Copy protect memory cards jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
Job State
2,835 copy protect memory cards jobs found, pricing in USD

I have an excel document I want to sell. I need to be able to protect this document from being distributed without authorisation. I want this product to be able to be used on both mac and windows computers. As there are macros enabled in the document, I would ideally like a standalone platform where people do not need a recent version of excel installed

$241 (Avg Bid)
$241 Avg Bid
17 bids

Requirements: 1. Provided excel file must only will works on 1 PC/Laptop...cant disable macro's or bypass it. 6. The excel file are worksheet protected, and it only allows certain cells to edit. Client must not able to copy out any details 7. Any other suggestion to protect the excel file are welcome, or we might add as we hit the milestones.

$151 (Avg Bid)
$151 Avg Bid
10 bids

I created a python exe file using pyinstaller. I need some consulting how to do protect my exe file.

$437 (Avg Bid)
$437 Avg Bid
33 bids

need some one who is working in C expert in data structure memory allocation is ready to fix a major program

$4 / hr (Avg Bid)
$4 / hr Avg Bid
7 bids

I have a DDos attack on a dedicated server (Whm) that contains several Wordpress websites, I'm looking for a sys Admin, to protect thus server, install Fail2ban / config symlink ... and detect the wordpress security flaw.

$181 (Avg Bid)
$181 Avg Bid
36 bids

...experienced eBook writer who is very skilled in creating and organizing content for one eBook. I would like to have an eBook written on Solar Eclipse, Why and How, What to do to protect Eyes, Complete Guide to 2017, Some Photos of Eclipse Glasses. 2000 Words about 10 pages with some photos - Looking for a complete guide Need it done ASAP! - No Cover

$59 (Avg Bid)
$59 Avg Bid
5 bids

...experienced eBook writer who is very skilled in creating and organizing content for one eBook. I would like to have an eBook written on Solar Eclipse, Why and How, What to do to protect Eyes, Complete Guide to 2017, Some Photos of Eclipse Glasses. 2000 Words about 10 pages with some photos - Looking for a complete guide Need it done ASAP! - No Cover

$64 (Avg Bid)
$64 Avg Bid
25 bids

READ CAREFULLY BEFORE REPLY About 2 weeks ago, our Menu from the dashboard got one of these messages: Fatal error: Allowed memory size of .... I know something about this problem so I increased the memory size from 64MB to 256 in all of the usual suspect places: the [url removed, login to view] file, the wp_config file, added a line to the. htaccess file, and I even

$111 (Avg Bid)
$111 Avg Bid
46 bids

The object of this project is to develop an AR game using UNITY and Vuforia. The game in priciple is a memory game (like in: [url removed, login to view]+Training+Vegetables and instead of vegetables each card has an AR animation like in the video: [url removed, login to view]

$2780 (Avg Bid)
$2780 Avg Bid
40 bids

The object of this project is to develop an AR game using UNITY and Vuforia. The game in priciple is a memory game (like in: [url removed, login to view]+Training+Vegetables and instead of vegetables each card has an AR animation like in the video: [url removed, login to view]

$941 (Avg Bid)
$941 Avg Bid
15 bids

I have some image files of Scotland scenery taken on a Sony a5100 ILCE-5100L which have become corrupted when the camera memory card became full. The last photo I tried to take of a castle then corrupted the other pictures so that when i try to open them with file recovery software all i see is a low resolution thumbnail of the castle. But all the other

$152 (Avg Bid)
$152 Avg Bid
9 bids

The lab report topic will be relating sleep quantity to cognitive performance. Instructions, methods and results are attached. 2000 words, ~8-10 references, APA format

$83 (Avg Bid)
$83 Avg Bid
31 bids

...understanding of execution plan analysis and query tuning • Expert-level performance troubleshooting skills using variety of approaches (DMVs, Perfmon, Profiler, wait stats, memory pressure analysis, etc.) ...

$641 (Avg Bid)
$641 Avg Bid
25 bids

PS: Please don't waste my/your time and bid if you don't understand the requirements I'm currently using nginx HLS for live streaming and protecting it with http_secure_link_module (ip + expiry time protection) so the link is like http://ip/hls/[url removed, login to view] But still this link can be played on vlc (for the same ip who generated the link) , so what I want is to ...

$162 (Avg Bid)
$162 Avg Bid
12 bids

We have a droplet in the digital ocean for 4gb & 60gb, and traffic is far lesser than to manage this kind of server, but Memory & Cpu is suddenly shooting up to 100% & then our site shows database error, So after whenever we log in to CWP Control panel, after that it gets resolved automatically, we need to find the bug & resolve it.

$30 (Avg Bid)
$30 Avg Bid
24 bids

Hello, My web site is under a ddos attack for the second time today. I will want a full protection and i want to know how did this.

$395 (Avg Bid)
$395 Avg Bid
25 bids

Consulting Hi, my team is looking for someone to help implement Proguard and smali an existing android app. Requirements • Proguard • Smali • Android Objectives/Details • Implement proguard. • Implement smali. • Export signedAPK after decompile, edit and recompile.

$50 (Avg Bid)
$50 Avg Bid
5 bids

I have various pieces of software that i want to install on separate VMs and allow people to borrow for a limited time. The perfect software would allow me to give someone a usb drive with the VM on it and then on a certain time/date render the software, VM or both unusable. It would need to be able to stay active even if the VM was copied and not just rely on the time on the VM so if they kept ch...

$472 (Avg Bid)
$472 Avg Bid
11 bids

Hello, I'm p...to develop a private undetectable MEMORY aimbot. It would require the coder to retrieve memory from the game and use that information such as where the enemy players are to control my players aim and point exactly at them. I am looking for someone with previous hacking exposure or at least c#/c++ knowledge / Memory based injection.

$1045 (Avg Bid)
$1045 Avg Bid
12 bids

...approach to designing this program is to establish a shared-memory object between the parent and child processes. This technique allows the child to write the contents of the sequence to the shared-memory object. The parent can then output the sequence when the child completes. Because the memory is shared, any changes the child makes will be reflected

$38 (Avg Bid)
$38 Avg Bid
11 bids