...set up. Here us the list of the vulnerabilities that need to be fixed... 1) DOM Based Cross-Site Scripting Fix:Review client-side code and clear your input sources 2) Encryption not apllied Fix: Force the use of HTTPS when sending sensitive information 3) Hidden Directory Detected Fix: Issue a "404 - Not Found" response status code to a prohibited
Hello, We planing to develop a product as SAAS based on cloud. that will include Micro CMS , Micro CRM with Market place + Analytics report with socialise. Question you need to answer in your proposal. 1, Which framework you will be using - Laravel/Codeigniter? 2, How to going to make multi tenant application with single code and multi database - for cloud version, If user want subscr...
We are looking...of 21Million coins, QT wallet and the coins should be transferred to our wallet. We want the complete source code of the coin as well. The coin should be based on SHA256 encryption. You should have experience in Coin Development and should be able to provide us sample of your work so we are sure that you can complete the project.
...to simple show thumbNails and JPG pictures from an archived file with a certain structure (see below, no compression involved) The archive does not need to employ compression/decompression. We use it as a simple container, the JPG files could be simply read as data buffers; encryption will be applied later The application will only have to show
...script that enable multiple users to encrypt and decrypt a file with a password. The password must be entered by the user via command line (not stored in the script). The encryption hash used must be SHA256. The script must have the ability to list multiple files in the index. When encrypting a file that is already in the index, have it replace the entry
I need you to develop some software for me. I would like this software to be developed for Windows using Java. Design a windows software that will have an encryption and decryption functions and will access a web server for information
i need to develop a new encryption technique or to demonstrate a novel method of securing and verifying digital signature without using any third party application. i alrady fenish the website desigen using java
For our project we need different & unique method of image encryption in MATLAB by using any binary random sequence . just YOU can provide your codes of MATLAB for us & give a screen recorded video of working .
I nee...required; - Firmware and source code of the controller software to log every RFID tag in its range and than submit it into a server in the internet, preferably using SSL encryption. The device should (preferably be USB powered) have medium range (50cm to 100cm) RFID tag reader, internet connection using GSM (3G, GPRS), and a micro-controller
...I have a task to unzip a file from an archive which uses pkzip2/deflate (zipcrypto) encryption and compression. I have read that this is possible to crack with a known-plaintext approach with at least 12 known bytes. Since I do not know the content, the idea was to use 12 bytes from the fileheader of the jpg in the zip file. Have tried the tools pkcrack
Hi i need to find the type of encryption of these requests here is the request and the response [url removed, login to view] [url removed, login to view] i need to know how are encrypted these two info : X-APIToken and "sign" if can it be useful i have already collected the requests using fiddler , so i can send you the fiddler
...own Encryption or Digital Signature Technique or Algorithm, Description Nowadays, security by encryption is done using either a third-party application or the database’s native digital signature processing, the former being too expensive, while the latter offers weak security. The idea is for the students to formulate their own encryption algorithm
i have some encryptions and i know the answer of encryptions also i want to find out which method and type is used to make this encryptions... i am sharing 2 samples below and i can share more samples on demand (REMOVED BY FREELANCER.COM ADMIN)
I am a serial entrepreneur that is looking for an iOS app that utilizes iBeacon for proximity and asset tracking. It will require a layer of encryption and an interface with a Hyperledger backend. I am currently looking for an MVP to test the tracker / proximity. It could develop into an on-going project if testing warrants.
(Removed by Freelancer.com admin) Everyone else, as stated above we were hit on a PC by Sigma. We've removed the virus but looking for some help on reversing th...Freelancer.com admin) Everyone else, as stated above we were hit on a PC by Sigma. We've removed the virus but looking for some help on reversing the ransomware document file encryption.