Decrypt enc file windows jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    3,407 decrypt enc file windows jobs found, pricing in USD

    ...demonstrate client/server communication. It can be both command line apps. Server app will be running and listening Client will create xml file or xml document and send it to the server (encrypted) Server decrypt the xml document, edit it and send back to the client (encrypted) Server should be able to deal with more clients at one time That is all

    $164 (Avg Bid)
    $164 Avg Bid
    42 bids
    Decrypt streams link 4h left
    VERIFIED

    Hi, I want get from directv the links, iam able to get this link but is with token and some other limitation, I need a clean line, I can provide you an account to you can try get other links and clean: [login to view URL],kabc,_fw_ae,,auth,1,_fw_nielsen_app_id,TF98B5EB1-E7FE-51D1-E040-070AAD31558A&ad._v=2&ad.flex=0&ad.access_level=1&ddp=1&v=3&ad.pingf=2&expand=drmOff...

    $178 (Avg Bid)
    $178 Avg Bid
    8 bids

    ...Class Test Private Sub TESTRUN() Dim s As HttpWebRequest Dim enc As UTF8Encoding Dim postdata As String Dim postdatabytes As Byte() s = [login to view URL]("[login to view URL]") enc = New [login to view URL]() postdata = "username=Anthony&password=Extreemjay77

    $28 (Avg Bid)
    $28 Avg Bid
    10 bids
    export data base Ended
    VERIFIED

    i have a Android app which has an encrypted database of phone numbers in it. decrypt and export to excel and you get the money

    $1097 (Avg Bid)
    $1097 Avg Bid
    46 bids

    ...selected key. Then the files would be uploaded to a offlite drive – Icloud, Google Drive, Dropbox, etc. The app will have an option to download a backup decrypt and decompress it to a selected file path. The app will also have an option to overwrite the last backup on every backup interval or keep the last x backups in the drive to eliminate storage

    $544 (Avg Bid)
    $544 Avg Bid
    13 bids

    ...use, transmitting information as quick as light. We have to show both uses, military one and spacial one. The system is very fast (Light speed), secure and impossible to decrypt, so very useful for military confidential communication, for secret services, governmental agencies. On one side;, we have to show that present confidential communications

    $190 (Avg Bid)
    Guaranteed
    $190 Avg Bid
    8 entries

    ...information with a table, edit, view, delete, this will be for UserSpice 4.3.23 cms ***i want it all to be Using PHP “openssl_encrypt” and “openssl_decrypt” to Encrypt and Decrypt Data*** there will be 3 fields name (textarea) value"onsite" Or value"offsite" (radio) cost (DECIMAL(19,4);) CREATE TABLE materials ( id INT AUTO_I...

    $92 (Avg Bid)
    $92 Avg Bid
    45 bids

    ...Secure messaging program that will register user & hash pwd in sqlite3 db. Users can login, send encrypted msg using refined key, see number of messages, select message, and decrypt using predefined key. Using crypto++ or similar library is req. Program must be run via command line....

    $454 (Avg Bid)
    $454 Avg Bid
    13 bids

    Hello I want to Decode this [login to view URL] If you can decrypt it tell me

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    Hello I want to Decode this [login to view URL] If you can decrypt it tell me

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    Hello I want to Decode this [login to view URL] [login to view URL] [login to view URL] If you can decrypt it tell me

    $15 (Avg Bid)
    $15 Avg Bid
    1 bids

    ...Features - a. Restrict / allow printing b. Restrict / allow copying data of specified volume c. Restrict / allow adding new data to specified volume d. On-fly Encrypt / decrypt file contents of volume. e. Facility to restrict data access I. Duration based i.e. within specified dates. II. Count based i.e. allow only 'n' times. f. Multi volume support

    $1257 (Avg Bid)
    $1257 Avg Bid
    5 bids

    ...my temp drive on my server it stopped the FTP to SQL load process. Today we have a script that uses FTP to FTP, Cleopatra t0 Decrypt and a separate script to load to SQL. None of this happening today because when the bat file tries to run in the morning it errors our immediately. I know this isn't a difficult fix but its beyond my area of expertise

    $147 (Avg Bid)
    $147 Avg Bid
    3 bids

    i have a file in format of msg.db.crypt12.

    $1018 (Avg Bid)
    $1018 Avg Bid
    2 bids

    Vpn Pc app Recode change payload encryption make own encrypt decrypt app for payload and json file

    $211 (Avg Bid)
    $211 Avg Bid
    2 bids

    ...in [login to view URL] file. This values not are real values because i previosly make encrypted with my modulus D and N (this process i make in Windows PC with special tool) So i want implemented in oscam source rsa function for decrypt this boxkey and rsakey (encrypted previosly with my privates keys N, D). This keys must be decrypt in memory with

    $127 (Avg Bid)
    $127 Avg Bid
    3 bids

    ...in [login to view URL] file. This values not are real values because i previosly make encrypted with my modulus D and N (this process i make in Windows PC with special tool) So i want implemented in oscam source rsa function for decrypt this boxkey and rsakey (encrypted previosly with my privates keys N, D). This keys must be decrypt in memory with

    $185 (Avg Bid)
    $185 Avg Bid
    3 bids

    ...perl program that can encryp and decrypt text. An example of encryption is that "a" becomes "z", and "b" becomes "y" and so on, or whatever shifting algorithm you can devise. The input file is any readable text file that is to be encrypted. When this input file is run against the encryption program, it encrypts the file...

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    helllo looking for someone who can convet JAVA code (10 lines) to php the code decrypt a a string into json object

    $21 (Avg Bid)
    $21 Avg Bid
    32 bids

    Need custom bootloader for SAMD21G18 to load firmware updates from SD card and decrypt. Also need matching pc app to encrypt updates before distribution. Basically need to combine the SD SPI bootloader from this project: [login to view URL] combined with the security features from this project:

    $1534 (Avg Bid)
    $1534 Avg Bid
    24 bids

    ...Support about your username account, you should use the instagram App , When you want to contact technical support, your user name must be associated with your device. I want to decrypt this code by creating an application that can associate any username I want to contact technical support , I need make the app can i Contacting with Instagram Support about

    $547 (Avg Bid)
    $547 Avg Bid
    29 bids

    ...From Port Mirroring which thru Manage Switch (TAP(Test Access Point) or SPAN (Switch Port Analyzer Port) 2. Search Engine Index Those unstructured Network Messages, Filter, Decrypt based on those Macing Messages 3. Breakdown & Parsing those Network Messages from Physical Layer,  Socket Layer & Data Layer which XML,  SOAP, HTML, Native Mode and ISO8583

    $2586 (Avg Bid)
    $2586 Avg Bid
    12 bids

    I have a video file encrypted using [login to view URL] with the method SAMPLE-AES. Here is the info #EXT-X-SESSION-KEY:METHOD=SAMPLE-AES,URI="skd://4caba1e9-ff99-41c0-9d3a-b741d0a67ba5",KEYFORMAT="[login to view URL]",KEYFORMATVERSIONS="1" Please bid only if you can perform the task. If you get awarded and complete the task

    $194 (Avg Bid)
    $194 Avg Bid
    2 bids

    This project is for a C# .NET Console App which visits the following 8 URLs, parses out the "current" fuel surcharge amount and writes it to a text/ini file in a format as shown below. The URLs are: URLs (assume we always want the top row, if applicable): **************************************************************** [UPS] https://www.ups.

    $155 (Avg Bid)
    $155 Avg Bid
    13 bids

    1. Secure data and encrypt using private keys as Read only, no delete, update or edit. 2. Source of origin, Date&Time stamp. 3. decrypt data with using the specific keys, add user.

    $790 (Avg Bid)
    $790 Avg Bid
    7 bids

    Hi, this is a simple socket programming project. We already have the connection and everything set up, you just have to help us send a HMAC to the server, the server would decrypt it if it is correct or else it would reject it. Text me up, if you wanna talk in detail!

    $34 (Avg Bid)
    $34 Avg Bid
    7 bids

    We have a -JTL*shop*system and wanna move to WooCommerce shop system. We also wanna move the custommer account d...their account. But the problem is: J T L encrypt the data for field "password" with a blowfishkey. your Job is: decrypt the customer data (password) with from us provided blowfishkey and send us all data as a csv file or sql-file.

    $193 (Avg Bid)
    $193 Avg Bid
    16 bids

    Unique Advertisement We want to hire...experience 11) Location tracker advertising data show experience & exp. in local host 12) Fast data processing from backend to frontend with syncronization and decrypt data 13) Real time chatting service 14) User activity track report management 15) Extra work allowance

    $11491 (Avg Bid)
    $11491 Avg Bid
    19 bids

    ...GREAT ENGLISH SKILLS PROJECT INFO: 1. ACCOUNT CHECKER 2. IMPORT COMBO 3. IMPORT PROXIES 4. BE ABLE TO CONVERT BYTE TO BINARY AND DECRYPT THE RESPONSE 5. CAPTURE INFORMATION. I will provide you with a .saz file from a fiddler captured request so you can have some understanding of the project. You must be knowledged and show some kind of proof

    $253 (Avg Bid)
    $253 Avg Bid
    20 bids

    Don't show me other apps in cover letter. I need to list all installed apps on iPhone. You should very familiar with encrypt/decrypt process regarding the image file. I will share more details via private interview.

    $241 (Avg Bid)
    $241 Avg Bid
    22 bids
    Web server Ended
    VERIFIED

    ...user identifies it; the public key plays the role of the user's address. Each message is encrypted with the public key (address) of the addressee, so only the addressee can decrypt it. The mini-server can receive messages in two ways: -either directly from a customer, -by synchronizing with a peer, that is, another instance of the same server of

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    13 bids

    This is a java project and Task is: As an Admin, i want to t...an Admin, i want to track which user has read my .txt encrypted file which i will encrypt and share to users to decrypt and read. Each user will declare that they have read that file. I want to be able to know with certainly which user has read the file and which have not read the file.

    $144 (Avg Bid)
    $144 Avg Bid
    25 bids

    ...GPG da seguinte forma: func GPG_Generate_Keys() { ... return PrivateKey and PublicKey } func encrypt(text, PublicKey) { ... return encryptedcontent } func decrypt(encryptedcontent, PrivateKey) { ... return text } é um app com versão de código fonte em GoLang e em Javascript, com as mesmas funções...

    $447 (Avg Bid)
    $447 Avg Bid
    2 bids

    i looking for wireshark expert for teach me how decrypt ssl traffic

    $175 (Avg Bid)
    $175 Avg Bid
    7 bids

    i want a java program to hide text...hide text in an image using LSB and decrypt the text using MD5 the program WITHOUT interface the program works as follows: encrypt function takes a string and encrypted using MD5 and hiding it in an image. decrypt function takes an image and return the hidden text that decrypted using MD5 and decrypt it.

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids

    anyone can encryp my auto script file or selling encryp decrypt file for my auto script

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids

    ...(String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The user can prepare the symmetric-key to be securely exchanged with other parties through implementing suitable security algorithm. 4. The interface should

    $191 (Avg Bid)
    $191 Avg Bid
    20 bids

    ...are nonce (you can see a pattern of repetition) and last 16 bytes are tags because the total payload increased by 24 bytes after encryption. The problem is that I cannot decrypt successfully with my hypothesis, the GCM will fail because of invalid authentication tag. The cipher text are received from UDP datagram, maybe they pad final bits if they

    $604 (Avg Bid)
    $604 Avg Bid
    9 bids

    ...encrypted with AES CTR I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the IV/Nounce is included in the chipher I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the actual message will not be in

    $548 (Avg Bid)
    $548 Avg Bid
    12 bids

    ...nonce/IV or something since the first few bytes are all the same. Also the cipher blocks are all in different sizes and not in multiple of 16. I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the actual message will not be in

    $154 (Avg Bid)
    $154 Avg Bid
    7 bids

    The project is: Encrypt and decrypt using Java or C ++ programming languages important note : I do not want to write the code, There are online codes you should look for For more details, I will attach the file

    $142 (Avg Bid)
    $142 Avg Bid
    5 bids

    ...(String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The user can prepare the symmetric-key to be securely exchanged with other parties through implementing suitable security algorithm. 4. The interface should

    $122 (Avg Bid)
    $122 Avg Bid
    6 bids

    ...(String) to be encrypted/decrypted, and perform other relevant security functions. 2. The interface should allow the user to generate a symmetric-key, and then encrypt, and decrypt the messages. 3. The user can prepare the symmetric-key to be securely exchanged with other parties through implementing suitable security algorithm. 4. The interface should

    $38 / hr (Avg Bid)
    $38 / hr Avg Bid
    12 bids

    ...to decrypt the files. What I have done is kept the files as is on a secondary HDD in case a decrypter was created for it. I repartitioned and formatted primary HDD to rid of the ransomware. No issues since. I am looking for a knowledgable programmer that has a decryptor or can create a decryptor. I do have an original uninfected file and

    $105 (Avg Bid)
    $105 Avg Bid
    3 bids

    To protect mp3 file in ionic 3 going to encrypt file. If you are familiar with ionic and encrypt and decrypt please bid me. Also I have to play this mp3 file in my ionic 3 app. Thanks for your bid.

    $168 (Avg Bid)
    $168 Avg Bid
    8 bids

    ...like this software to be developed for Windows . I need some one to decide a way to disable the encryption of DRM-X and thus deactivate the encryption it applies to mp4 files , we should be able to play mp4 files without encryption based on licence generated by a username and password for that particular file, we also need to untie the safety mechanism

    $1500 - $3000
    $1500 - $3000
    0 bids

    Need an application developed in c# , where i can hide any file into a video/audio file without size restriction. Avi or mp4 for video is fine. select file to hide: select carrier file: set password to decrypt: ok.

    $430 (Avg Bid)
    $430 Avg Bid
    9 bids

    ...and connecting it to a device which starts transmitting the data. rs485 to usb converter cable + if we can connect OLD SMARTPHONE 2G sim to L&T meter, and write a code to decrypt the data + send it to a server. FYI- I DONT HAVE CURRENT SOFTWARE OF METER AS ITS LICENSED BY MANUFACTURER AND EXPENSIVE. Want to custom build one. Low cost solutions

    $558 (Avg Bid)
    $558 Avg Bid
    10 bids

    ...script that enable multiple users to encrypt and decrypt a file with a password. The password must be entered by the user via command line (not stored in the script). The encryption hash used must be SHA256. The script must have the ability to list multiple files in the index. When encrypting a file that is already in the index, have it replace the

    $23 (Avg Bid)
    $23 Avg Bid
    4 bids