Decrypt wordpress md5 hash jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 decrypt wordpress md5 hash jobs found, pricing in USD

    ...&sd=true We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be configurable for other we...

    $91 (Avg Bid)
    $91 Avg Bid
    24 bids

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    $39 (Avg Bid)
    $39 Avg Bid
    7 bids

    ...menu=5&menu-item=UCFDocs We followed the instructions provided and implemented the following code using server-side Node.js. We utilized ngrok to enable HTTPS connections. We have successfully initiated a transaction using this code in the uploaded file. However, we encountered an issue retrieving the transaction, which should have been provided but is not available. We were advised to handle callbacks and decrypt the response, but we're facing difficulties in doing so. Handling callbacks and post-success payment URLs did not resolve the issue. We now need the transaction ID, which we are unable to obtain. We need someone who can do the final step here and complete the integration on the website. The website is in React Js and Node Js. The solution should be conf...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    50 bids

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened in Ado...

    $130 (Avg Bid)
    $130 Avg Bid
    36 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $162 (Avg Bid)
    $162 Avg Bid
    40 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $350 (Avg Bid)
    $350 Avg Bid
    14 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , login.h...Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attacks.

    $24 (Avg Bid)
    $24 Avg Bid
    33 bids

    ...deployed to a single device, so I will likely need help setting up LaunchPad, or bringing up the code in my own developer environment for self-install. The traffic capture going on is literally equivalent to what is already being done in published and approved App Store applications. I will only be capturing my traffic, so it is not confidential. No, this app will not be able to break encryption and decrypt securely encrypted data. (Freelancer requires me to make this statement explicitly in the project description because they have genuinely no idea how encryption actually works on a technical level.) Required skills: - Knowledge of an iOS app implementation language (ObjC or Swift) - Experience developing robust, well-functioning apps (buffering and saving data, stable withou...

    $503 (Avg Bid)
    $503 Avg Bid
    45 bids

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    90 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $113 (Avg Bid)
    $113 Avg Bid
    25 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    17 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $11 (Avg Bid)
    $11 Avg Bid
    3 bids

    This is a project to convert a complex file encryption/deencryption write in C++ to VB.NET (Framework 4.0)

    $24 (Avg Bid)
    $24 Avg Bid
    3 bids

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    $130 (Avg Bid)
    $130 Avg Bid
    63 bids

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    $29 (Avg Bid)
    $29 Avg Bid
    79 bids

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    $972 (Avg Bid)
    $972 Avg Bid
    59 bids

    ...cutting-edge algorithms to enhance the project's efficiency and security. requirements are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you shou...

    $293 (Avg Bid)
    $293 Avg Bid
    27 bids

    ...is to develop a permanent HWID (Hardware Identification) virtualizer capable of virtualizing various hardware IDs on a Windows-based system. Project Description: We require the development of a C++ program capable of permanently virtualizing the following hardware IDs: - Disks - Volumes - SMBIOS - UUID - BIOS Serial Number - Chassis Serial Number - MAC Address - CPU/GPU - TPM Module - MD5 - SHA1 - SHA256 - Memory - Windows Product ID The virtualizer should be designed to retain the virtualized HWIDs even after a system restart. A robust persistence mechanism should be implemented to ensure the virtualization is enduring. Furthermore, it is imperative that the program be cross-platform and compatible with various versions of Windows (10 & 11). Key requirement...

    $2248 (Avg Bid)
    $2248 Avg Bid
    34 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool within the specified timeframe.

    $12 (Avg Bid)
    $12 Avg Bid
    1 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    15 bids

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    $353 (Avg Bid)
    $353 Avg Bid
    19 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    $120 (Avg Bid)
    $120 Avg Bid
    56 bids

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    $145 (Avg Bid)
    $145 Avg Bid
    18 bids

    ...different products, then put his address files in etc. and finally the bot needs to create a crypto invoice for the cryptocurrency of choice at current price and wait for payment confirmation from the crypto pay gate. Finally, once the order is confirmed, the bot needs to process all order information into a .txt or .csv file and save it locally on the machine. The script should also be able to decrypt PGP encrypted address information automatically. 2) Some sort of APIs between the bot script and all the messengers desktop sessions listed above that allow the bot script to communicate with each messenger. The purpose of this is to allow running regular non-business, non-shop affiliated messenger accounts as effective bot shops. I do NOT want to use shop-affiliated infrastructur...

    $2746 (Avg Bid)
    Featured
    $2746 Avg Bid
    37 bids

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    $1051 (Avg Bid)
    $1051 Avg Bid
    138 bids

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decrypt at output. At no point will the firmware itself be decrypted. This will enhance security and protect the firmware from potential tampering or unauthorized access. I am keen on improving the overall safety of my system, and thus value someone who understands the essence of addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decr...

    $1276 (Avg Bid)
    Featured
    $1276 Avg Bid
    6 bids

    ...Developera który stworzyÅ‚ ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate correctly Engl...

    $111 (Avg Bid)
    $111 Avg Bid
    57 bids

    Do NOT bid if you are not clear on the project. Do Not bid if you did not read the entire project. Bids which come in under 3 minutes from posting will be reported to freelancer as fake bids because it is not possible to read all the documentations in under 3 minutes. Receive data many gps devices. Decrypt data Upload to Mysql ( about 10 fields) Create the ability to to send instructions to gps even from a remote device by api Protocol is JT808

    $272 (Avg Bid)
    $272 Avg Bid
    13 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    $13 (Avg Bid)
    $13 Avg Bid
    26 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    7 bids

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    $694 (Avg Bid)
    $694 Avg Bid
    16 bids

    I am in need of a Python application that will compute the md5sum of every file in a designated directory. This includes hidden files but subdirectories can be disregarded. The output function should be factored into it's own function (e.g. reportResult( dir, hashvalue ) ) and should be something similar to: < absolute path + filename > <md5sum> The application should run seamlessly on a Windows operating system. The output should simply print the computed md5sums; there is no need to store them in an external file. Requirements: - Proficient in Python - Familiarity with Windows OS - Knowledge of md5sum computation Completion is needed as soon as possible. This project is a great opportunity for someone highly skilled and efficient in Python programming.

    $24 (Avg Bid)
    $24 Avg Bid
    15 bids

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    $144 (Avg Bid)
    $144 Avg Bid
    13 bids

    ...receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication should support standard authentication. SMTP Server and POP3 Server and account settings should be configurable. Email Subject should be configurable (but should also have a key to compute the cycle time in the otel receiver, like cyclekey=some number or hash ). Configuration should be done via yaml (in accordance to the opentelemetry standard) Skills and experiences required for this job: - Experience with - Experience with golang - Proficiency in SMTP and POP3 protocol - Ability to develop configurable systems - skills in data metrics and logs This project will require you to be detail-oriented, reliable, and have exceptiona...

    $118 (Avg Bid)
    $118 Avg Bid
    9 bids

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works well, however, it decrypts file into binary data which is saved on hard disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced

    $47 (Avg Bid)
    $47 Avg Bid
    7 bids

    Hi DIGITAURUS Technologies, I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    $64 (Avg Bid)
    $64 Avg Bid
    1 bids

    ..."Google", "name": "Apple", "description": "Search Engine", "pixels": [ 495 ], "groups": [ 54 ], "rules": [ { "type": "geo", "key": "us", "value": "" } ], "long_url": "" } The link GET call looks like this: "status": "success", "link": { "id": 1, "title": "reddit: the front page of the internet", "hash": "rF7r6", "alias": "red", "long_url": "", "short_url": "", "disabled": false, "ex...

    $128 (Avg Bid)
    $128 Avg Bid
    69 bids

    In need of a knowledgeable coder for a Node JS script project. Under the specifics of the task, you'll be required to configure a script that will facilitate the exchange of USDT for WSTETH on the UNISWAP V3 router using the INFURA endpoint. For this role, it is mandatory to ha...Output say: USDT balance is zero"(shown in colsole) 4. When Trade executes, it must take place on ARBITRUM and use the highest recommended gas fee to facilitate the trade as fast as possible. INFURA HAS AN API that detects current gas fees. I woudl like to use this to first check what they are and they use the fastest one. 5. When TX is complete I woudl like it to out put to the console, the tx hash, the amount of USDT as well as price for input and the Amount of WSETH received as well as pric...

    $578 (Avg Bid)
    $578 Avg Bid
    37 bids

    ...someone who possesses extensive experience in Elementor powered WordPress development. I'm seeking a skilled professional to design and construct a WordPress website with a definite theme in mind. Please note, the specifics of said theme will be discussed more in-depth once negotiations commence. Important elements for this project: - The website should be designed on Elementor. - The proficiency in developing appealing, navigable websites. Given the lack of explicit request for particular features such as e-commerce functionality, blogging capabilities or contact forms, we'll hash out the specifics during our discussions. When applying for this project, share relevant examples of your past work that demonstrate your WordPress and Elementor p...

    $163 (Avg Bid)
    $163 Avg Bid
    134 bids

    I need someone who can guide me on monitoring historical transactions being processed by my WordPress site using WooCommerce plugin, specifically for Payment Gateways such as Barclays ePDQ or others of a similar nature. Specifically, the Payment Gateway owner (Barclays ePDQ) has requested we provide "We will need to see exactly what is being sent from your system over to ePDQ. Please include the following: 1. Your string to hash demonstrates the SHASIGN calculation. An example of this is as follows: AMOUNT=100myshapassphrase123CURRENCY=GBPmyshapassphrase123… etc. 2. Your form parameter/ value pairs submitted as part of the transaction request 3. The URL to which the requests are being submitted" Your expertise should include: - A thorough understanding o...

    $34 (Avg Bid)
    $34 Avg Bid
    29 bids

    ...scanner looks for the pairs from an exchange that best meet the conditions for spot future difference arbitrage. On the right side, framed in white, are the open bots, so not only one bot is opened, but another bot for every currency pair that meets the conditions. Your job is to add a field in our database for the API key to the exchange and a database field for the API password. (in hash format of course). Every customer who logs in with us can then run a bot for their account, directly via our trading portal. That sounds complex at first, but it really isn't. Anyone who knows their craft can get through it in a week. We have already done this for a few exchanges and therefore have experience of how long it will take and how much it will cost. Please, dear developer, ...

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    10 bids

    Hi, I'm in search of someone skilled in Excel& Crypto sheets to assist in creating a spreadsheet that tracks real-time Bitcoin prices, network difficulty/hash rate, and estimated mining rewards based on hash rate. The goal is to correlate this data with my estimated mining rewards, watts used per miner, and ultimately calculate ROI and the bottom line. If you're interested, please send me a private message. I'll provide further details and data once we connect. Looking forward to hearing from you!

    $127 (Avg Bid)
    $127 Avg Bid
    24 bids

    ...mundane and including a maximum of 5 labelled screen-grabs of notable processes: in addition to the quality of your masters, these reports are how you demonstrate your skills and thought processes. Part B: DDP & Apple Digital Masters 1. Create a DDP data package ready for CD duplication that includes your four mastered tracks. Ensure your DDP package includes a PQ Sheet and evidence of a successful MD5 checksum verification. To pass this element of the assignment, your DDP package must open cleanly without missing files and display and play your mastered tracks along with appropriate track data. Please check your DDP opens correctly before you submit. 2. Master the same four provided pieces of music to a standard that adheres to the Apple Digital Masters submission format....

    $55 (Avg Bid)
    $55 Avg Bid
    15 bids

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    $41 (Avg Bid)
    $41 Avg Bid
    6 bids

    ...am looking for a highly knowledgeable and skilled individual to generate a Hash key of 10,000 Th/s and 20,000 Th/s. The outputs required are Hash160, which is to be generated using a bitcoin address with a value of more than 0.1 btc, and the corresponding BIP32 Root Key of the same wallet. To generate the Hash160 and the corresponding Hash Key, you will need to utilize the BIP32 Root Key. Additional functionality needed includes: - Blockchain data analysis - Balance check of provided address While no predefined programming language or framework was specified, please use the one you are most proficient in as the priority is on efficiency and accuracy. Ideal candidates should have a deep understanding of hash key generation, BIP32 Root Key manipulation as well...

    $277 (Avg Bid)
    $277 Avg Bid
    6 bids

    details for logo below design., Hash symbol logo (sample attached, it can be any design) on the four sides of the hash symbol (#) engraved or embossed style, need below elements, 1) Top - Vedic scroll 2) Right - Computer or computing 3) Bottom - Mech gear 4) Left - Electric component (capacitor)

    $63 (Avg Bid)
    $63 Avg Bid
    27 bids

    I need an expert who's able to decrypt an old .accdb MS Access database for which the encryption key was lost. The database contains precious client information and business transaction data that I want to incorporate into our current database. Here are more specifics of the task: • Database Conversion: The old database structure and relationships are somewhat important, so would ideally be maintained during the conversion process. However, some changes can be considered if necessary for integration. • Data Integration: Both client information and business transaction data from the old database should be incorporated into the current one. As a preference, if the data can comfortably fit, have it provided in an Excel spreadsheet. • Data Cleaning: There's ...

    $161 (Avg Bid)
    $161 Avg Bid
    27 bids