlessly integrate encryption without compromising the performance or accessibility of our database. - Maintain Data Format. It is critical that the encrypted data retains its original format. Ensure that no distortions occur during this process. Ideal Skills: - Proficient in Django - Knowledgeable in database structures and encryption - Proven ability to generate secure encryption keys - Experience in ensuring data integrity during encryption If you have the above skills and can provide high-quality results, I look forwar...

    €63 (Avg Bid)
    €63 Oferta promedio
    11 ofertas

    ...device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable without crashes, etc) - Mus...

    €472 (Avg Bid)
    €472 Oferta promedio
    43 ofertas

    ...of a professional to help me fortify the security of the videos on my WPLMS website. Currently using IDM, students can download videos. My client DOES NOT wish to use any 3rd party Video hosting services like YouTube, Screen Pal etc. All videos should get hosted in the website hosting account Key Requirements: - Implementation of Video Encryption: I need the videos on my WPLMS website to be encrypted to prevent unauthorized downloads. This is a crucial aspect of the project and must be handled with the utmost care and expertise. - Domain-Level Access Restrictions: I am also considering implementing domain-level access restrictions as an additional layer of security. This, combined with video encryption, will help in preventing unauthorized access and downloads. Specifics: - T...

    €92 (Avg Bid)
    €92 Oferta promedio
    88 ofertas

    ...happened, a malicious executable was automatically installed on the user’s computer and quickly crawled the entire network, encrypting data. By the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact ...

    €18 (Avg Bid)
    €18 Oferta promedio
    95 ofertas

    I need help recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affected files. The files are encrypted, and I need them recovered in their original format. Key Requirements: - Specialized in encrypted file recovery - Proficiency in data recovery from partially operational servers - Experience with document recovery and decryption It's important that the freelancer has the necessary skills and tools to recover the encrypted documents from my server without causing any further damage. The recovered files should be in their original, uncorrupted format.

    €112 (Avg Bid)
    €112 Oferta promedio
    5 ofertas

    ...skilled .NET Core and Angular developer to collaborate on the creation of a secure, on-demand video playback platform. Here are the key features required for the project: - **Video Streaming:** The platform will facilitate hosting and streaming of pre-recorded videos. Live streaming functionality is not necessary. - **Video Encryption:** Ensuring the security of the content, all videos must be encrypted to prevent unauthorized access. - **Secure Playback:** It's imperative that users cannot download videos through inspect elements or any other means, ensuring the integrity of the content. - **User Registration and Authentication:** The platform should offer robust user registration and authentication functionalities, allowing users to create accounts and log in securely. P...

    €82 (Avg Bid)
    €82 Oferta promedio
    20 ofertas

    ...video playback platform with the following features: Note : If you already have sample demo project, in which users cannot download videos through inspect element using any option. Please connect me immediately. • Video Streaming: The platform will host and stream pre-recorded videos. No live streaming is required. • Video Encryption: To prohibit unauthorized access, the videos need to be encrypted. • Secure Playback: It's crucial to me that users won't be able to download videos through inspect elements or any other methods. • User Registration and Authentication: The platform should allow users to register and log-in. Prior experience with video streaming apps will be a definitive plus. Your bid should include a realistic time frame. I apprecia...

    €114 (Avg Bid)
    €114 Oferta promedio
    16 ofertas

    I'm looking for an expert in website development, specifically utilizing Drupal, who can integrate a user registration and login feature into my website. Key Requirements: - Develop user registration and login functionality with a simple and straightforward approach. The process must be intuitive yet secure. - Ensure user data is safe, by implementing encrypted database storage. Knowledge of data encryption methods and understanding on how to implement them is crucial. Ideal Skills: - Drupal Web Development - User Registration/Login Implementation - Database Encryption Techniques - Knowledge of User Privacy Measures I am open to suggestions on how to make this process as easy as possible for users without compromising on security. Your expertise and understanding of buildin...

    €461 (Avg Bid)
    €461 Oferta promedio
    203 ofertas

    I am seeking a highly experienced developer to create a quantum encrypted crypto wallet, cbdc exchange, and p2p transactions. The core feature of this wallet will be its ability to securely make transactions with cryptocurrencies. The wallet needs its functionality to be accessible both as an app and a website. The app should be compatible with both Android and iOS platforms, thus requiring proficiency in cross-platform app development. Key quantum encryption technologies for integration include: - Quantum Key Distribution (QKD): To ensure secure encryption keys are used. - Quantum Side-Channel Attacks Protection: To ensure robust defense mechanisms against potential quantum attacks. - Quantum Secure Direct Communication (QSDC): To allow direct transfer of cryptocurrency ...

    €4274 (Avg Bid)
    €4274 Oferta promedio
    32 ofertas

    This job requires an experienced Mechanical Engineer for a specialized analysis and troubleshooting project. Phase 1: Data Collection and Processing The initial phase entails gathering crucial data fr...will be examined and potential failure modes will be investigated. Based on expected corrosion rates, incremental thickness loss progression of the tank walls can be incorporated into the shell finite element model. Based on the failure mode, an investigation into time to failure predictions will be investigated. All finite element simulations and prediction data estimates will be stored on an encrypted hard drive. I wil provide the Matlab code of the tank model and geometry description. Please message me with previous work example and proper explanation of the work that how will ...

    €663 (Avg Bid)
    €663 Oferta promedio
    25 ofertas

    With an aim to leverage the power and efficiency of HL7 for hospital usage, I need a proficient developer to create a secure server that is cloud based. The server should be crafted in a way that integrates HL7, placing a strong focus on data security, as we will be storing confidential patient information. Key tasks to undertake include: - Implementing encrypted data storage and retrieval, ensuring integrity and confidentiality of patient data. - Setting up HL7 message parsing and processing, enhancing data interoperability. - Facilitating user authentication and access control via role-based access control, limiting system access to authorized personnel only. To meet these tasks, you should bring a proven familiarity with encryption methods and SSL/TLS certificates to secure ...

    €124 (Avg Bid)
    €124 Oferta promedio
    11 ofertas

    I am looking for an accomplished app designer, experienced with IOS and Android, with the main functionality being the management of electronic signatures and encrypted QR codes. Additional Features: * User login * File Sharing * General Validations * Location Identification Your skillset should ideally include a working knowledge of these features, as well as a keen eye for intuitive design. I do have a design in mind for the application and your input and recommendations to bring this vision to life will be appreciated. The application is intended for general users, thus the interface and functions should be user-friendly and easy to understand. Applicants who can showcase previous work involving similar functionalities would be viewed favourably. Your creativity, reliabili...

    €2180 (Avg Bid)
    €2180 Oferta promedio
    124 ofertas

    ...enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum...

    €272 (Avg Bid)
    €272 Oferta promedio
    27 ofertas

    I am seeking a proficient coder with experience in Android app development, End-to-End Encryption, and Firebase to secure my chat application using Virgil Security SDK. Key requirements include: - Integration of End-to-End Encryption: App already supports sending and receiving messages. The challenge is ensuring this process is safely encrypted without disrupting the user experience. - Retaining Real-time Chat Functionality: The encryption layer must not affect the current Real-time chat functionality. Capacity to handle this is critical. - No Interface Changes: This project focuses purely on backend security. Explicit indicators for encryption are not needed. Ideal candidates will have a track record of successful encryption integrations on mobile applications. Experience ...

    €301 (Avg Bid)
    €301 Oferta promedio
    30 ofertas

    I'm looking for a skilled data entry specialist with experience using the Riot Games API. My project involves finding new Twitch streamers, cataloguing their Twitch Channel URL and gaming accounts. Specific data points required include encrypted puuid, league account region, game name, tagLine, and encrypted summonerId. Responsibilities: - Add new Twitch streamers to database by searching internet - Manage streamer profiles by updating vital information Ideal Skills and Experience: - Experience with Riot Games API - Experience with data entry - Knowledgeable about Twitch and gaming statistics - Ability to present data in table format Understanding of Twitch and the gaming industry would be advantageous. Accuracy, attention to detail, and punctuality with tasks are...

    €5 / hr (Avg Bid)
    €5 / hr Oferta promedio
    15 ofertas

    Here's what I'm specifically looking for: A bot that buys and sells solana tokens. Setup the wallet in the bot, either securely create wallet or import PK We send by post/get instructions on buying and selling tokens 1. we need a secure encrypted wallet (possibly have a wallet generation on the bot, or pass it a Private KEY - whatever is easier) 2. we can buy or sell automatically by sending the wallet address,contract address, amount in sol, slippage, gas parameters. by POST or GET 3. we should be using the popular dex such as raydium,jupiter etc. (dex that memecoins are usually located for fast swaps) 4. when the transaction goes through, we need to send back results such as TXID, price, and fees etc, so we can log things. Implementation within a month is idea...

    €260 (Avg Bid)
    €260 Oferta promedio
    19 ofertas

    ...pricing structure may vary based on the duration of the chat or other criteria determined by the admin. 3. *Gift Requests*: Similar to a girlfriend, AI Infused can request gifts from users. These gifts may include virtual items, tokens, or real-world products. 4. *Privacy and Security*: The chat room will prioritize user privacy and data security. Personal information shared during chats will be encrypted and stored securely. 5. *Emotional Responses*: AI Infused will be programmed to provide empathetic and emotionally engaging responses, enhancing the user experience and mimicking a real-life relationship dynamic. 6. *Customizable Interactions*: Users may have the option to customize interactions with AI Infused, such as setting preferences for conversation topics, tone, and ...

    €139 (Avg Bid)
    €139 Oferta promedio
    12 ofertas

    ...compatible with iOS, Android, and Web platforms. Key project requirements: - High video quality: The SDK should support high-definition video calls to ensure clear and crisp visuals for users. - Low latency: It is crucial for the video call experience to be smooth and without any perceptible delay. The SDK should be able to maintain a low latency level to ensure real-time communication. - Secure and encrypted communication: Data security is a top priority for my application. The video call SDK should have robust security features to keep all calls secure and private. Additional features: - Recording capabilities: One of the key functionalities I would like to include is the ability for users to record their video calls. This feature should be seamlessly integrated into the SDK...

    €672 (Avg Bid)
    €672 Oferta promedio
    17 ofertas

    I require the following task to be completed: STEP ONE: TAKE TWO ARGUMENTS; INPUT AND INDEX. if INDEX is undefined; then do the following: CALCULATE (DO NOT USE BRUTEFORCE); the alphabetically sorted set of the string in order of all its variances in...ONE: TAKE TWO ARGUMENTS; INPUT AND INDEX. if INDEX is undefined; then do the following: CALCULATE (DO NOT USE BRUTEFORCE); the alphabetically sorted set of the string in order of all its variances index and store the index. STEP TWO: Find the string with the most repititions. Return the index and string with most repitions. If INDEX is defined; then do the following. CREATE THE STRING FROM THE ENCRYPTED STRING AND INDEX. Return the original String,. Please only post a quote if you are capable of doing this job! Sorry I can only pa...

    €22 (Avg Bid)
    €22 Oferta promedio
    25 ofertas

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    €11 (Avg Bid)
    €11 Oferta promedio
    1 ofertas

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Oferta promedio
    15 ofertas

    Principales artículos de la comunidad encrypted