Blowfish encrypt decrypt jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 blowfish encrypt decrypt jobs found, pricing in USD

    I'm experiencing a critical issue with the Let's Encrypt SSL on my WHM server; it's not performing accurately on my website. I'm running Alma Linux and WHM Cpanel on my current server. It was working a few days ago but suddenly stopped working so I think the autorenew wasn't set up correctly. Note we are NOT using for SSL installation This is an immediate need and bidding freelancers should be prepared to start work as soon as possible. Necessary skills and experience: - Proven experience with Let's Encrypt SSL - Proficiency in WHM server management - Strong knowledge of Alma Linux - Ability to troubleshoot and resolve this issue promptly I'm looking for an experienced system admin who can swiftly diagnose and resolve this SSL issue....

    $17 (Avg Bid)
    $17 Avg Bid
    24 bids

    I'm looking for a professional who can help me encrypt the information on an SD card securely. The purpose of this encryption is to ensure that if someone tries to read the content outside of the Raspberry Pi, it'll be unreadable. Key Requirements: - Encryption Purpose: The primary use of this encryption is to secure data storage. - Data Access Method: The encrypted data should be accessible automatically on boot, without requiring additional steps like entering a password or using a physical key. - Data Sensitivity: The data to be stored on the SD card is highly sensitive, hence the need for robust encryption. The perfect candidate for this project should be highly skilled and experienced in: - Raspberry Pi projects - Data encryption techniques - Software and hardware ...

    $176 (Avg Bid)
    $176 Avg Bid
    11 bids

    ...automation algorithms to streamline repetitive tasks such as campaign scheduling, audience segmentation, and content personalization. Continuously optimize marketing strategies based on real-time feedback and performance metrics. Security and Compliance: Ensure data privacy and regulatory compliance by implementing robust security measures and adhering to relevant regulations such as GDPR, CCPA, etc. Encrypt sensitive data, enforce access controls, and conduct regular audits to mitigate security risks. Benefits: Enhanced Customer Engagement: By delivering personalized experiences and targeted messaging, the system fosters deeper engagement and loyalty among customers. Improved Marketing ROI: By focusing resources on high-value segments and optimizing campaign performance, the sy...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    10 bids

    This is a Yii2 that has 90,000 screens as each page is 3 screens. We need a stable platform to use the processes coded in Html and java to update the databases. We need to keep the PHP version current. We need the new database documented page by page and process by process. There are 2 sites An individuals site. It has these services Member Services Act as an Agent for WebPicID Family-Protection-Service Identity theft fraud loss reduction Membership Merchant Membership Notification Payment Options Refer an organisation to sign up with WebPicID Safe Purchase Secure Message Merchant Services Identity Theft Fraud Loss Reduction WebPicID can Reduce ID Theft Fraud Losses and associated operating costs by at least 50%. WebPicID detects the ID Theft after the sale is paid for; before shipp...

    $397 (Avg Bid)
    $397 Avg Bid
    75 bids

    Hello, I have a file with the ending .algo and I would like to encrypt it and possibly equip it with a software license so that it works with a key. The file has already been written by me and I need precise instructions from you on how to do everything myself using the following software:

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    10 bids

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the W...the overall project development cost, the tools/language/SDKs to be used, and an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...

    $774 (Avg Bid)
    $774 Avg Bid
    13 bids

    Our company has been active in the field of solar photovoltaics connected to the network for 15 years. We have created an IoT device that sends data using MQTT and pub/sub. Our infrastructure is on AWS and GCP. Our device is able to communicate with a few different devices/...protocols themselves are very similar. We need to be compatible with more products and to make everything work in sync with our current set up. The data is sent to GCP. It consists in frames that need to be decrypted and stored in a mongoDB database. It also sends some information so that the system can understand what kind of frame was sent and how it should be decrypted. Most of the code used to decrypt and store the data is written in GO. We need help implementing these new "protocols" in ...

    $625 (Avg Bid)
    $625 Avg Bid
    25 bids

    I'm seeking urgent improvements for my MailEnable (v.10.48) email server. Mail server installation exists and works fine without SSL/TLS. Server is Windows 2019, access allowed via AnyDesk (or Teamviewer) Main task: - install certificate into mailserver, - allow mail-client to use it which all protocols (POP/IMAP/SMTP) Optional task (no need much time): - help me to set "timeout" of webmail access (it seems that now a session is unlimited) - help me to understand how I can customize webmail access if the mail server is configured to answer to more than one domain. Low budget available.

    $134 (Avg Bid)
    $134 Avg Bid
    14 bids

    ...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...

    $96 (Avg Bid)
    $96 Avg Bid
    26 bids

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    $156 (Avg Bid)
    $156 Avg Bid
    8 bids

    ...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    52 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $164 (Avg Bid)
    $164 Avg Bid
    39 bids

    I need a professional to install an SSL certificate from Punch Salad website. The primary purpose is to improve the security of the site and to encrypt user data. Key requirements include: - Assisting in obtaining a suitable SSL certificate, as I do not possess one at the moment - Expertise in SSL installation for blog/personal websites Ideal candidates would have prior experience in SSL installation, especially in the context of personal or blog websites. Excellent communication skills and the ability to explain the installation process in plain terms would be greatly appreciated.

    $27 (Avg Bid)
    $27 Avg Bid
    37 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $351 (Avg Bid)
    $351 Avg Bid
    14 bids

    ...deployed to a single device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable withou...

    $508 (Avg Bid)
    $508 Avg Bid
    43 bids

    ...rXXBrtQaPUmTFFagUsOyVsKdgLKy6NuF6qy4qbdaeiPq64uWJM3GEfo+VOXfwrc4 r6O5f6PL8TP1INrayhgU45RpeUbdJIdgwXP7iif2GrHiQaAHP+ADFSO2ormIKktw SE0QvdGNDSMEciP8iEYw4MidrcrjSGULDSTjqeMWMwy1G7WbHZ2cn/sp+sGmbPNJ 2JxS3w65mwTuBx1+phK7ugPuD7F+5rkRyYw32MfqPhtfuwza84o5hslCNDo3N7jW NQIDAQAB -----END PUBLIC KEY----- `; function encrypt(plaintext) { var crypt = new JSEncrypt(); (PUB_KEY); return (plaintext); } """) # Execs the function "encrypt" with texto as parameter encripted_text = ("encrypt", texto) return encripted_text #### Here the MAIN script try: stringpassword = 'here the password' result= encriptar(stringpassword) print(result) except Exception as e: print(e) ### END OF CODE ######### ...

    $45 (Avg Bid)
    $45 Avg Bid
    29 bids

    I'm in need of a thorough encryption of my entire website to protect sensitive user data, ensure secure user communication and align with industry regulations...industry regulations. I am open to using the necessary encryption technologies that will meet these needs such as SSL/TLS, HTTPS, IPSec, or others as recommended. Specifically, I want to encrypt: - User login credentials - Payment information - Personal user data The perfect candidate would have strong experience in various encryption technologies and a keen understanding of strict security protocols for user data. Knowledge of industry regulations regarding encryption and user data security is crucial. Please demonstrate your experience with similar past projects, highlighting your strategy to encrypt various...

    $149 (Avg Bid)
    $149 Avg Bid
    58 bids

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    $24 (Avg Bid)
    $24 Avg Bid
    3 bids

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    $134 (Avg Bid)
    $134 Avg Bid
    61 bids

    ...experienced freelancer to install Odoo 17. The installation should operate under a pre-existing domain in AWS Route 53, and needs to be SSL-protected using Let's Encrypt SSL. Your key tasks will include: - Installing Odoo 17 on Ubuntu server - Domain setup on AWS - SSL protection via Let's Encrypt - Installation of specific Odoo 17 modules: Sales Management, Inventory Management, Customer Relationship Management and Point of Sale. Relevant skills and experience include: - Expertise in Odoo 17 installation, with a deep understanding of Odoo module architecture - AWS and Ubuntu server knowledge - Experience with Let's Encrypt SSL certification - Familiarity with AWS Route 53 for domain setup With these capabilities, you're the reliabl...

    $190 (Avg Bid)
    $190 Avg Bid
    39 bids

    ...leverage its capabilities for quantum computing. - Developing cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the n...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    I require a qualified professional to install Odoo 13 on my Ubuntu server. The installation must operate under secure Let's Encrypt SSL protection and be associated with a currently active domain on our AWS Route 53. Features: - Complete installation of Odoo 13 - Configuration for public access - Configuration of chosen modules - Sales and Invoicing, Inventory Management, and Point of Sale Ideal Skills and Experience: - Proficiency in server management, specifically Ubuntu - Extensive understanding of AWS Route 53 - Expertise in securing domains with SSL Certificates - Solid experience with Odoo 13, focusing on the Sales and Invoicing, Inventory Management, and Point of Sale modules. Above all, the successful candidate should demonstrate a proven track record installing a...

    $141 (Avg Bid)
    $141 Avg Bid
    46 bids

    The module "Pubkey encrypt" was developed for Drupal 8 during google summer code 2016. Php advanced, so did Drupal and as a consequence the code is not compatible with Drupal 10 at this moment. I seek a seasoned Drupal developer who can go through the code, update it to be compatible with the latest php 8.3 and Drupal 10.2. Since this module depends on encrypt_seclib, which appears to be a wrapper for , you need to update that too. Also ensure, that this module still works with the updated versions of the Encrypt and the Key module. Please note that pubkey_encrypt did not work on a test installation of drupal 8.9 with php 7.4. This was

    $147 (Avg Bid)
    $147 Avg Bid
    25 bids

    ...URL (what would you name them). Complete the following <Sender Email> <Subject> Dear (Name), Email body that would make the recipient click the attachment or a URL (choose one) and list within your email. Why did you choose this approach? Project 2: Using a secure email feature Description: Basic email lacks many privacy features. However, settings are available that allow users to encrypt and control emails. In this project, you will configure Google Gmail to send and open confidential emails. Launch your Gmail email account. Click Compose to open the New Message screen to create a new email message. In the To field enter the address of someone who also has a Gmail account. In the row of icons at the bottom of the New Message screen, click the icon th...

    $16 (Avg Bid)
    $16 Avg Bid
    6 bids

    I'm currently looking for an experienced and full-time Senior DotNet Core Developer for a position that requires expertise in API encryption and system integrity checking. Since this is a web-based system, having solid experience in this area will provide a substantial advantage. Key Responsibilities: - Develop using DotNet Core - API's Development - Encrypt existing APIs - Perform regular checks to ensure system integrity The ideal candidate should have: - Extensive experience in API encryption - Proficiency in DotNet Core development - Proven experience in maintaining web-based systems Given the sensitive nature of the project, having a strong background and understanding in data encryption and security is absolutely critical. You will be handling confidential i...

    $1188 (Avg Bid)
    $1188 Avg Bid
    99 bids

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    $12 (Avg Bid)
    $12 Avg Bid
    1 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    15 bids

    ...to pilots - Add Finals rounds / Heats and update format on website - Add Series standings - Add filter to pilot and channel drop downs - Modify round/heat view and update status - Make Leader board sorting dynamic, add profile pictures - Add Team profiles, leader boards, and functionality - Add Race Event functionality, race type and leaderboard tracking - update contact us to email address - ENCRYPT database schema for storing user data, event information, and voting records. - Implement the admin panel for basic CRUD (Create, Read, Update, Delete) operations on events and heats. - Build the front-end views for user profile creation and event browsing. **Milestone 3: Dev Testing** **Milestone 4: Prod Testing and Refinement** - Perform thorough testing of all MVP features, incl...

    $549 (Avg Bid)
    $549 Avg Bid
    54 bids

    ...program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Se...

    $115 (Avg Bid)
    $115 Avg Bid
    44 bids

    ...development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, includin...

    $132 (Avg Bid)
    $132 Avg Bid
    49 bids

    ...different products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructur...

    $2746 (Avg Bid)
    Featured
    $2746 Avg Bid
    37 bids

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decrypt at output. At no point will the firmware itself be decrypted. This will enhance security and protect the firmware from potential tampering or unauthorized access. I am keen on improving the overall safety of my system, and thus value someone who understands the essence of addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decr...

    $1276 (Avg Bid)
    Featured
    $1276 Avg Bid
    6 bids

    Do NOT bid if you are not clear on the project. Do Not bid if you did not read the entire project. Bids which come in under 3 minutes from posting will be reported to freelancer as fake bids because it is not possible to read all the documentations in under 3 minutes. Receive data many gps devices. Decrypt data Upload to Mysql ( about 10 fields) Create the ability to to send instructions to gps even from a remote device by api Protocol is JT808

    $272 (Avg Bid)
    $272 Avg Bid
    13 bids

    ...to input their date of birth, along with required backend and frontend adjustments. 5. **Refer and Earn Page Enhancement:** Improve the refer and earn page functionality by enabling users to submit one or more mobile numbers as references. This requires modifications in both frontend and backend/server-side scripting. 6. **Contact Encryption and Storage:** Develop a feature to read contacts, encrypt them using mobile numbers as keys, and securely store them in an encrypted format in a MySQL database on the server. 7. **VAT to GST Replacement:** Replace all instances of the term "VAT" with "GST" throughout the project, including Android, iOS, and PHP components. (Only replace the display word "VAT" with "GST") **Deliverables:** - Detaile...

    $70 (Avg Bid)
    $70 Avg Bid
    5 bids

    ...Modifications:** Perform required modifications for white labeling as outlined in the installation documents. 4. **Refer and Earn Page Enhancement:** Enhance the refer and earn page functionality by allowing users to submit one or more mobile numbers as references. This necessitates both frontend and backend/server-side scripting. 5. **Contact Encryption and Storage:** Develop a feature to read contacts, encrypt them using mobile numbers as keys, and securely store them in an encrypted format in a MySQL database on the server. 6. **VAT to GST Replacement:** Replace all instances of the term "VAT" with "GST" throughout the project, including Android, iOS, and PHP components. 7. **Android Application and Server-side Script Modifications:** Perform necessary ...

    $18 - $150
    Sealed
    $18 - $150
    11 bids

    I need a Grafana expert to help installing and configuring a Grafana instance on a VM: - Use the Percona PMM solution to setup a Grafana instance to monitor a MySQL instance - Setup SSL using automatically renewing Let's Encrypt certificates using DNS-01 challenge method - Configure the Grafana instance to allow SSO using Azure AD - Additionally install plugins to allow monitoring a Windows server and .NET application So basically you need knowledge about: - Grafana - Linux - Docker - Let's Encrypt - Azure AD - MySQL - Percona PMM Would need you to document and describe every step, so we can easily repeat on our production environment. Please let me know if you have knowledge about the mentioned subjects and how you would like to approach this project.

    $473 (Avg Bid)
    $473 Avg Bid
    42 bids

    ...script should request some user inputs during execution for things such as domain name, passwords, database setup etc etc - The bash script should install all the requirements in frappe for ERP Next. - Yarn often needs to be installed before frappe and not included, this can be done with 2 commands. sudo apt-get install yarn sudo npm install --global yarn - System should also install Let's Encrypt with snap The ideal freelancer for this project should have: - Proven experience working with bash scripting on Linux-based systems. - Working knowledge of ERPNext and its respective modules. - Ability to create scripts that allow for user inputs. Your input will directly affect the success of this project

    $144 (Avg Bid)
    $144 Avg Bid
    32 bids

    ...can consistently deliver captivating and insightful articles about personal finance, specifically tailored to the interests and concerns of young adults. Key Responsibilities: - Provision of one (1) thoroughly researched and well-articulated blog post on a weekly basis. - Each article should efficiently cover topics on Budgeting or Debt Management, helping young adults navigate these fields - Encrypt elements of fun, relatability, and simple-to-understand contents that resonates with young adults making complex terms and ideas easily digestible. Ideal Skills and Experience Required: - Native Spanish speaker with strong written communication skills - Proven experience in writing for personal finance, specifically budgeting and debt management - A good understanding of the ne...

    $99 (Avg Bid)
    $99 Avg Bid
    24 bids

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works well, however, it decrypts file into binary data which is saved on hard disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced

    $47 (Avg Bid)
    $47 Avg Bid
    7 bids

    I'm looking for a seasoned Windows developer who can create a client app tailored for business use. The key functionalit...encompass: - User registration and login: The app should conveniently register and authenticate users. - Real-time messaging: Facilitate real-time communication to boost productivity. - File sharing: Users should be able to share files with each other without hassle. - File security and encryption system: At the heart of it all, the application needs to uphold security and privacy. The app must encrypt files when sharing and storing, ensuring business information remains confidential. Ideal candidates should have experience in developing secure applications, particularly on Windows platforms. An understanding of business needs and demands in the digital s...

    $341 (Avg Bid)
    $341 Avg Bid
    10 bids

    ...time to provide a seamless user experience without significant delays. 3.2 User Experience: Design a user-friendly interface that simplifies the process of extracting images and aligning positions. Provide clear instructions and visual cues to guide users through the image-based setup process. 3.3 Security: Implement security measures to protect user-uploaded images and ensure data privacy. Encrypt image data during transmission and storage to prevent unauthorized access. 4. Additional Considerations: Explore options for integrating additional features such as image recognition and augmented reality to enhance the visualization of chessboard positions. Conduct usability testing with students to gather feedback and identify areas for improvement in the image extraction and posi...

    $219 (Avg Bid)
    $219 Avg Bid
    6 bids

    ...to check if it has internet access before it will load (maybe just a simple ping to a Google server like 8.8.8.8 will do it). - The app needs to generate a password based on the 2 variables entered. It should be no more than 10 characters long. - Whatever method the app uses to generate the password, it always needs to stay the same (as we'll be using the same app to generate the password and encrypt the PDF before sending it out). So for example, if we run the app with the client code ABC and passphrase ProjectBottle110 and the password the app generates is X@044s9se!1, then the password needs to always generate as X@044s9se!1 every time the app is run and client code ABC and passphrase ProjectBottle110 is entered. - We will provide an SMTP server, user and password for you...

    $205 (Avg Bid)
    $205 Avg Bid
    33 bids

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    $41 (Avg Bid)
    $41 Avg Bid
    6 bids

    I need an expert who's able to decrypt an old .accdb MS Access database for which the encryption key was lost. The database contains precious client information and business transaction data that I want to incorporate into our current database. Here are more specifics of the task: • Database Conversion: The old database structure and relationships are somewhat important, so would ideally be maintained during the conversion process. However, some changes can be considered if necessary for integration. • Data Integration: Both client information and business transaction data from the old database should be incorporated into the current one. As a preference, if the data can comfortably fit, have it provided in an Excel spreadsheet. • Data Cleaning: There's ...

    $161 (Avg Bid)
    $161 Avg Bid
    27 bids

    I want to decrypt a single Java File (.jar)

    $22 (Avg Bid)
    $22 Avg Bid
    10 bids

    ...urgently require an adept professional who is experienced in configuring SSL on WHM servers. I am currently operating an Alma Linux server with Cpanel but can't access Cpanel as the SSL cert date is incorrect I need Let's Encrypt SSL set up *correctly* so all domains auto renew (as it has always been in the past) Therefore, I need a sharp and prompt freelancer specialised in the following: - Linux server maintenance and administration. - Efficient in managing WHM servers. - Solid experience and knowledge in SSL certificate procurement and installation. Particularly, Let’s Encrypt would be preferred. - Ability to ensure that all the websites are SSL secure following the correct installation. Candidates with prompt responses and proven track records in si...

    $18 (Avg Bid)
    $18 Avg Bid
    13 bids

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $24 (Avg Bid)
    $24 Avg Bid
    6 bids

    im looking for Android Java class that does the following 1. generate...PrivateKey privateKey; public RSAUtil() { // generate public and private keys } public String getPublicKey() { // return base-64 version of the public key } public void setPublicKey(String base64PublicKey) { // set the public key from the server } public String encrypt(String plainText) { // use my private key to encryopt the data } public String decrypt(String encryptedText) { // use the servers public key to decrypt the data } } Need the corresponding class in C# .NET 4.5.2 that works with this java class. The android java code should use java 8, gradle plugin version 4.2.2 and gradle version 6.7.1 in android st...

    $35 (Avg Bid)
    $35 Avg Bid
    12 bids

    Zimbra Auto SSL Configuration with Let's Encrypt

    $26 (Avg Bid)
    $26 Avg Bid
    1 bids