Executable encryptiontrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 executable encryption trabajados encontrados, precios en EUR
    Api data info Finalizado left

    There is a software that sends authentication information to a WEB API, that server returns some authentication va...authentication values depending on the data sent by the authentication software, I need to know exactly how the data that the server returns to the software is generated, I have 2 examples real data sent to the server and received from the server I have been doing cryptographic tests but I have not been able to replicate exactly the same data. I need to find the exact algorithm or hash or jump or encryption that replicates the values that the web api sends to the software. You should not develop any software or project, just analyze the data that I will send you and tell me how it is generated so that I can generate new data with other new information. Any question S...

    €37 (Avg Bid)
    €37 Oferta promedio
    2 ofertas

    ...web application and PDF report generation functionality will be adaptable to a variety of mobile devices and tablets. Maintainability and Updates: The platform will be easily maintainable and allow for periodic updates to incorporate new features and improvements. Data Security: Robust security measures will be implemented to protect the integrity and confidentiality of stored data, including encryption and periodic audits. For example *Important* In addition to what has been mentioned before, I require the source code of the development Proyecto de Optimización para Centro de Distribución de Frutas Congeladas una aplicación web que realice cálculos precisos de peso, dimensiones y tipo de contenedor (10, 20 o 40 pies, considerando la necesidad de...

    €600 (Avg Bid)
    €600 Oferta promedio
    21 ofertas
    Proyecto codigo C++ Finalizado left

    The project consists of the development of a system that allows managing operations CRUD of at leas...screens. Implement the concepts of inheritance and polymorphism for defined classes. It is up to determine the manner in which the concepts of inheritance and polymorphism, which must be integrated at least for one of the classes. Final delivery An individual ZIP containing the following will be uploaded to the virtual classroom: • Program source codes • Executable file (it is the responsibility of those who deliver the project make sure an executable is delivered running on Windows 7 platform onwards and that all libraries are integrated. Files executables that do not work, they will be considered as incomplete projects and this will have an impact on the final gr...

    €37 (Avg Bid)
    €37 Oferta promedio
    3 ofertas

    ...datos del inventario para que se sincronice automáticamente. Para terminar, estos son los detalles generales del proyecto y hay más cosas necesarias dentro de la aplicación que agregar. Algo similar a las imágenes que se comparten pero moderno, intuitivo y que se pueda utilizar en diferentes plataformas ya que este solo es por servidor. - - - - - - - I need a multi-platform application or executable file (Windows, Mac OS, Android and IOS) for handling logistics and system for clothing stores. The application or the file must be intuitive and easy to use, simple, modern and beautiful. An application where you can view and edit clothing inventories by store and warehouse, view and edit the expenses of each store, view and edit all transfers made from...

    €1242 (Avg Bid)
    €1242 Oferta promedio
    29 ofertas

    ...(location and way of showing of these notifications) - Popups - Tipography - Colors - "Loading" image - Logo: We're already working on it with a freelancer - We have an idea of what other competitors are doing, so these inputs will be delivered to the contractor - The wireframes are not real implementations but it is necessary to have tools like Adobe XD, Axure or any other to have an "executable" to be followed by dev team. - Documentation or video is required to explain how the required elements are solved. It is greatly appreciated other UX elements necessary to understand the complete correlation of the user experience. Se require un wireframe (capa de ux) de una app de restaurantes para tablets y app windows. La misma ya ha sido desarro...

    €549 (Avg Bid)
    €549 Oferta promedio
    27 ofertas

    Recovery Tools for Endpoint Encryption

    €9 - €28
    €9 - €28
    0 ofertas

    Crear un generador de códigos QR que genere códigos QR con la siguiente información (string): Parámetros normales (que incluye cualquier generador de códigos QR gratuito en internet): SSID: Encryption: WPA/WAP2/WEP/None key: Hidden: checkbox to check if the SSID is hidden or not DHCP Para mayor información: Parámetros adicionales (que se solicitan): Proxy IP: Proxy port: Automatic configuration proxy: URL Pac IP settings: Static: IP, Gateway, netmask, DNS1, DNS2 Plataforma: El código QR debe ser compatible con: Android y IOS El generador de código QR debe ser similar a este proyecto: pero con todos los parámetros adicionales que se solicitan Condiciones de adjudicación: Se adjudicará

    €167 (Avg Bid)
    €167 Oferta promedio
    9 ofertas

    Develop a Blockchain private network for the registration and storage of real estate information, with the following functionalities: - Data verification of new requests against business rules. - Application of the rules of consensus and validation for the acceptance of a new transaction (there is no proof of work). - Connection with a time-stamping authority. - Digital signature and encryption of block information. Desarrollar una red privada basada en Blockchain para el registro y almacenamiento de información de inmuebles, realizando las siguientes funcionalidades básicas: - Verificación de datos de una nueva solicitud de registro contra las reglas de negocio. - Aplicación de las reglas de consenso y de validación para la aceptación ...

    €21 / hr (Avg Bid)
    €21 / hr Oferta promedio
    12 ofertas
    Desarrollar software Finalizado left

    ...sistema, se encuentre excluida, pudiendo así ejecutar de forma normal los archivos con las extensiones mencionadas anteriormente que allí se encuentran, debo indicar que el programa debe tener la capacidad para activar y desactivar la protección del sistema contra estos archivos ejecutables. la idea es que el software tenga capacidades similares al programa que "faronics" promociona de nombre "Anti-Executable faronics". Espero propuestas y el pago es de acuerdo a lo que puedan proponer en base a las necesidades básicas que solicito....

    €139 (Avg Bid)
    Urgente
    €139 Oferta promedio
    3 ofertas

    ...such file to load -- mysql /home/marcelo/.rvm/rubies/ruby-1.8.6-p420/lib/ruby/site_ruby/1.8/rubygems/:in `gem_original_require' /home/marcelo/.rvm/rubies/ruby-1.8.6-p420/lib/ruby/site_ruby/1.8/rubygems/:in `require'...................... Cuando doy 'gem install mysql' me dice : /home//.rvm/gems/ruby-1.8.6-p420..global/gems/executable-hooks-1.3.2/lib/executable-hooks/: warning: parenthesize argument(s) for future version ERROR: Error installing mysql: mysql requires Ruby version >= 1.8.7. Si uso la version ruby 1.8.7 (que ya tiene la gema Mysql instalada) como current no me arranca webrick o sea en el terminal se ve asi: ...-HP-Pavilion-15-Notebook-PC:~/Solunas$ rvm 1.8.7 ...-HP-Pavilion-15-N

    €100 (Avg Bid)
    €100 Oferta promedio
    4 ofertas

    ...touches of nature-hunting-world country but most wear brand that would be "urbanites". • The brand and logo should convey strength-joy-chic-simplicity. • The colors for the development of the logo must remind the rural-nature world. • The type of clothing will be quality, the style is casual but elegant-classic. • The logo will be embroidered on the clothes and therefore design should be "executable." For the election of freelance with which develop all, we need the freelance send us a couple of names for the brand and a little drawing or sketch of how he sees the mark. Keep in mind that we will continue working with him in developing the website and the online store using their full knowledge and creativity of our future brand. El ...

    €143 (Avg Bid)
    €143 Oferta promedio
    13 ofertas

    Busco una persona en Madrid con conocimientos profundos de BB para gestionar BES, MS exchange y Symantec encryption management server. También quiero crear un cliente VOIP para BB que soportaría ZRTP.

    €2670 (Avg Bid)
    €2670 Oferta promedio
    2 ofertas

    Hello, I need a software (whether an executable or web files) I explain: PlayStation Network devices can restore an account every 6 months, this is a limit that exists from the panel itself "" I would like to remove this limit reset all accounts I need without any time limit. Before making the final milestone I want proof that this works. People who try to deceive them denuncionaré FreeLancer.com Español//// Hola, lo que necesito es un software (no importa si es un ejecutable o archivos web) Os explico: PlayStationNetwork permite restablecer los dispositivos de una cuenta cada 6 meses, este es un limite que existe desde el propio panel "

    €535 (Avg Bid)
    €535 Oferta promedio
    2 ofertas
    File encryption Finalizado left

    File encryption

    €416 - €416
    €416 - €416
    0 ofertas

    ...enfoques de riesgo de TI y gestión de la seguridad, sobre todo desde la perspectiva de la planificación de la continuidad del negocio, la planificación de recuperación de desastres y planes de continuidad del servicio. - Excelente comprensión de entornos de infraestructura, con experiencia en el diseño e implementación de backup/recovery, failover/redundancy, data replication/de-duplication, media encryption, y/o cualquier otro servicio relacionado con continuidad y tecnologías de gestión de riesgos, técnicas y mecanismos. - Experiencia en gestión de programas y proyectos. - Conocimiento de los distintos requisitos de riesgo y cumplimiento y / o normas de procedimiento tales como SOX , SAS70/SSAE1...

    min €4618
    min €4618
    0 ofertas

    terminar un trabajo ejecutable que incluye una base de datos ademas de crear enlaces de comparacion

    €8 / hr (Avg Bid)
    €8 / hr Oferta promedio
    2 ofertas

    ... Remote diagnostics & config loads/uploads. If some 3rd party tools are used at runtime, our pre-approval, source codes and unlimited licenses be included, meeting our requirements given here. Please include some time to refine the scope. We shall expect a professional complete solution with reasonable expectations of a complete system including HW, SW, FW. As an option, 128 byte secure key encryption will be provided between tag and the reader. contact us if you need help. Product serialization for future version control & support. NDA will need to be signed - ensuring IP to be transferred to us and no use by freelancer of this solution anywhere. SW to simulate output and input for testing the system you will design. An internal (to the reader enclosure) PCB antenna, ...

    €986 (Avg Bid)
    €986 Oferta promedio
    4 ofertas

    ...target device - Keylogging - Screen recording - Call recordings - Listening to live microphone feed The ideal developer for this project should have experience in creating similar monitoring applications and a solid understanding of iOS security and privacy standards. In terms of data privacy and security, I want to ensure that the application follows best practices. This includes: - Data encryption - Secure server communication Additionally, I would like the user interface to be customizable to a basic extent. Simple modifications like changing colors and logos should be possible. This project involves creating an application that needs to be both highly functional and completely discreet. If you have experience in this area and are confident in delivering a reliable, secu...

    €1217 (Avg Bid)
    €1217 Oferta promedio
    40 ofertas
    Excel XLSM Password Recovery 6 días left
    VERIFICADO

    I need a professional who can help me recover a password for an Excel XLSM file. Key Requirements: - Recover a lost password for an Excel XLSM file - Ensure the process is secure and compliant with standard security practices - Maintain the integrity and functionality of the document post-password removal Ideal Skills: - Proficient in pass...who can help me recover a password for an Excel XLSM file. Key Requirements: - Recover a lost password for an Excel XLSM file - Ensure the process is secure and compliant with standard security practices - Maintain the integrity and functionality of the document post-password removal Ideal Skills: - Proficient in password recovery methods for Microsoft Excel - Experience in data security and encryption - Strong knowledge of Excel XLSM file...

    €15 (Avg Bid)
    €15 Oferta promedio
    15 ofertas

    As the owner of an advanced security level website, I am seeking professional hacking services to conduct thorough penetration testing. The key focus areas would be: - User Authentication Process: Probe for any weak links in our login and authentication systems. - Data Encryption: Assess the robustness of our data encryption protocols. - Server Security: Evaluate potential weaknesses in our server security. Ideal applicants would have significant experience with Python-based hacking tools and a proven track record in cybersecurity. Knowledge of advanced security measures and the ability to recommend improvements after testing is highly desirable. Please provide evidence of your skills and previous work in your application. Make sure your proposals are competitive yet fair.

    €594 (Avg Bid)
    €594 Oferta promedio
    7 ofertas

    ...calculator that accounts for distance-based and volume-based pricing. The calculator should be intuitive and easy for users to interact with. - Booking and Contact Forms: We need easy-to-use forms for customers to book our services and get in touch with us. - Security Features: Security is a top priority. The website should include SSL encryption, user authentication, firewall, anti-malware protection, two-factor authentication, security updates, CAPTCHA, and data encryption. The ideal candidate should be proficient in web development, with a strong background in creating responsive, user-friendly sites with similar booking and pricing functionalities. Experience with SEO optimization is a plus. Strong attention to detail, communication skills, and the ability to deliver ...

    €464 (Avg Bid)
    €464 Oferta promedio
    198 ofertas

    ...designed with a user-friendly interface and responsive design. Key requirements: - E-commerce functionality: The website should be able to handle a large number of products and orders. - Payment gateway integration: I'll need assistance in integrating a specific gateway, and open to suggestions based on your expertise. - Security: The website must be secure with proper SSL certification and encryption. - SEO-friendly: The website should be designed with SEO in mind, to ensure it's optimized for search engines. Skills and experience needed: - Proficiency in web development, especially with e-commerce sites. - Experience with integrating payment gateways. - Strong understanding of security protocols and SSL certification. - Familiarity with SEO best practices. Ple...

    €106 (Avg Bid)
    €106 Oferta promedio
    61 ofertas

    I'm seeking an SSL certificate expert to help integrate the SSL certificate within an inventory management software, which interacts with a fiscal printer. Key Respons...certificates, and experience in integrating them within software systems. - Software Integration: Experience with integrating software with hardware, especially printers, is crucial. - Inventory Management: Familiarity with inventory management systems, particularly with software that interacts with fiscal printers, will be a great advantage. - Security: A good understanding of network security, encryption protocols and best practices in ensuring secure communication between software and hardware is also essential. I look forward to receiving proposals from freelancers with a solid understanding of the abov...

    €461 (Avg Bid)
    €461 Oferta promedio
    97 ofertas

    I'm in search for an experienced Java programmer with a clear understanding of the .mp4 standard to build a code that encapsulates a data stream in a previously recorded video. Specific knowledge of Ffmpeg is needed. The task at hand mainly revolves around end-processing, as the text file needs to be submerged after the final video compression. The text file will be in the .srt format, and no encryption or compression will be required for this item. Ideal candidate should be familiar with handling these types of video data stream manipulations.

    €136 (Avg Bid)
    €136 Oferta promedio
    15 ofertas

    ...protocol for our own domain. Key Features: - Secure encryption: The software should offer robust encryption to ensure user data and communications are secure. - Spam filtering: A strong spam filtering system is a must to maintain a clean and secure email environment. - Custom domain support: The software needs to allow users to use their own domain for personalization. User Capacity: - The software is expected to support a user base ranging from 1000 to 10,000 users. Interface Preference: - The email service should have a web-based interface for user convenience. Skills and Experience: - Proven track record in developing similar email service provider software - Strong knowledge of SMTP protocol - Experience in implementing secure encryption and spam filtering ...

    €295 (Avg Bid)
    €295 Oferta promedio
    18 ofertas

    I have a Python script that I would like to turn into an executable file for Windows. This script needs to be reviewed and compiled so it can run efficiently. Additionally, the current tables in the script need to be fixed. The project also involves creating a GUI with multiple buttons for different actions. The ideal freelancer for this project should have: - Experience in Python scripting and GUI creation - Knowledge of compiling scripts into executable files for Windows - Strong attention to detail to identify and fix issues in the existing tables Please note that the GUI should be user-friendly and intuitive. Also, the compiled executable file should be able to run on a computer without the need for Python or any additional dependencies. Before you bid: Ans...

    €25 (Avg Bid)
    €25 Oferta promedio
    20 ofertas

    I'm in need of an experien...The server is running on Linux, hence a proficient understanding of this operating system is crucial. - The creation of this VPN server is from scratch, so a deep understanding of VPN server setup is required. - The VPN server's primary objective is securing data transfer, so a focus on encryption and robust security measures is essential. Ideal Candidate: - Extensive experience with Linux system administration. - Proven track record in setting up VPN servers. - Familiarity with data security and encryption protocols. - Strong understanding of networking principles. - Good communication skills to ensure a smooth setup process. This project requires someone who is meticulous, well-versed in Linux systems, and has a knack for implementin...

    €138 (Avg Bid)
    €138 Oferta promedio
    17 ofertas

    ******************************************************************* Send me a message proving to me that you have read the project. ******************************************************************* If you are familiar with AWS programming, this should be a ...-started Requirements: • I will create a new AWS free account and will supply credentials. • In my AWS account, configure any IAM role/policy/user/credentials needed to run the example program. • Change the example program to accept credentials (accessKey/secretKey) as arguments passed to the executable. • Ensure that the corrected code successfully converts the speech in the audio file to text using the AWS Transcribe service. Deliverables: • All source code • Instructions on executing exe...

    €186 (Avg Bid)
    €186 Oferta promedio
    15 ofertas

    Skills required Front-end: React or Angular for building a dynamic web application. Back-end: Node.js with Express for server management and API integration. Database: MongoDB or PostgreSQL for storing session data securely. Authentication: OAuth for handling secure authentication with streaming services. Technical Requirements and Development 1. Secure Auth...manage devices that can stream content, ensuring only authorized users can access the services during their stay. 3. Session Management: Ensure that user sessions are automatically ended upon checkout, or provide a simple way for users to log out when they are done watching. 4. Privacy and Security: Since the app will handle sensitive login information, ensure that the data is protected through encryption and secure network ...

    €720 (Avg Bid)
    €720 Oferta promedio
    61 ofertas

    I'm looking for a skilled develop...windows. Ideal Skills and Experience: - Proficiency in C: Extensive experience with C language is a must. - DTLS Knowledge: Prior experience implementing DTLS is highly preferred. - Security Background: Strong understanding of encryption protocols and data integrity is necessary. - Time Management: Ability to work under strict deadlines and deliver high-quality results promptly. Required Skills: Proficiency in C programming language Experience with UDP socket programming Knowledge of DTLS (Datagram Transport Layer Security) protocol Ability to implement encryption and decryption mechanisms Familiarity with video streaming or live feed protocols and techniques" Please include examples of similar projects you have successfully ...

    €455 (Avg Bid)
    €455 Oferta promedio
    9 ofertas

    If you are familiar with AWS programming, this should be a simple task for you. I have included an example C# solution using AWS Transcribe that I need to be working. Example Program: AWS ...-started Requirements: • I will create a new AWS free account and will supply credentials. • In my AWS account, configure any IAM role/policy/user/credentials needed to run the example program. • Change the example program to accept credentials (accessKey/secretKey) as arguments passed to the executable. • Ensure that the corrected code successfully converts the speech in the audio file to text using the AWS Transcribe service. Deliverables: • All source code • Instructions on executing executable with actual credentials

    €36 (Avg Bid)
    €36 Oferta promedio
    7 ofertas

    ATTENTION: This is not a project to create a 3D model. It's to create a sample mobile app in Flutter. I need a 3D object renderer programmed in Flutter for PLY files. The intended purpose is visualization rather than animation or virtual reality. The selected candidate should possess: - A strong knowledge of Flutter and 3D rendering techniques. - Previous experien...in creating high-quality renderers, as this project demands a high-performance level. The renderer should include the following functionalities: - The ability to rotate objects. - Zoom in and out capabilities. As an expert in this field, you're expected to provide advice on the best techniques and practices to achieve a high-quality 3D object visualization. The Flutter project need to be executable on b...

    €136 (Avg Bid)
    €136 Oferta promedio
    25 ofertas

    I'm looking for a skilled professional who can help me secure my Linux server and SMTP setup. Key Requirements: - Deep experience with Linux server security measures and best practices. - Proficient in securing SMTP servers and ensuring authentication is managed effectively. - Capability to implement SSL/TLS encryption for enhanced security. Your application should focus on detailing your experience in this field. Please provide relevant examples of previous projects where you've successfully secured similar systems.

    €15 / hr (Avg Bid)
    €15 / hr Oferta promedio
    23 ofertas

    I'm in need of a profici...developer who can help compile a Python code, that I have acquired from GitHub, into an executable format for Windows. As the client, I expect: - Understanding the existing Python code and its dependencies - Transforming the Python code into a Windows executable file Successful freelancers should provide a detailed project proposal illustrating how they plan to compile the code to exe on a Windows operating system. Though no specific Python libraries or frameworks were mentioned, a background in Python coding and debugging is paramount. The ideal freelancer should have a deep understanding of Python code, dependencies, and experience dealing with code from GitHub. Experience in generating Windows executable files from Python code wil...

    €26 (Avg Bid)
    €26 Oferta promedio
    23 ofertas

    ...Java Full Stack Developer to build a comprehensive application with the following features and requirements: - **Features and Functionalities** I need the application to have the following features: - User registration and login: A secure and user-friendly way for users to create accounts and log in. - Payment processing: A seamless payment processing system. - Data encryption: Robust data encryption measures to ensure user data is safe and secure. - **Design and UI/UX Requirements** I'm looking for a modern and clean design that is responsive and mobile-friendly. The interface should be intuitive and user-friendly, making it easy for users to navigate and interact with the application. - **Integration and Third-Party Services** I'd like to inco...

    €11 / hr (Avg Bid)
    €11 / hr Oferta promedio
    41 ofertas

    I am in need of a React Native developer to create a digital HR face recognition app for attendance marking. Key Requirements: - The app should be compatible with Android devices. It will not be deployed to iOS. - The facial recognition data should be secured with standard encryption. - No integration with existing HR software is needed. The ideal candidate should have experience with: - React Native and building mobile apps. - Implementing facial recognition technology. - Ensuring data security through encryption. I am open to suggestions and ideas on how to enhance the app's performance and usability. Looking forward to your proposals.

    €158 (Avg Bid)
    €158 Oferta promedio
    28 ofertas
    StrongSwan Tunnel Error Resolution 3 días left
    VERIFICADO

    I'm facing an issue with my StrongSwan tunnel. I would appreciate a talented freelancer to assist in troubleshooting ...Additionally, I'm getting 'No matching CHILD_SA config found for IP/IP. received DELETE for IKE_SA' on the responder side Your Role: - The primary task is to address and rectify the issues causing the tunnel failure - As of now, the problem seems to be primarily on the responder side Ideal Skills for the Job: - Proficient in StrongSwan VPN - Strong troubleshooting skills - Experienced in resolving encryption-related issues - Familiar with debugging and resolving tunnel failures I'm using a Pre-shared key for authentication. Prior experience with StrongSwan tunnel configuration would be a plus. The tunnel is up and ping ok but a moment ...

    €131 (Avg Bid)
    €131 Oferta promedio
    16 ofertas

    ...established conventions. - **Data Types**: Verify that the data types are correctly assigned and appropriate for each field. - **Indexing**: Check if indexes are set up and utilized effectively. Security Measures and CIS Benchmark Review: - **Authentication and Access Control**: Validate that the authentication mechanisms and access controls are properly implemented. - **Encryption and Data Protection**: Review the existing encryption measures and data protection strategies. - **Auditing and Logging**: Ensure that all actions are being adequately logged and audited. Specific Goals for the Review: - **Enhance Security**: Suggest enhancements to the current security measures. - **Optimize Data Storage**: Identify areas where data storage can be optimized without compromisi...

    €12 / hr (Avg Bid)
    €12 / hr Oferta promedio
    12 ofertas

    I would need a script written in nodejs where a USB NFC reader (specifically the ACR122U or the ACR125U) wait for a NTAG424 DNA tag. Once an NFC tag is tapped write a URL data into the tag as well as encryption keys. Make sure the URL contains query parameters which are mirrored uid, counter, and cmac that are all encrypted. Part of this is to write a nodejs script to validate the above parameters from the URL and decrypt the uid/counter (or some Rust that can do the same)

    €174 (Avg Bid)
    €174 Oferta promedio
    20 ofertas

    I need a skilled C# Winform .NET developer to protect my application using obfuscation techniques. The goal is to prevent reverse engineering and ensure the highest level of security. Key Requirements: - Implement Basic name mangling, Control flow obfuscation, and String encryption for the application. Ideal Skills and Experience: - Strong proficiency in C# and .NET framework - Prior experience with implementing obfuscation techniques - Knowledge of application security best practices This project is a great opportunity for a developer with a keen interest in application protection.

    €140 (Avg Bid)
    €140 Oferta promedio
    28 ofertas

    I am seeking an exceptional AI developer to cr... the AI system should be capable of calculations and analysis for private search purposes. - Incorporating specific AI functionalities: The private AI system should have a thorough understanding of natural language processing, image recognition, and predictive analytics. - Developing private search capability: I want the AI system to perform encrypted and anonymous search. End-to-end encryption should be ensured while performing any search and there should not be any user identifiers during searches. - Firewall configuration: The firewall configuration should only block incoming connections to maximize security. Special consideration will be given to applicants who have previous experience in AI security and firewall de...

    €729 (Avg Bid)
    €729 Oferta promedio
    29 ofertas

    I'm loo...download. - Installation: The installation could be a mix of fixed and remote installations, so you must have experience with both. Additionally, the system requires security features like encryption of sensitive data, secure remote access, and user authentication. Ideal Skills: - Prior experience in programming POS systems - Proficient in customizing user interfaces - Strong background in real-time inventory management - Knowledge of OS download for Ingenico iwl250 GPRS - Proven experience in installing POS systems remotely and on fixed locations - Expertise in implementing security features like encryption, secure remote access, and user authentication. If you have previous experience in similar projects and possess the skill set mentioned above, I�...

    €33 / hr (Avg Bid)
    €33 / hr Oferta promedio
    9 ofertas

    I'm looking for a developer to create a VPN application that will run on both IOS and Android. This application should support both SoftEther VPN Protocol and OpenVPN. Key features to be included: -Protocols: Support both SoftEther VPN Protocol and OpenVPN. - Data encryption: An essential feature for securing users' data - Kill switch: A crucial function that ensures users' internet traffic is cut off should the VPN connection fail - Multi-location support: The VPN should offer various server locations for users to connect to securely The ideal candidate should have experience in developing applications for both IOS and Android, as well as prior experience in VPN development. A strong understanding of network security concepts and protocols is a must. The ability to...

    €315 (Avg Bid)
    €315 Oferta promedio
    17 ofertas

    We are seeking a professional and experienced development team to build a comprehensive online marketplace for collectibles. The platform will include both web and mobile applications, providing users with the ability to buy, sell, trade, showcase their collections, and interact with other collectors. The project encompasses advanced features such as...optimization for better search engine visibility Mobile App Development: Development of native iOS and Android apps with all web platform features Seamless integration with the web platform to ensure a consistent user experience Push notifications for real-time updates, messages, and alerts User-friendly interface optimized for mobile devices Security Measures: Secure user authentication and data encryption Regular security audits a...

    €18 / hr (Avg Bid)
    €18 / hr Oferta promedio
    25 ofertas

    ...zones or subnets to isolate zones which handle client data 3) A specific "allow" list of clients that may connect to subnets hosting customer data (host to host ACLs) 4) restrict network interfaces on servers or workstations (Which process client data) from being connecting to more than one network at any time 5) encryption as well as data minimization when transferring data between tiers Key Requirements: - Incorporate security measures such as Firewalls, IDS/IPS, WAF, and encryption standards. The network diagram should be designed to prevent and detect potential security breaches effectively. - Implement user access controls, allowing different levels of access. User access should be defined based on endpoints, ensuring that only authorized users can access ...

    €132 (Avg Bid)
    €132 Oferta promedio
    22 ofertas

    I'm seeking expert to assist in configuring a Site-to-Site VPN on my Zyxel USG Flex 50, ensuring secure and reliable communication between our networks. Key Tasks: - connect to a already existing site - configure usg flex to not use dhcp and other option. just need vpn. i have a box behind Ideal Skills and Experience: - Proficient with Zyxel USG series - experience in VPN connection

    €149 (Avg Bid)
    €149 Oferta promedio
    11 ofertas

    ...on our online banking platform and payment gateways, ensuring that these areas are secure from potential cyber threats and vulnerabilities. We want you to prioritize three key security aspects: network security, data encryption, and user authentication. Your expertise should include: - In-depth knowledge of international banking and financial systems and transactions - Proven experience in cybersecurity assessment, penetration testing, and fraud detection - Specialization in online banking platforms and payment gateways - Strong understanding of network security, data encryption, and user authentication - Excellent communication skills and ability to report findings in a clear and concise manner - Up-to-date on the latest cybersecurity trends and threats in the financia...

    €52201 (Avg Bid)
    €52201 Oferta promedio
    12 ofertas

    ...online credit card initial deposits at time of scheduling and final payments featuring Vaulting to retain credit card details for future or ongoing appointments. A feature automation to fwd notifications client of booked appointment / via text / emails Pls review the attached samples. - User authentication: This should ensure that only authorized users can have access to information. - Data encryption: This will provide necessary security to protect sensitive data such as confidential business information and customer details. - Scheduling: The scheduling feature should be calendar-based, allowing users to easily follow-up appointments or tasks. - Credit card payments: The API should be able to handle secure credit card transactions without issues. similar to the attached I...

    €483 (Avg Bid)
    €483 Oferta promedio
    78 ofertas
    Linux Server Maintenance 2 días left
    VERIFICADO

    Hello^^^^. I'm using Amazon AWS and would like to request server maintenance. First of all, I would like to ask you to do as much as possible for server security and privacy, such as SSL installation, automatic backup once a day, DDOS attack prevention, system performance optimization, hacking prevention, encryption between data transmissions, real-time monitoring, data recovery, backdoor checking, backdoor checking and deletion of compromised files, attack root identification and blocking, suspicious process occupation identification and recovery, server hacking analysis, server access history tracking, password recovery and complexity setting, virus and malicious software checking,,data leakage prevention.....etc My current monthly budget is about $50, Please send me a prop...

    €119 (Avg Bid)
    €119 Oferta promedio
    28 ofertas