Encrypt joomla website source code jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    3,720 encrypt joomla website source code jobs found, pricing in USD
    Upgrade security to vps site 6 days left
    VERIFIED

    I am looking for a developer to upgrade security on (2) vps -Need upgrades such a...a developer to upgrade security on (2) vps -Need upgrades such as full auto backup to remote location -change default phpmyadmin url (while keeping the site working -encrypt passwords in the database so it cant be decrypted easily -Prevent common hacks to site

    $202 (Avg Bid)
    $202 Avg Bid
    4 bids

    i wanna protect my java programming code. if you have any premium software to encrypt or code protection software then this project for you.. i dont like any one can decompile and see my code. its java programming. ** you must have a premium tools thanks

    $39 (Avg Bid)
    $39 Avg Bid
    6 bids

    ...Windows Login System 2. Facial Recognition (FaceID) Login 3. Fingerprint Recognition Login 4. OTP Based Login After going through all these security layers we need to encrypt the windows files (AES128 Encryption). I think Project can be divided into two parts where making an executable file with above login features and then running that file

    $958 (Avg Bid)
    $958 Avg Bid
    5 bids
    Design a website 5 days left

    ...design a site with requires below: * minimal and be creative based on this reference site [url removed, login to view] * professional looking and loads faster * let's encrypt free https and auto update * multi language auto by google translate * gogle analysis for site activitiy analysis * design under Avada theme or recommended wordpress themes

    $482 (Avg Bid)
    $482 Avg Bid
    52 bids
    SSL issue at rtc server 4 days left
    VERIFIED

    set lets encrypt ssl certificate and it auto renewal.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    2 bids
    security project 4 days left

    it is a software to encrypt the file and send it over the internet using both symmetric and asymmetric key approaches. by implement an AES encryption/decryption first, then use RSA to encrypt/decrypt the symmetric key. my application should abide to the following specifications: 1. A GUI application where a user have to login with a user name and

    $79 (Avg Bid)
    $79 Avg Bid
    12 bids

    I am looking for an experienced developer with skills in decrypting php codes to remove / encrypt some codes on our website. Examples of files that requires decryption are listed below. /app/Controller/[url removed, login to view] /app/Config/[url removed, login to view] /core/lib/Cake/Config/[url removed, login to view] /core/lib/Cake/Config/[url removed, login to view] /core/l...

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    7 bids

    IF we have a string e.g. 'How are you?' then it should be encrypt and decrypt with the help of CUDA language in LinuX OS.

    $195 (Avg Bid)
    $195 Avg Bid
    5 bids

    ...packets too (networking) decrypt encrypt packets via network, coding I hope you can understand what I mean I can help you to explain more and upload the files needed for this project. Just need some one who has really mastered Ragnarok Online how does Ragnarok Online works. If you think you can learn fast this open source and solve my problem Note:

    $495 (Avg Bid)
    $495 Avg Bid
    4 bids
    Projects for Ragnarok Online 1 day left
    VERIFIED

    ...packets too (networking) decrypt encrypt packets via network, coding I hope you can understand what I mean I can help you to explain more and upload the files needed for this project. Just need some one who has really mastered Ragnarok Online how does Ragnarok Online works. If you think you can learn fast this open source and solve my problem Note:

    $419 (Avg Bid)
    $419 Avg Bid
    9 bids

    I need you to write some content for a website. Cyber Security & its Threats to Banking Industry Cyber security or computer security is the way to protect the computer data from theft and threats that may damage the hardware, software and the information. Major areas covered in cyber security are application security, information security, disaster

    $824 (Avg Bid)
    $824 Avg Bid
    22 bids

    ...maintain a deployment of Spring Framework that connects to mongo DB with the following considerations: Setup load balancer for the setup to accommodate higher traffic. Encrypt volumes using KMS. Create users using the IAM web service. Define a clear plan for downtime and scaling instance up when needed. You need to be a java developer with experience

    $432 (Avg Bid)
    $432 Avg Bid
    17 bids

    To freelancer support staff: This a pr...university courses. I will keep posting if it is declined. To freelances: This a project for writing a matlab 2013 code for encryption and decryption of colored images. The code is able to encrypt every color channel (red,green and blue). The code can also visualize both encrypted and decrypted images. Thanks

    $155 (Avg Bid)
    $155 Avg Bid
    15 bids

    Hi, We have a couple php file that was encrypt with Source Guardian and need to be decrypt ! Thanks.

    $22 (Avg Bid)
    $22 Avg Bid
    5 bids

    ... c, d) 2. asks the user for the output filename (f, c, d) 3. ask the user for the passphrase (f, c, d) 4. ask the user if they want to encrypt (add shift value) or decrypt (subtract shift value) use ‘e’ for encrypt and ‘d’ for decrypt (use ReadChar) 5. open the input file and read its contents into a buffer (c) 6. transforms this buffer using the passphrase

    $91 (Avg Bid)
    $91 Avg Bid
    13 bids

    This project based on encrypt secret message by using Honey Encryption Algorithms then using stego to embedding encrypted message

    $103 (Avg Bid)
    $103 Avg Bid
    10 bids

    ...the storage of the main code of the application Data: the file simulating the storage of data storage and using the AES-128 bit and Elliptic-Curve encryption algorithms re-encrypt the data file and the program file before To generate the signature of the main program you can generate its hash (SHA-256) and encrypt your hash with your Elliptic-Curve

    $357 (Avg Bid)
    $357 Avg Bid
    6 bids

    ...configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. 5. Use and regularly update antivirus software. 6. Develop and maintain secure systems and applications. 7

    $4444 (Avg Bid)
    $4444 Avg Bid
    12 bids

    TLS Certificate stopped working on letsencrypt expired certificate, on renewal, it does not longer encrypt mail with TLS. Tried many things, but emails still gets delivered with a self signed certificate (server default), the system is a CentOS 7 with Plesk. The letsencrypt addon module on Plesk seems to be working, it does say certificate is installed

    $27 (Avg Bid)
    $27 Avg Bid
    5 bids

    ...key. Publish the public key and keep the private key a secret. 4. Generate a symmetric-key to use in the encryption of the file using AES. 5. Use the RSA algorithm to encrypt the symmetric-key used in step 2 using the receiver’s public key. 6. The receiver uses its own private key to decrypt the symmetric key, and then uses that symmetric key

    $190 (Avg Bid)
    $190 Avg Bid
    21 bids