Encrypted client eathena jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,214 encrypted client eathena jobs found, pricing in USD

    i want encrypted app message ios android same signal [login to view URL]

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    26 bids

    i have some video in my server. i want to serve those video in iframe. but the source url should be encrypted. the file should not be downloaded by any downloader. look at visionias website demo section.

    $94 (Avg Bid)
    $94 Avg Bid
    4 bids

    look the video at [login to view URL] .. i want this type of video player. where the source url is encrypted with a key. and the original source url is not available. and the idm or any download software wont popup for download. i want this kind of player. from where no one can download the file unless screen recording. and i also

    $156 (Avg Bid)
    $156 Avg Bid
    4 bids

    I have a tutorial website. i want to protect the files from stolen/downloaded. users can only view the files.

    $50 (Avg Bid)
    $50 Avg Bid
    2 bids

    ...sometimes they are found with weapons [not here], demonish or egypt-god-touched, just to give you an impression of the lore). A few impressions can be seen here: [login to view URL]:ANd9GcRpl5WmUFlJ9HLk63ItbKUCzFD-p3Dqsi4i_mtjjku_AvfyYfgo [login to view URL]

    $125 (Avg Bid)
    $125 Avg Bid
    1 bids

    Design A seamless super encrypted mobile app for customers. App Features Create Account/ Login (All eCommerce functionalities) > Apply coupon, load cart, add to wishlist, pay via bitcoin, credit card, paypal etc Expiring chat messages from customers Track Courier Order (googlemaps; like uber tracking) Primary focus is for the app to be secure &

    $371 (Avg Bid)
    $371 Avg Bid
    18 bids

    I need to find a password and decrypt encrypted file which length is 4,1 KiB. File in the beginning has SALTED__ Example tool: [login to view URL]

    $159 (Avg Bid)
    $159 Avg Bid
    2 bids

    We want a bootloader that uses Asynchronous encryption to load a Private Key signed DFU over USB. So the sequence will be as follows. A binary file on a PC is encrypted using a Private Key to create a DFU The DFU will be loaded on the MCU and decrypted using Public Key. (Probably using the STM example DFU tool) The Bootloader is re-flashed with the

    $3166 (Avg Bid)
    $3166 Avg Bid
    16 bids

    i want make encrypted email website with offshort server for privat use

    $674 (Avg Bid)
    $674 Avg Bid
    15 bids

    ...these attribute to mysql converted DB. 4- Create Custom Page For Download Included Time Counter and Last added Books and this page should be used cloking so the link looks encrypted and for 1 time use , if the visitor use same link again it should redirect to post (if think there is plugin works like this). 5- Create Page as well for Author Shows the

    $179 (Avg Bid)
    $179 Avg Bid
    15 bids

    ...in Australia. I am currently running some equipment that logs data through a data logging box which collect data into an encrypted RAW. file format. I am seeking a programmer to write me a small unlocking program for the encrypted .RAW file so I can see all the data lines to work with the data. We are currnetly sending the RAW. data files overseas

    $491 (Avg Bid)
    $491 Avg Bid
    13 bids

    ...stop ranting and let's get into it! Btw, I am willing to go above budget if I like what I am seeing. (Basic layout of the website: [login to view URL]) Basic Functions -ENCRYPTED Provably fair system. Also needs a version to be publicly displayed. We focus on 100% transparency -Responsive Site, with a White-ish / Custom Theme (Creativity Encouraged

    $818 (Avg Bid)
    $818 Avg Bid
    28 bids

    Project Requirements: Create simulation with Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using RC4 encryption with different key size range starting from : 64,128 and 256 bit. Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using Rabbit Encryption Deliverables: Matlab code Flowchart Data reports : Bit error

    $168 (Avg Bid)
    $168 Avg Bid
    6 bids

    I have 1 app packed by themida, all form data is encrypted by AES before send to server. I want develop 1 dll to hook and filter plaintext before encrypted and encrypted data

    $494 (Avg Bid)
    $494 Avg Bid
    16 bids

    • POLICY • VeraCrypt is an open-source utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities

    $250 - $750
    $250 - $750
    0 bids

    ...EXTENT the submission(s) are compliant with the standard. Example: - Standard: All communication between the supplier data center and the customer data center have to be encrypted. - Customer 1 submission: We use a Layer 1 encryption between on the WAN connection between data centers. - Customer 2 submission: Our WAN connection partner uses an optional

    $200 (Avg Bid)
    Featured
    $200
    3 entries

    I have a player that plays encrypted files. it in C#. now i want a login to the player and also bound to PC by mac adress. i have user data in a PHP code ignitor website.

    $113 (Avg Bid)
    $113 Avg Bid
    6 bids

    The online store is made with laravel framework and mysql, has two payment gateways alre...codes when it is satisfactorily paid through the two payment gateways: perfect money and bitcoin 2. The whole process of hosting, purchasing and sending digital codes must be encrypted. 3. Fix the contact page so that a copy is sent to the administrator's email.

    $129 (Avg Bid)
    $129 Avg Bid
    21 bids

    i have a encrypt code with which i encrypted video files in android. now i want to play the encrypted files with windows PC.

    $93 (Avg Bid)
    $93 Avg Bid
    7 bids

    Hello, I use an odroid XU4 to control a software RAID 1 under ubuntu 18.04 (arm7). I would like to encrypt the entire drive, create an encrypted partition or an encrypted folder using ecryptfs, EncFS or dm-crypt. Conditions: - the existing data must not be lost, so please discuss the procedure with me (i.e. creating a new partition or folder without

    $9 (Avg Bid)
    $9 Avg Bid
    2 bids

    ...preferred choice would be something like sending defined packets but I believe the data is encrypted when going across the network. Second choice would be something that can be used both on Windows and Linux since the server is hosted on Linux but the client uses Windows. This job has the potential to evolve into multiple jobs. The first one is getting

    $176 (Avg Bid)
    $176 Avg Bid
    6 bids

    NO BIDS FROM INDIAPAKISTAN/CHINA PLEASE I need an app that does the following: 1) user downloads it and makes an account using an username and date of birth and email and terms and conditions 2) user verifies email 3) user logs in 4) user can search for other users whose username he already knows 5) chat with them (end to end encryption) 6) audio call with them 7) contents of chat / call NOT stor...

    $671 (Avg Bid)
    $671 Avg Bid
    10 bids

    ...Utf8), encrypted, secret, created, nonce, base64Nonce, passwordDigest, utf8iv = [login to view URL](iv), utf8key = [login to view URL](key), utf8token = [login to view URL](token); encrypted = [login to view URL](utf8token, utf8key, { iv: utf8iv, mode: [login to view URL], padding: [login to view URL] }); secret = btoa(iv + encrypted); created

    $393 (Avg Bid)
    $393 Avg Bid
    16 bids

    ...(lengs can be determined by the user). All Communication must be stored in a encrypted container on the phone / with AES-256. The encrypted container muss be linked with the PIN Code. If you enter 3, 5, 10 etc. times (determined by the user) the wrong PIN Code, the encrypted container need to be deleted with secure data erasure. Phone number verification

    $1732 (Avg Bid)
    $1732 Avg Bid
    32 bids

    you need to configure teh fblogin with our fb id etc... in codeintiger framework create [login to view URL] file to make encrypted js file from our js files

    $25 (Avg Bid)
    $25 Avg Bid
    3 bids

    My social media, email and other accounts are constantly being hacked, despite taking all precautions I can possibly think of - 2 factor, encrypted emails, using burner phones, etc. I would like a review of my computer/account in order to determine how this is constantly being done.

    $145 (Avg Bid)
    $145 Avg Bid
    10 bids

    ...dependencies required! Robust connection Robust KeepAlive system, and backup connection addresses ensure your connection with the remote hosts will never get lost. Encrypted connection 100% Encrypted connection via custom TCP protocol protects transmitted data. Not a single byte is sent unencrypted. Extensively customizable Many options in order to tweak

    $647 (Avg Bid)
    $647 Avg Bid
    3 bids

    .arrow crypto sql backup encrypted file solution .arrow crypto sql backup encrypted file solution .arrow crypto sql backup encrypted file solution

    SQL
    $177 (Avg Bid)
    $177 Avg Bid
    3 bids

    I have an USB hard drive which contains an encrypted Linux LUKS partition whose password I have forgotten. However, I have a list of possible passwords as a text file. One password candidate per line. There are about 100 password candidates in this file. I need you to write a script I can run in Linux that will try to open the USB hard drive, which

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    Windows server was compromised due to due to SynAck ransomware attack We need to Decrypt a MS SQL Server 2008 database .mdf & .ldf file (2files)

    $25 (Avg Bid)
    $25 Avg Bid
    8 bids

    ...Data currently stored on prem shares. We own Microsoft Office 365 licences but are unclear whether additional licences are required. Additional requirements: - Data must be encrypted during transport & when stored. - Security travels with data - Data needs to be available online and offline - Labeling documents (classification) needs to be as easy for

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    19 bids

    Need WooCommerce plugin which will set price of an item to a multiple of a live stock price. Plugin must not be encrypted. I need to be able to verify that the code is clean. Kindly put “StockQuote” in first line of pitch and list the service you are using to get the stock price. I will not be interested in paying for monthly APIs to get a single

    $98 (Avg Bid)
    $98 Avg Bid
    2 bids

    I need you to develop some software for me. I would like this software to be developed using Python to enable encrypted voice connection over serial connection.

    $17 (Avg Bid)
    $17 Avg Bid
    2 bids

    I am looking for an app similar to Instagrm app with all functions including photo filters and video filters. I need it with non-encrypted source code without any obligations.

    $720 (Avg Bid)
    $720 Avg Bid
    14 bids

    ...over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not install APP, No Internet Connection Analog Voice Encryption Encrypting voice of mobile calls (GSM

    $155 (Avg Bid)
    $155 Avg Bid
    4 bids

    Here is the problem currently what I have. The Image is visible on the web page, but I can not get the image URL from source view or something. It's probably encrypted. on the source code, only sees <div> tags. But on the Chrome Developer Tool -> Network view, I can see final requested image URL. So, I want that final requested image URL on the page

    $25 (Avg Bid)
    $25 Avg Bid
    10 bids

    I have ~20 powerpoint and excel files which were put onto a usb drive and when i transferred them to my computer they seem to have become encrypted and cannot open. I believe McAfee Encryption - Files and Folders is on them. Any methods to assess the files? If so, am willing to pay to remove encryption.

    $107 (Avg Bid)
    $107 Avg Bid
    15 bids

    ...make sure the application will remain fast with a huge number of users ? 2) Security, incase of an attack of a third party, how secure will be our data ? will the data be encrypted or protected in the database ? 3) Regarding Search facility, incase a user wants to see all the students who study with him in the same university, and the number is very

    $936 (Avg Bid)
    $936 Avg Bid
    42 bids

    We are creating app for encrypted communication. We will route the messages wITH PFS encryption. Need server admin expert to HIDE server location from hackers Secure and add more security Train local sustem admin. Example : google phantom secure (no long existing) but had only uncrackable phoned and couldnt locate servers.

    $42 / hr (Avg Bid)
    $42 / hr Avg Bid
    10 bids

    I need you to write program...using Python. This will make raspberry pi take input of number from keyboard and make a encrypted call using dial up modem. At the reciever end it will have a modem in auto answer mode and recieve the call over reciever raspberry pi. This way i can make encrypted call over landline without using my phone but raspberry pi.

    $500 (Avg Bid)
    $500 Avg Bid
    2 bids

    There is a file in my server which is encrypted using IonCube encryption, is it possible to decrypt this file? if so can you make this?

    $433 (Avg Bid)
    $433 Avg Bid
    9 bids

    ...which transfer to our client each day. But they require new encryption process to receive encrypted data with a checksum file and an end file to confirm completion. Our source files start STRC_. EXAMPLE Source file: /[login to view URL] SCRIPT WILL NEED TO CREATE new file: /[login to view URL] (PGP encrypted version of source file)

    $219 (Avg Bid)
    $219 Avg Bid
    7 bids

    ...which transfer to our client each day. But they require new encryption process to receive encrypted data with a checksum file and an end file to confirm completion. Our source files start STRC_. EXAMPLE Source file: /[login to view URL] SCRIPT WILL NEED TO CREATE new file: /[login to view URL] (PGP encrypted version of source file)

    $185 (Avg Bid)
    $185 Avg Bid
    10 bids

    I know where the notes are, they are stored in a encryptedencoded format in one of the tables. I can extract them but the ascii text that makes the note data is all encoded by some hash or something. I need someone who is familiar with the method used to encode the data and can provide a method to decode DO NOT BID IF YOU HAVE NEVER WORKED WITH THIS

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    I have an encrypted string for which I know the value of the first 200 will be after decryption. I will pay for the decryption method. To not waste my time, include the first character of the decrypted string in your bid (I know what it is) Here is the first 200 characters of the encrypted string for which I need the method to decrypt: cd0ee7c3

    $43 (Avg Bid)
    $43 Avg Bid
    4 bids

    i am looking for a team that can develop a secure mobile app for android devices that has an admin panel to control users activity

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    27 bids

    ...discovery schedule and the number of times that agent can run, will be set only from a master application (our ERP will provide an encrypted TXT with this info). It will also have unique serial number which will be associated with client and its location (serial number is also generated by our erp and comes in the TXT file). Every Time before polling, agent

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    6 bids

    ...Multisig transactions along with the standard escrow - Make a 2FA PGP login system so users can enable 2FA login system. When the user logs in they should be given a PGP encrypted message containing a code that they must decrypt and enter the code before logging in. - Integrate a search bar feature - Make sub categories (Script only supports categories

    $888 (Avg Bid)
    $888 Avg Bid
    15 bids

    ...*** DO NOT CONTACT ME IF YOU CANT DECRYPT ATTACHED FILES **** I need to decrypt a visual studio project that has been encrypted by RSA4096 ransomware. ** FILE RECOVERY IS NOT AN OPTION / ORIGINAL PC IS NOT AVAILABLE ONLY ENCRYPTED FILES** what I am after is simple: if you can decrypt the attached sample files then I will reward you the project and

    $351 (Avg Bid)
    $351 Avg Bid
    8 bids